cybersecurity

 

Describe PCI-DSS.

Specifically:

– What is it?

– Who must comply with it?

– How is it enforced?

– What are some gaps that are not addressed by PCI-DSS?

 Must be at least 400 words. It must include sources/references.

assignment

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Discussion

Answer the four questions noted below.  Please use at least one reference and ensure it’s in APA format (as well as the in-text citation).  Also, ensure to NOT COPY DIRECTLY from any source (student or online source), rather rephrase the author’s work and use in-text citations were necessary.

Describe the CIA triad and the defense in depth principle? Why are those concepts important when designing your network security strategy?

What are the steps for an incident response plan? How does network security play into an incident response plan? 

What are some major differences between open source and commercialclosed source software and solutions? Should you consider one over the other? 

What are firewalls? What are VPNs? What are some alternatives to a traditional firewall? What are some alternatives to traditional VPNs? How does the alternatives improve the traditional version of both?

Note: The essay should include an APA cover page and at least two references (academic or professional literature) in APA v7 format.

Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation been avoided?

 Please write 350 words essay. 

Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software – that will give them access to your passwords and bank information as well as giving them control over your computer.

Explain a scenario where you or someone you know may have unknowingly given too much personal information to a stranger. How could this situation  been avoided?

Reference Article Link: 

https://www.webroot.com/us/en/resources/tips-articles/what-is-social-engineering

bi10 work

1. What is Big Data? Why is it important? Where does Big

Data come from?

2. What do you think the future of Big Data will be? Will

it lose its popularity to something else? If so, what will

it be?

3. What is Big Data analytics? How does it differ from regular

analytics?

4. What are the critical success factors for Big Data

analytics?

5. What are the big challenges that one should be mindful

of when considering implementation of Big Data

analytics?
6 . At teradatauniversitynetwork.com, go to the Sports

Analytics page. Find applications of Big Data in sports.

Summarize your findings.

Need 2 pages
be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).

mad discussion

 From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Milestone 3 for project for online food ordering system

 Milestone 3: Design Modeling – Due 11/11 

The Design Modeling part should contain the following components: 

a. Final Class Diagram (see page 299, fig 8-15 (5th Ed))

 b. Package Diagram (see page 267, fig 7-21 (5th Ed)) 

c. Database Design (see page 353, fig 9-16 (5th Ed))

 d. Data Access and Manipulation Design (see page 358, fig 9-21 (5th Ed)) 

Practical connection assignment

Assignment:

Subject: InfoTech Import in Strat Plan
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

Discussion

Discussion 4 – What is the role of NLP in text mining? Discuss the capabilities and limitations of NLP in the context of text mining.

Internet Exercise 7 – Go to kdnuggets.com. Explore the sections on applications as well as software. Find names of at least three additional packages for data mining and text mining.

Needs to be APA 7 formatted

APA Sources *

*Full PDF *

https://apastyle.apa.org/products/publication-manual-7th-edition-introduction.pdf?_ga=2.183019553.642115030.1600870599-379008561.1600870599

Sample Paper 

https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/apa_sample_paper.html

*APA 6 vs APA 7 *

https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/apa_changes_7th_edition.html