Assignment – Database Security

Write an essay of at least 500 words discussing the use of encryption to protect data at rest, in motion, and in use.    

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  

https://www.zdnet.com/article/encrypting-data-at-rest-is-vital-but-its-just-not-happening/

https://digitalguardian.com/blog/data-protection-data-in-transit-vs-data-at-rest

https://docs.microsoft.com/en-us/azure/security/azure-security-encryption-atrest

https://www.datamotion.com/2015/12/best-practices-securing-data-at-rest-in-use-and-in-motion/

https://www.youtube.com/watch?v=5DsnvMkGLS4

Transparent Data Encryption

https://www.youtube.com/watch?v=8DNx4s8q-8E

Homomorphic Encryption

https://www.youtube.com/watch?v=NBO7t_NVvCc

https://www.youtube.com/watch?v=Kfwo-S2jZv4

PLEC Week 3

  Answer Each question in 2-3 lines with in line satiations 

 

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 

10. How many public cameras is too many? 

project

group 9 : Clustering with correlation coefficient

This presentation / project is about correlation coefficients used as the clustering measure.

File needed to see the correlation coefficients and bi-monthly returns:

returnAstcBiMonthlyEG1.mat

Address in the presentation the following:

1) Given correlation coefficient from https://mathworld.wolfram.com/CorrelationCoefficient.html

A) What is the meaning of correlation coefficient between the two set of stocks prices?

B) Show why the correlation coefficient between the set of prices A and set of prices B is the same as the correlation coefficient between the set of prices B and set of prices A.

2) After loading returnAstcBiMonthlyEG1.mat in Octave, you’ll have stocks with bi-monthly returns of above 0.009 : 

CC -> correlation coefficients between the stock returns,
RTRS ->  bi-monthly returns (rows) for 412 stocks (columns)

A) Comment the correlation coefficients based on bi-monthly returns among 412 stocks shown in the figure  P5_CC_eg1.pdf

B) Assuming that clusters are created by putting all the stocks whose correlation coefficients among all the pairs are greater than 0.5, comment on the following cluster distribution : 302 clusters with only 1 stock,  28 with 2 stock,  6 with 3,  4 with 4, 1 with 5,  1 with 6 , and  1 cluster with 9 stocks in it.

C) Explain why it would be good to pick just one stock from the cluster for the diversified portfolio.

Computer Security

 

Instructions

In order to complete assignment #2 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #2). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 2

  1. For apps to be featured on the iPhone, developers must build it with Apple’s software development kit and then apply for approval. Apple rejected the Google Voice iPhone App, and further stated that it would not accept any applications that incorporated Google Voice functionality. Apple reasoned that this app duplicates the phone’s core features. It also rejected Google’s location-based app Google Latitude. If you were developing a collaborative platform, do you think the best model is this collaborative model, or is the open innovation model better – if your main goal is to maximize innovation? What if your main goal is to make money?

Chapter 3
2.Plaintiffs filed a class action lawsuit against investment banks alleging that they inflated prices on more than 300 IPOs, causing IPO investors to overpay for stock, and unlawfully benefited these banks through overcompensation of banking commissions and profits made through quick sales of this stock in their own accounts before prices settled into a more realistic valuation. How would you combat such abuses going forward?

3. Read the following laws and articles:

1. The Computer Security Act of 1987

2. The Patriot Act.

3. Jaeger, P. T., McClure, C. R., Bertot, J. C., & Snead, J. T. (2004). The USA PATRIOT Act, the Foreign Intelligence Surveillance Act, and information policy research in libraries: Issues, impacts, and questions for libraries and researchers. The Library Quarterly, 74(2), 99-121.

4. Politics

Discuss the relationship and impacts of CSA, USA PATRIOT ACT, and FISA. Also discuss the current status of these laws and the replacement of these laws.

Differences & Similarities Between Windows, Linux and Mac (infographic, table, or chart listing)

Create an infographic, table, or chart listing the similarities and differences between Windows, Linux, and the MAC OS X.  Include the following areas: Functionality, Graphical User Interface, Security, User Access, Encryption, etc. Include an introductory paragraph describing your graphic, table, or chart. 

Feel free to be creative in how you develop this assignment. You can complete this using any application you have available, such as Word, PowerPoint, Visio, etc. Your submission should have proper attention to formatting, spelling, grammar, and punctuation. It should be in a format easily viewed on a standard Windows PC.

Business Intelligence Week7 Assignment

Need 6-7 pages atleast including 2 pages of section1 , 3 pages of section#2 and  2 pages of conclusion Section 3&4 

Paper Section 1: Reflection and Literature Review

Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research that details what you have learned from chapters 13 and 14.  This section of the paper should be a minimum of two pages. 

Paper Section 2:  Applied Learning Exercises

In this section of the professional paper, apply what you have learned from chapters 13 and 14 to descriptively address and answer the problems below.  

  1. Go to cloudera.com, MapR.com, hortonworks.com, or marklogic.com or in combination to find at least three customer case studies on Hadoop implementation, and then discuss the commonalities and differences of these cases.
  2. Search the job search sites like monster.com, careerbuilder.com, and so forth. Find at least five job postings for data scientist. Identify the key characteristics and skills expected from the applicants and based on what you are learned in this class, how high is your motivation now to seek these types of career choices?

Paper Section 3:  Conclusions (Part 1)

After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward.  

Paper Section 4:  Overall Course Conclusions and Reflection (Part 2)

After the primary conclusion of this paper, extend this conclusion into an overall class conclusion and reflection providing at least 500 additional words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current or future work environment. 

Q1

Topic: Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.

Instructions: Please follow the Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. 

For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. 

preemptive scheduling

 We have been assuming in chapter 3 that preemption incurs no over head. Let us now relax this assumption. Consider a 2 task system. Preemption overhead is x. Given e1 , e2 , P1 , P2 , obtain the maximum value of x for which the two tasks are RM schedulable. Note: e1, e2 are execution times. P1, P2 are periods.