THE FUTURE OF LIFE INSTITUTE

 Elon-Musk donated $10 million to a foundation called the Future of Life Institute.  The institute published an open letter from an impressive array of AI experts who call for careful research into how humanity can reap the benefits of AI “while avoiding its pitfalls.”  Go online and find out about the institute’s initiatives.  What are its primary goals?  How can humans establish and maintain careful oversight of the work carried out by robots?  How valid are Elon Musk, Bill Gates, and Stephen Hawking’s concerns?  What other concerns should the public bear in mind as the technological revolution advances? 

Network Security

A. Answer Below questions in a sentence each:

1 What are three broad mechanisms that malware can use to propagate?

2 What are four broad categories of payloads that malware may carry?

3 What are typical phases of operation of a virus or worm?

4 What mechanisms can a virus use to conceal itself?

5 What is the difference between machine-executable and macro viruses?

6 What means can a worm use to access remote systems to propagate?

7 What is a “drive-by-download” and how does it differ from a worm?

8 What is a “logic bomb”?

9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?

10 List some of the different levels in a system that a rootkit may use.

11 Describe some malware countermeasure elements.

12 List three places malware mitigation mechanisms may be located.

13 Briefly describe the four generations of antivirus software.

14 How does behavior-blocking software work?

15 What is a distributed denial-of-service system?

B. In no less than 250 words, describe a hacking tool that is used to gain access to a network.  

Explain how the tool is used, how it works and how a netwoprk administrator can prevent this tool from access the network.

Background Briefing: How will the Governor's Initiatives Improve Cybersecurity for the State's Critical Infrastructures?

Background Briefing: How will the Governor’s Initiatives Improve Cybersecurity for the State’s Critical Infrastructures? 

For the week 5 discussion, we transition from federal to state critical infrastructure.

You are working for the Chief of Staff (CoS) for a newly elected Governor. The governor asked the CoS to research and prepare a 5- to 7-paragraph background briefing (backgrounder) that addresses the below question. The CoS will use this background briefing to prepare the Governor and his appointed cybersecurity director as they answer questions from the press and general-public.

You are not answering the questions as the governor, rather you are providing the governor the information s/he needs to answer the question.

The question: As governor, how will your administration improve cybersecurity for the state’s Critical Infrastructures?

The CoS asked you to research and prepare a draft for the background briefing. Your draft must provide enough information that the CoS and the Governor understand key terms that you use in your explanations. To that end, your draft briefing must answer the following questions:

  • What is meant by “cybersecurity” for critical infrastructures?” Give examples of critical infrastructure associated with a specific state.
  • What is meant by “Threats” (i.e. individual hackers, politically motivated hacktivists, criminal enterprises, and unfriendly “nation state” actors), countermeasures, and safeguards? Explain technical terms and examples.
  • What are the three most important actions that the governor’s administration should take to help improve the security of critical infrastructures in the state? (You should identify and discuss these in greater detail than your response to the first two bullet points.)

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

Questions

1.  500 Words

what data quality is and why you should care about it. Should data quality get more attention than the quantity of data collected or vise versa? State your position (Agree or Disagree)

Research Paper

Topic:Compressed Data Structures and Compressed Pattern Matching:

Paper should be in APA format, should be around 10 papers excluding intro, references, should be in APA format.

Use at least Eight(8) sources. Include quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources. 

Write in essay format not in bulleted, numbered or other list format

SIMULATION EXCERCISE

 

EMA Workbench is an open software tool  that can perform EMA and ESDMA modeling. Find EMA Workbench online and go to their main website (not the GitHub download site). Then do the following:

1) Under documentation, go to the Tutorials page.

2) Read through the Simple Model (in your chosen environment), and the Mexican Flu example.

3) Decide how you could use this software to create a model to help in developing a policy for a Smart City.

Write a three-page paper and explain how you could use the EMA Workbench software to develop a model to help create a policy for a Smart City. Explain what policy you are trying to create (i.e. traffic light placement, surveillance camera coverage, taxi licenses issued, etc.), and what key features you would use in your model. Then, explain how EMA Workbench would help you. NOTE: keep your models and features simple. You do not really need more than 2 or 3 features to make your point here. 

Data mining

 Discuss the appropriate application of Graph-Based Clustering Sparsification Techniques.