Week 3 Writing Assignment

 Define and describe NAS. Assume you must implement a shared file system within the cloud. What company would you select? Why? What costs should your client expect to pay for cloud-based data on a gigabyte (GB) basis? 

Computer Science

Write an article review of the attached document. The paper should have Introduction, Methodology, Study findings and results, Conclusion and reference of the article.

Should be 2 pages in length.

APA format only

No plagiarism.

No content spinning.

Presentation

Imagine your organization is going to build an application utilizing Big Data and Machine

Learning. You are going to propose to upper management of your idea with supporting system

design. Develop an APA formatted paper that presents a detailed analysis and research-based

information pertaining to ALL of the following topics;

● List and describe the type of data you will need for your application, and how you will

ensure the quality of the data.

● List and explain the technologies, tools and software packages that will be used to build

the application.

○ Provide the design of your Big Data database. Explain why you chose the

database compared to others. Also, include supporting theories for the schema

you came up with.

○ Describe in detail why the chosen technologies are adequate to process the

data.

○ List and describe the types of the statistical analysis methods that will be used.

MSIT 690 Syllabus

18 of

● List and describe the benefits from the customer’s perspective and organization’s

perspective. Please pinpoint where the benefits are drawn from – data, technology,

software package, process, and etc.

● List and describe the concerns and downsides that may be introduced by the

application and the Big Data from multiple perspectives – law, regulations, social and

etc. Provide solutions, processes, application modules, and etc. that mitigates the

concerns, problems, issues.

● Provide data flow diagram, database design, and sample code of a module for your

application.

Present it in 10 slides.

PLE 11

Please answer the below in 2-3 lines:

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Enterprise risk management subject

For your week 6 research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.