RSA Applications

 

You have taken courses in the key encryption created by Rivest, Shamir, and Adelman (RSA) and have identified that many of the associated applications that they offer could benefit the corporation in cryptography.  You have been asked to present your recommendation for an RSA application to the Board of Directors to consider purchasing at least two of their associated applications, and you know that you must present a strong case for such a purchase. 

  • Research the RSA associated applications and identify the associated benefits and costs. 
  • Your multimedia presentation must be a minimum of 15 slides with a minimum of four supporting APA references.  
  • Include charts and graphs if they support your recommendation

Research Project #1 Project 1: VEEM and Blockchain Technologies Transforming Global Marketing (Due within 5hours)

 

Project 1: VEEM and Blockchain Technologies Transforming Global Marketing 

Due 11PM EST Friday Evening Session

2 Parts: 4-5 page paper & accompanied 8-12 slide power point.

  • Paper: Must be APA format, 12 pt font, Times New Roman, with title page and references page. Minimum 2-3 references. Title page and References page do NOT count towards minimum.
  • Power Point: Is a summary presentation overview of paper, with additional charts/graphs to help demonstrate your insights on the topic.  Any template is fine to use.

Directions:

Submit a 4-5 page paper (APA style) and accompanying power point presentation that addresses how VEEM and Blockchain will transform global marketing. You may use a company of choice to use as an example to help guide your discussion in how that company leverages VEEM and Blockchain to expand and transform their global marketing efforts.  Answer the following questions in your paper and power point.

1) Define how VEEM and Blockchain is expanding the global marketing efforts of companies

2) In your company of choice, who are they, are how do you think they use Blockchain and VEEM technologies to operate their digital marketing efforts?

3) How does this company use those technologies to expand globally their marketing efforts?

4) What challenges do companies in general face when it comes to implementing these technologies for their marketing efforts?

5) What forward thinking 1-2 key strategies do you think this company and their industry can implement to be competitive in the global marketing landscape?

You can use magazines, company websites, journals, news articles, interviews etc, to research and uncover your information.  There is no exact right or wrong answer to the questions on the strategies and challenges you think face that company and their industry, as long as your supportive research supports your thoughts. Looking for more what you think based on the research conducted. 

Required Practical Connection Assignment

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
 

IA week7 DB

 

Hello,

i need this paper by 10/07 afternoon.

Strictly No plagiarism please use your own words.

Describe some ways that an administrator can harden a system on a network.

An initial post must be 300 words 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Exploratory Data Analysis

After the data is collected, we perform exploratory data analysis using simple visualization methods to gain a better understanding of the data that we will be working with during the analytical process.

In this critical thinking assignment, you will use the results from the preliminary data analysis that you completed in the previous week and use R and Tableau to investigate the variables of interest to the research questions.

R can be downloaded free from the closest mirror servers in Turkey: either https://cran.pau.edu.tr/ or https://cran.ncc.metu.edu.tr/.

Here is the list of all mirrors: https://cran.r-project.org/mirrors.html

Tableau for Students can be downloaded free here: https://www.tableau.com/academic/students.

Students will need to apply for a student license (and extend when it expires): https://www.tableau.com/academic/students#form

Scenario:

Continuing with the scenario you selected for your assignment last week—Titanic or Telecom Customer Churn—complete the following requirements. You will be utilizing some of your previous work in this assignment.

Requirements:

Part I: Contextualization

In the Introductory section of your report, provide a contextualization of the dataset by doing the following:

  1. Specify the selected dataset.
  2. Summarize the three research questions you have constructed.
  3. Summarize the findings from the preliminary data analysis.
  4. For each research question, identify the target (dependent) and predictor (independent) variables.

Part II: Statistical Description

  1. Write an R script that uses the summary() method to generate the statistical descriptions of the variables in the data subset. Capture the outcome from the R code.

Part III: Univariate Analysis

  1. Write an R script to count the different values of each relevant variable (column) in the dataset(s).
  2. Use the counts calculated for task prompt E to generate a histogram for each variable in Tableau.
  3. Summarize the findings from the inspection of the histograms that support the univariate distribution analyses.

Part IV: Bivariate Analysis

  1. Select appropriate visualization formats to depict the relationship between the target and the predictor variables.
  2. Summarize the observations from the visual inspections of the visualizations completed in task (a).

Part V: Outliers

  1. Describe the outliers in the dataset(s). Provide the calculations used to identify them using any tool and method of choice.

Part VI: Reporting

  1. Write a detailed APA-formatted report that summarizes the findings from the Exploratory Data Analysis for an audience of data analyst peers. Include details on the methodology and tools and support the findings with appropriate visualizations and screenshots of outputs from the use of the software tools.

Please respond to each of the task prompts organized by the Parts of the assignment. Your work for parts I-V should be total of 3-4 pages (approximately 1 page per part).

The report required for task prompt VI is a stand-alone document that will organize some of the elements of the responses to the other task prompts in a professional report that summarizes your actions, code, and findings and should not exceed 3 pages.

You will upload a zipped file that includes the responses to the task prompts your report, and all supporting files, including the R code and Tableau files.

Use Saudi Electronic University academic writing standards and APA style guidelines, citing at least two references in support of your work, in addition to your text and assigned readings. Include a title and reference page.

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.

EH week4 DB

Hello,

i need this paper by 09/16 afternoon.

Strictly No plagiarism please use your own words.

Cryptography is used to protect confidential data in many areas. Chose one type of cryptography attack and briefly explain how it works (examples include: ciphertext-only attack, known-plain-test attack, chosen-plaintext, chosen-ciphertext attack, timing attack, rubber hose attack, adaptive attack).

Write a 300 words paper.

Strictly No plagiarism

Penetration Testing Report

Prepare a plan to conduct a complete penetration testing on one or two targets.  Create a professional and well-formatted Penetration Testing Report of 5 to 10 pages following industry recommended guidelines.

For your assignment, please address the following:

  • Task 1: Best Practices are discussed in the report
  • Task 2: A planning and Pre-Attack phases are clearly addressed
  • Task 3: The Attack and Post-Attack phases are clearly addressed
  • Task 4: A Summary Conclusion and Recommendations sections are included.