Check this one question below if you can solve it. I have solved some of them but will need an expert because I’m a lil behind.
Excel Assignment
dues in 24 hours
EH week4 DB
Hello,
i need this paper by 09/16 afternoon.
Strictly No plagiarism please use your own words.
Cryptography is used to protect confidential data in many areas. Chose one type of cryptography attack and briefly explain how it works (examples include: ciphertext-only attack, known-plain-test attack, chosen-plaintext, chosen-ciphertext attack, timing attack, rubber hose attack, adaptive attack).
Write a 300 words paper.
Strictly No plagiarism
Artificial Intelligence In Health Information Systems
Write research paper “How will artificial intelligence affect politics?” using evidence. (Annotated bibliography)
Resources
NY Times Science Section
Google Scholar
Online technology publications
TED Talks
YouTube Videos
Penetration Testing Report
Prepare a plan to conduct a complete penetration testing on one or two targets. Create a professional and well-formatted Penetration Testing Report of 5 to 10 pages following industry recommended guidelines.
For your assignment, please address the following:
- Task 1: Best Practices are discussed in the report
- Task 2: A planning and Pre-Attack phases are clearly addressed
- Task 3: The Attack and Post-Attack phases are clearly addressed
- Task 4: A Summary Conclusion and Recommendations sections are included.
Week#1 Discussion
After reading the article this week, and any other relevant research you locate, please discuss the following:
Please summarize, in your own words, a description of enterprise risk management. Why do you feel ERM is different from traditional risk management?
Questions Need to be Completed in 10 hours
1. (250 words)
Before an organization considers scaling, it should understand the organizational system performance and potential system bottlenecks. Web Page Test (https://webpagetest.org/) is a site evaluator that creates a detailed report. The report helps identify images that can be further compressed and the impact of the systems cache, as well as potential benefits of compressing text.
Use WebPagetest to evaluate two or more websites. In one page, discuss how the report’s findings align with your user experience.
The paper must adhere to APA guidelines including Title and Reference pages. The Title and Reference pages do not count towards the page count requirement. There should be at least one scholarly source listed on the reference page. Each reference cited in the text must appear in the reference list, and each entry in the reference list must be cited in text. APA requirements for this class include:
- A title page
- 12-point Time New Roman font
- Your paper should be typed and double-spaced with 1″ margins on all sides
- The first sentence of each paragraph should be indented one tab space
- All papers should contain the page number, flush right, in the header of every page. Use the automatic page-numbering function of your word-processing program to insert page numbers in the top right corner; do not type page numbers manually.
- APA 7th edition in-text citations
- Reference page
2. (250 words)
This week’s assigmnet is based on Chapter 6 & 7. Please complete the following assignment. You should have acquired the require text book for course.
Week 5 Assignment .pdf (Please Find attached Document)
3. (250 words)
Some partitional clustering algorithms that automatically determine the number of clusters claim that this is an advantage. Using your required textbook, Chapters 6 & 7 as a guide, discuss two (2) situations in which this is not the case.
PLEASE PROVIDE PAGE NUMBER from your textbook in your citation.
create Crisis Management Plan
1. Introduction – brief background of company and any issues the company has had in the past such as data breaches-
2. Strategies and Management – business activities, risk factor activities, reactive risk mitigation strategy, risk management, financial performance (more or less depending upon company)
3. Risk Analysis – political analysis, environmental analysis (more or less depending upon company)
4. Crisis Management Plan:
a. Purpose
b. Committee for crisis management planning
c. Crisis types
d. Structure of the Crisis Management Team
e. Responsibility and control
f. Implementation Plan
g. Crisis Management Protocols
h. Crisis Management Plan Priorities
5. Conclusion
6. You must have a total of 10 unique references.
7.. The paper must be in APA format.
8. There is a MINIMUM of 15 pages, required, and does not include references or title page.
9. Limit pictures, diagrams, charts, and graphics to no more than 2 pages in total.
ARTIFICAIL INTELLIGENCE
You will argue that health care’s increasing reliance on artificial intelligence will have a negative effect on health and society.
Present your assigned case against artificial intelligence in a PowerPoint presentation with speaker notes
At minimum, address each of the following elements.
· Explain how artificial intelligence is used in health care.
· Analyze how artificial intelligence and related technologies are effecting change in health care.
· Compare and contrast clinical decision support systems in terms of implementation of artificial intelligence.
· Examine the legal and ethical considerations of the use of artificial intelligence in health care.
· Summarize the key points supporting your point of view within your slides, adding additional detail within your speaker notes.
InfoTech Import in Strat Plan (ITS-831)
Course name: InfoTech Import in Strat Plan (ITS-831)
Discussion Topic: Physical Security
Word Count: 300+ words
Discuss an organization’s need for physical security. What methods, approaches, and models can be used by organizations when designing physical security needs? Lastly, explain how these security measures will safeguard the organization.
Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
At least one scholarly source should be used in the discussion. Be sure to use information from your readings and other sources. Use proper citations and references in your post.
Reading resources:
Chapter 7, “Security”. Managing and Using Information Systems, Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta, John Wiley & Sons
Chapter 7, “Security”. Khelf, R., & G-Z, N. (2018). IPsec/Firewall Security Policy Analysis: A Survey. 2018 International Conference on Signal, Image, Vision, and Their Applications (SIVA), 1. Retrieved from https://doi.org/10.1109/SIVA.2018.8660973
plagiarism check required, Good work, APA format, within 8hrs