Week Research Paper 3 – Info tech

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

• Be approximately 4-6 pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Threat hunting– Research paper

Your team currently works as a research wing for a standard SOC (Security Operations Center).  The SOC keeps analytics on the current trends within the network.  Your team will be assigned a current issue that has been seen at the border of the network, trying to infiltrate the organizations network/systems.  Upon being assigned your item, it will be your job to go out and search OSINT (Open Source Intelligence) for more information on the attack being observed.  This could be a single port number, a series of attacks that has been identified, or an IP address to research and identify; your professor will assign this.  Your deliverable will be a 5 page APA style research report with your findings.  Discover current attacks being performed through this port, or current state of a known scanning suite.  Find sources, if possible, source code of attacks that are known to exploit this weakness and break down the code.  List known services on the affected ports that are associated and current attacks being performed on these services (list any CVE findings and briefly list and explain).  Look at SNORT rules that watch for these attacks and list that SID.

Finally, to wrap-up your research, present the current risk level associated with this threat.  Use the FAIR methodology to derive your threat assessment.  The attached FAIR PDF will walk you through your analysis.  To complete the FAIR document:

  • Step 1:  Asset at Risk will be the organization’s primary e-commerce web server.
  • Step 2:  You will provide this answer based on your research.
  • Step 3:  You will provide this answer based on your research; however, keep in mind how many times per day this is scanning the network, which will be given to your when you receive your topic.
  • Step 4:  You will provide this answer based on your research.
  • Step 5:  Assume the e-Commerce server is fully up-to-date and running the following base software:  Red Hat Linux, Apache, MariaDB, Drupal, PHP and is hardened based on base NIST recommendations for operations.
  • Step 6-7:  Calculate
  • Step 8:  Assume Moderate
  • Step 9:  Assume Moderate
  • Step 10:  Calculate and create this chart in excel with the appropriate item highlighted.  Include this chart in your paper and presentation.

The paper should be based on ” There is an uptick in port 8080 according to SANS Top 10. Why is that being targeted currently? “

Note: See the attachment

discussion

 Discussion  (Chapter 6): List and briefly describe the nine-step process in con-ducting a neural network project. 

 Your response should be 250-300 words.  Respond to two postings provided by your classmates. 

How these courses are useful for work

  

1. Operational Excellence

2. Information Governance

3. Data Science and Big Data Analytics

4. InfoTech Import in Strat Plan

5. Emerging Threats and Countermeasures

6. Cloud Computing

7.InfoTech in a Global Economy

I want to some points for these will useful for my job duties

1. Azure Cloud storage

2. Dynamics CRM(Customer Relationship Management)

3. Developer

  • JavaScript
  • Angular JS
  • JQuery
  • HTML/ HTML5, CSS
  • SharePoint
  • SSIS & SSRS

 

Cyberlaw DQ

Please do an internet search and find out the results of the Erin Andrews invasion of privacy case that the Craig discusses in the assigned text.  Write a commentary on your thoughts on the case.  Minimum 250 words.

Joseph Shumpeter's concept of Creative Destruction

 

Watch this video about Joseph Shumpeter’s concept of Creative Destruction. For example, many think that the introduction of self-driving cars will disrupt the job market for drivers. 

Use at least three sources.   Use the Research Databases available from the Danforth Library, not Google.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

R4

Submit a 5 page marketing plan that uses Blockchain to prevent “over-serving” and allows for greater automation of the global commerce function.

This is an essay assignment. 

The assignment is to conduct research based on the information below, using R. After analyzing the data in R, document the research and findings in a research paper in APA 7 format.

 Topic: Stack Overflow hosts an annual survey for developers. The study for 2019 includes almost 90,000 respondents (Stack Overflow, n.d.a).  

 Problem: Surveys usually contain instructions for participants that direct them to answer to the best of their ability. Inherently, this expectation of honest answers equates to consistent responses. Inconsistency can arise in a variety of ways, how one person interprets the question, versus the next, is one example. Another example is when the answers are multiple-choice, and more than one or none of the choices are appropriate to that respondent. In the study by Stack Overflow (n.d.b), respondents answered questions about employment and employment-related questions inconsistently. Modeling the survey results can present new insight into these inconsistencies 

 Question: Using a neural network and a random forest model and the Stack Overflow (n.d.b) data, will the survey responses to employment, developer status, and coding as a hobbyist, along with the answers to an open-source sharing question provide sufficient information to predict how the participant responded to the question about their student status? 

for data use file attached