Authentication and Authorization Methodologies Presentation

 

Once a user is authenticated in an organization’s network, that user is authorized to access certain data based on the information security principle of least privilege. 

Your CEO and CIO need options for the organization’s authentication and authorization methodologies. Recommendations should include how to mitigate the impact and risks from vulnerabilities.

Create an 9- to 11-slide, media-rich presentation in Microsoft® PowerPoint® for the organization you chose in Week 1, and ensure you provide:

  • Descriptions of at least 3 roles employed in the organization you chose in Week 1
  • Descriptions of at least 3 common attacks against access control methods, including the password policy vulnerability as described in the vulnerability report
  • Countermeasures to reduce vulnerabilities and mitigate potential attacks on access control methods

Note: A media-rich presentation should include multimedia such as graphics, pictures, video clips, or audio.

Format your citations according to APA guidelines.

Professionalism assignment help

NEEDS SLIDES and SUPPORTING NARRATION

I WILL DO THE VOICE AFTERWARDS

Bulleted Points on each slide should include brief points that identify the areas that will be addressed in the narration.

Your PowerPoint presentation should include a total of six slides using the following format:

Slide 1: Cover page that includes assignment title, your name, course, section number, and date.

Slide 2: Introduction of Company (1–2 minutes of narration)

  • Introduce the presentation by explaining information about the organization and the observation that took place such as the name of the organization, type of organization, day and time of observation and your role as an observer (are you an employee, customer, etc.).
  • Share background information about the company to give the audience an understanding of what this organization does. Support the ideas shared with research about the company’s background.

Slide 3: Professional Appearance of Employees and Company (1–2 minutes of narration)

  • Use these questions to guide your response (do not use these questions verbatim in your presentation):
    • How do the employees dress?
    • Is there anything about the appearance of the employees that distracts from their professionalism?
    • Do the employees’ appearance fit the nature of the business? Why or why not?
    • What does the working environment look like? (furnishings, artwork, lighting, sounds, etc.)
    • Do the physical surroundings fit the nature of the business? Why or why not?
    • How do the employees interact with each other and outside people within the workplace? (greetings, tone of conversation, non-verbal communication, etc.)
    • How do employees interact with each other?
    • Do the interactions of employees fit the nature of the business? Why or why not?

Slide 4: Analysis of Company (1–2 minutes of narration)

  • What inferences can you make from your observation? You should cover the following ideas in your explanation:
    • Analyze the company based on information you have learned about organizational culture in the class. Areas to include:
      • Determine the dominant organizational culture the company follows by choosing one of the 4 organizational cultures you learned during this unit of the course. Support this information with what you have learned about organizational culture based on both observations and research.
      • Compare the work done at the company and the organizational culture and explain how this relates.
      • Research the mission of the company and explain if it aligns with what you have observed. Explain why or why not.

Slide 5: Evaluation of Your Fit (1–2 minutes of narration)

  • Based solely on what you have observed and researched about the company (not based on the field of the company), do you feel you would be a good fit for this company? Why or why not?
    • Support this information with what you have learned through your observation as well as what you have researched about the company.
  • Identify at least 2–3 social and behavioral attributes you have that would be an asset to this company. Explain why. How do these attributes specifically connect with the nature and needs of the company?

Slide 6: Reference Slide – follows APA guidelines. (Reminder: for each source on the reference slide, there must be a corresponding in-text citation in the body of the presentation.)

Narration Guidelines: Your narration for the slides should demonstrate the following:

  • Maintain a persuasive tone by summarizing observations and evaluations for each slide.
  • Words should be clearly enunciated, and professional tone should be sustained throughout the presentation narration.
  • Audio recording should be free of background noise and interruptions. 

Assignment Format

  • Two attachments will be needed to hand in for this assignment:
    • PowerPoint Presentation including narration with six slides that is professionally organized
    • Transcript shared in a Microsoft Word document should be included (be sure to separate each slide on a separate page).
  • Replace all template wording with brief bulleted points in your own words that guides the audience.
  • Slides 2–5 should include narration. See information on Slide 2 in the template which explains how to add narration to a PowerPoint slide – (be sure to remove this slide before posting to the Dropbox)
  • Ideas throughout the assignment should be supported by specific areas observed while conducting the observation during this course.
  • Bulleted points on each slide should include brief points that identify the areas that will be addressed in the narration.
  • Researched information should be included on Slides 4 and 5 (In-text citations should be included with any brief points that were researched from outside sources and the narration should fully explain the points).
  • With the presentation, there must be a transcript included in a Microsoft Word document that includes the narration word for word for each slide. Be sure to use headings for each slide narration, e.g., Slide 2, Slide 3, etc.
  • Identify the source of any pictures you use. NOTE: Pictures are not required for this presentation.

Use the PowerPoint template provided and submit your two files (both the PowerPoint with audio narration and the MS Word document with the transcript) to the Unit 6 Assignment Dropbox.

Questions

Question 1

Consider the XOR problem where there are four training points: (1, 1, −),(1, 0, +),(0, 1, +),(0, 0, −). Transform the data into the following feature space:

 Φ = (1, √ 2×1, √ 2×2, √ 2x1x2, x2 1, x2 2).

Find the maximum margin linear decision boundary in the transformed space.

Question 2

Consider the following set of candidate 3-itemsets: {1, 2, 3}, {1, 2, 6}, {1, 3, 4}, {2, 3, 4}, {2, 4, 5}, {3, 4, 6}, {4, 5, 6}

Construct a hash tree for the above candidate 3-itemsets. Assume the tree uses a hash function where all odd-numbered items are hashed to the left child of a node, while the even-numbered items are hashed to the right child. A candidate k-itemset is inserted into the tree by hashing on each successive item in the candidate and then following the appropriate branch of the tree according to the hash value. Once a leaf node is reached, the candidate is inserted based on one of the following conditions:

Condition 1: If the depth of the leaf node is equal to k (the root is assumed to be at depth 0), then the candidate is inserted regardless of the number of itemsets already stored at the node.

Condition 2: If the depth of the leaf node is less than k, then the candidate can be inserted as long as the number of itemsets stored at the node is less than maxsize. Assume maxsize = 2 for this question.

Condition 3: If the depth of the leaf node is less than k and the number of itemsets stored at the node is equal to maxsize, then the leaf node is converted into an internal node. New leaf nodes are created as children of the old leaf node. Candidate itemsets previously stored in the old leaf node are distributed to the children based on their hash values. The new candidate is also hashed to its appropriate leaf node.

How many leaf nodes are there in the candidate hash tree? How many internal nodes are there?

Consider a transaction that contains the following items: {1, 2, 3, 5, 6}. Using the hash tree constructed in part (a), which leaf nodes will be checked against the transaction? What are the candidate 3-itemsets contained in the transaction?

Final Paper – Analyzing and Visualization of Data

  

Project Description:

Currently, the world is going through a crazy epidemic (COVID-19). I hope all is well and are being safe. There are numerous data available online about COVID-19, such as COVID new cases per state, fatalities per country. As a data scientist, you are in charge of building an interactive chart that depicts numerous angles (at least three).  

  

Activities:

1. Data Acquisition, Examination, and Transformation.

a. Collect the dataset you are planning to use within your project.

b. Data Examination 

i. Examine the dataset to determine how you want to create an interactivity design and briefly explain your Solution.

c. If needed, perform Data Transformation

i. Perform data transformation techniques such as data cleansing, conversion, creation, and consolidation on the dataset.

ii. Record the transformation activities you performed on your dataset.

2. Data Exploration

a. Decide how you want to present the data.  

b. Decide the tool you would like to create the interactive Solution. The tool could be a developer’s tool or non-developer’s tool.

c. If you are not familiar with the tool, complete a tutorial. The reference below includes links to different types of interactive tools and tutorials.

3. Interactive Solution

a. Design and develop an interactive solution.

b. Explain the challenge you encounter.

c. Explain how to avoid such occurrence when and if you decide to go live/production.

4. Proposed Dynamic Solution

a. Explain how you would modify your solutions that allow the data to change (dynamic) with a database continually. 

4s week 4 assignment EH

In 300 Words

Cryptography is used to protect confidential data in many areas. Chose one type of cryptography attack and briefly explain how it works (examples include: ciphertext-only attack, known-plain-test attack, chosen-plaintext, chosen-ciphertext attack, timing attack, rubber hose attack, adaptive attack).

Include references, no copy-paste strictly. use your own words.