Ethical hacking assignment

All this files might be helpful.  I need project two done. I have done project one already. I have attached the template for project 2. You can also check what I did in project one and the comments of the professor. You can make it 3pages 

Data mining

   Part1) What are the privacy issues with data mining? Do you think they are substantiated? 

   225 Words + 2 References

   Part2) 

   a) Define data mining. Why are there many names and definitions for data mining?

   b) What are the main reasons for the recent popularity of data mining?

   c) Discuss what an organization should consider before making a decision to purchase data mining software.

   d) Distinguish data mining from other analytical tools and techniques.

   e) Discuss the main data mining methods. What are the fundamental differences among them?

   Min 180 words answer for each question in part 2.

Checklist:

APA Formatting

Part1 and Part2 needs to attached as two separate docs

Atleast 2 references for each part

Plagiarism report

Insider Threat

In 80 words or more review and discuss the following link.

https://www.infosecurity-magazine.com/opinions/accidental-insiders-serious-threat/

NS-13-D

explain the different security measures that each version of SNMP uses.  What is the different between SNMPv1, v2c and v3?  300 word

Microsoft Access Data Queries

  

Part 2

Software skills: Database design and querying

Business skills: Inventory management

In this exercise, you will use database software to design a database for managing inventory for a small business. Kamen Rider, located in New York, sells road, mountain, hybrid, leisure, and children’s bicycles. Currently, Kamen Rider’s purchases bikes from three suppliers but plans to add new suppliers in the near future. Using the information found in the tables given in the small desktop database, help manage information about Kamen Rider’s suppliers and products. Perform the following.

1. Execute a query that identifies the five most expensive bicycles (for customers). The query should list the bicycles in descending order from most expensive to least expensive (by Selling Price), the quantity on hand for each, and the markup percentage for each. Save this query as Q1_Five_Most_Expensive_Bicycles. Hint: Profit Mark Up = (Selling Price – Cost Price)/Cost Price. (2.5 points)

2. Execute a query that lists each supplier, its products, the quantities on hand, and associated reorder levels. For each supplier, the products should be sorted alphabetically. Include a criterion for bicycles that have Quantity_on_Hand that is more than 5. Hint: This requires hierarchical sorting and a numerical filter. Save this query as Q2_Supplier_Product (2.5 points)

3. Execute a query listing only the bicycles with names starting with “E” as well as those that end with “er”, and their corresponding suppliers. In your query, include the Product Name, Purchase Cost, and the supplier’s Company_Name. This needs a little bit of thinking. Save this query as Q3_BR_bicycles (2.5 points).

4. To enhance the database, we need a table of supplier information. Create a table called Supplier_Info that has supplier telephone numbers. For full credit here, include an appropriate input mask. Populate the table with the appropriate fields. Populate the table with the suppliers to demonstrate our ability to enter data to a database and to check that it works. Be sure to enter all suppliers (there should be 5). Make up the telephone numbers. This requires some thinking on what field(s) to include other than telephone numbers in the new table. Recall that databases should be normalized, and we should join apples to apples, oranges to oranges; and we want to avoid redundancies. For purposes of this assignment, create the table accordingly. There’s no need to join other tables. Save this table as Supplier_Info (2.5 points).

Your work will be evaluated on the accuracy of the results, quality of your answers, and ability to apply the concepts. Submit your work on Canvas. There should be 2 documents: (1) a single word document (or pdf) for part 1, and (2) the database file (Access file) for part 2 by the due date. Late submissions will result in a 5% penalty for each day late.

Methodology used on topic

   Try to find a quantitative, a qualitative and a  mixed-method dissertation that may be closely related to   Cloud migration and data security as key indicator in e-commerce and business success topic. Describe the method used, the sample, the population chosen, was there a survey involved, or a set of questions asked as in a qualitative study. Finally, can you identify the problem the dissertation tried to examine.   

portfolio assignment

 

This week’s written activity is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” (2-3 pages): Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing. 

Prompt 2 “Big Data” (2-3 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology? 

Prompt 3 “Green Computing” (2-3 pages):  One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 7-10 pages long, including both a title page and a references page (for a total of 9-12 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately seven to ten pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course, the course textbook, and at least three scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing

Linux Implementation Proposal: Client Response Memo

 

Faster Computing was impressed with your presentation. The company is interested in moving forward with the project, but the senior management team has responded to the presentation with the following questions and concerns:

(12.3.2: Describe the implementation of controls.)

  • How will security be implemented in the Linux systems—both workstations and servers?

(10.1.2: Gather project requirements to meet stakeholder needs.)

  • End users have expressed some concern about completing their day-to-day tasks on Linux. How would activities such as web browsing work? How would they work with their previous Microsoft Office files?

(12.4.1: Document how IT controls are monitored.)

  • The current Windows administrators are unsure about administering Linux systems. How are common tasks, such as process monitoring and management, handled in Linux? How does logging work? Do we have event logs like we do in Windows?

(2.3.2: Incorporate relevant evidence to support the position.)

  • Some folks in IT raised questions about the Linux flavor that was recommended. They would like to see comparisons between your recommendation and a couple of other popular options. What makes your recommendation the best option?

(10.1.3: Define the specifications of the required technologies.)

  • How does software installation work on Linux? Can we use existing Windows software?
  • How can Linux work together with the systems that will continue to run Windows? How will we share files between the different system types?

The deliverable for this phase of the project is a memo. There is no minimum or maximum page requirement, but all of the questions must be fully answered with sufficient detail. The recommended format is to respond to the questions in a bulleted format. Provide sufficient detail to fully address the questions. You must cite at least two quality sources.

(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)

Create a memorandum template with a header of your own design or choosing, brief introduction, addresses Faster Computing, Inc’s questions, and summarizes your position on adopting the specific version of Linux.

(1.4.3: Write concise and logical sentences in standard academic English that clarify relationships among concepts and ideas.)

Your memorandum should not include spelling or grammatical errors. Any Linux commands must be displayed in lower case. Information technology acronyms (e.g., SSH or FTP) should be explained for the reader.

Organ Leader & Decision Making (reflection)

  

This discussion topic is to be reflective of the course material.  Therefore, use your own words to respond to the following questions:

1. What other topics would you have liked to have covered in this course?

2. What reading did you find most interesting and why?

3. How has this course changed your perspective or outlook moving forward?

4. Any other topic of interest that you would like to add.