Organ leader and decision making

Read the ModMeters Case Study on pages 82-85 in the textbook. Answer the Discussion Question at the end of the Case Study. Your responses must be complete, detailed and in APA format. See the sample assignment for expected format and length. Case study paper must be completed in APA style format.  Attached document is the case study pages from 82-85  and also the preferred template for the assignment.

dis_biwk2

 Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning. 

Lab project work

 

Please, select an organization of your choice and demonstrate how to Create a Scheduled Backup and Replicating System Folders

Note: this is not a theoretical writing, rather an application of the week7 Lab6.

Deliverables:

Titled page,

Table of contents

Project of Objective

Project Snips,

Conclusion

Discussion

 

Write 400–600 words that respond to the following questions:  

  • What is the typical key size of a strong encryption system used on the Web today? Explain your answer with examples.
  • Explain the roles of the random numbers in the use of encryption for the security of web applications.
  • Provide at least two references to support your initial post.

Assignment and Discussion

 

Week 9 – Discussion

In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability. 

 

Internet Research – Wk 9

For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed. 

 

Week 9 Discussion – The Remote Worker

 In no less than 250 words, describe a solution to securely connect a remote worker from their home and connected to the Internet to their company network.  How does this solution work and what is needed on the company network and the remote worker’s network to accomplish your solution?  Respond to two other learners by the end of the week. 

   

Week 9 Assignment

  • 9.1 Give examples of applications of IPsec.
  • 9.2 What services are provided by IPsec?
  • 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
  • 9.4 What is the difference between transport mode and tunnel mode?
  • 9.5 What is a replay attack?
  • 9.6 Why does ESP include a padding field?
  • 9.7 What are the basic approaches to bundling SAs?
  • 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?

Intro To Data Mining – Discussion

  

Raw data is often dirty, misaligned, overly complex, and inaccurate and not readily usable by analytics tasks. Data preprocessing is a data mining technique which is used to transform the raw data in a useful and efficient format.

The main data preprocessing steps are:

•          Data consolidation

•          Data cleaning

•          Data transformation

•          Data reduction

  1. Research each data preprocessing step and      briefly explain the objective for each data preprocessing step.  For      example, what occurs during data consolidation, data cleaning, data      transformation and data reduction?
  2. Explain why data preprocessing is      essential to any successful data mining.  Please be sure to provide      support for your answer.

Module 4 – Discussion Questions

1.  Using the IT infrastructure security design you created in Module 1, list the five “highest” risks that you would consider a major incident to the Confidentiality, Integrity and Availability (C.I.A. Triad) of processing data between the data centers.  Include the reasons why you chose each of the five risks. 

2.  The strategies to manage and/or mitigate risks include 1) transferring the risk to another party, 2) avoiding the risk, 3) reducing the negative effect of the risk, and 4) accepting some or all of the consequences of a particular risk.  Using the five highest risks you identified in Discussion Question 1, choose one of the strategies to manage and/or mitigate risk for each of the five highest risks you chose.  Include your reason why you chose the strategy for each of the five risks.

2.  The strategies to manage and/or mitigate risks include 1) transferring the risk to another party, 2) avoiding the risk, 3) reducing the negative effect of the risk, and 4) accepting some or all of the consequences of a particular risk.  Using the five highest risks you identified in Discussion Question 1, choose one of the strategies to manage and/or mitigate risk for each of the five highest risks you chose.  Include your reason why you chose the strategy for each of the five risks.  

PLEASE CHECK FOR GRAMMATICAL ERRORS. DON’T USE BOOKS OR JOURNALS AS REFERENCES.