Data Science & Big Data Analy

 There are several benefits as well as challenges associated with the use of Big Data Analytics in the e-Healthcare industry. Pick one of the four concepts below and then identify the benefits and challenges associated with that concept. Do not simply list the benefits and challenges but detail them in a substantive, thorough post as it relates to that concept in the e-healthcare industry.

  • Data Gathering
  • Storage and Integration
  • Data Analysis
  • Knowledge Discovery and Information Interpretation

 requirements

  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

700 words

CIS 220, Business Information Systems and Analytics

  The databases for this assignment (MBA and IT 100 v4) and the Database II Answers Excel spreadsheet are available on Blackboard and should already be in your CIS 220 folder if you are using Microsoft Access through the virtual machine. ALSO NOTE: You should submit both databases with the queries labeled as specified below AND the Database II Answers spreadsheet, with your answers filled in in the appropriate cell. 

Emerging threats_4.2

Discussion: 

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

At least two scholarly sources should be used in the initial discussion thread. Be sure to use information from your readings and other sources. Use proper citations and references in your post.

Week 12 assignment

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

BI Week 15 Assignment

Complete the following assignment in one MS word document:

Chapter 13- discussion question #1-4 & exercise 3 & 4 & 6

When submitting work, be sure to include an APA cover page and include at least two APA formatted eferences (and APA in-text citations) to support the work this week. All work must be original (not copied from any source).

Discussion 1. Compare the IoT with regular Internet.

Discussion 2. Discuss the potential impact of autonomous vehicles on our lives.

Discussion 3. Why must a truly smart home have a bot?

Discussion 4. Why is the IoT considered a disruptive technology?

Exercise 3. AT&T is active in smart city projects. Investigate their activities (solutions). Write a summary.

Exercise 4. It is said that the IoT will enable new customer service and B2B interactions. Explain how.

Exercise 6. Find information about Sophia, a robot from Hanson Robotics. Summarize her capabilities.

OE Case Paper: IT Governance and Security Culture

Week 6 case paper-IT Governance and Security Culture

 

Week 6 case paper: IT governance and security culture

85 Points Possible                                                    

APA format is required – USE THE APA 7 TEMPLATE.

Building on your case project, for week 6 you will research best practices in IT governance and methods for building an IT security culture within the organization. Follow the video links provided and research ITIL and COBIT systems, and determine which may best work for your organization. If your organization already utilizes one of these systems, describe how it has been deployed and what the impacts have been on the organization overall. In addition, following the required reading for this week, evaluate the importance of establishing an IT security culture within your organization, and describe your basic plan for getting started. If your organization already employs best practices in security culture, describe what they do and how it works.

Your paper should be 2-3 pages (not including the cover page or final references page), including in-text headings for the topics addressed, and in-text citations matching the references given at the end of the paper.

 

ITIL Beginners Guide 2020 – Learn fundamentals of ITIL Certification | Hot on YouTube

 

Introducing COBIT® 2019

Linux System Scan

 

As part of your Vulnerability Management project last week, you analyzed a report on a Windows system within the company network vulnerable to the MS17-010 exploit. That report was created using OpenVAS, a free vulnerability scanner designed to run on Linux operating systems (https://www.openvas.org/). Now that you’ve examined a vulnerability assessment report for a Windows machine, it’s time to see what the same tool produces from a Linux system. OpenVAS was used to scan a Linux machine on the network running the company’s database applications. This machine is using an older version of Linux because the company’s database applications are not supported with the latest Linux shared libraries. This system contains critical data and cannot be taken offline.

Your analysis of these two reports should provide you with a good understanding of the OpenVAS tool and the reports you will encounter in the workplace. The report used for this discussion limits the scope to a single host to allow you to focus on the vulnerabilities you would encounter on a Linux machine in the workplace. You will also be able to compare/contrast the vulnerabilities across the two OS platforms.

You will analyze the results from a commercial VM scanner. You’ll be better prepared to assess the output from the two different vulnerability scanning tools and to form the basis of your recommendation to management.

Review Report of Linux Server (OLD) and answer the following questions in your response:

1. For this Linux system, what do you recommend fixing right away? Are there dangers if the vulnerabilities and associated threats are not fixed?
2. How do you fix the problem(s) identified? Can you defer mitigation for another time? How can the problem(s) be fixed if the system cannot be taken offline?

Judy is considering asking the pen tester to rescan the company systems using the commercial tool, Nessus. The organization has an evaluation version that can be used for 30 days. After that, the company will need to purchase the tool. The cost is significant.

3. Since some machines were already scanned with OpenVAS, should you also consider scanning the same systems with Nessus? Why or why not?
4. Conduct open source research using the internet. Roughly, what is the cost to license Nessus for one year?

MIPS

 Create a MIPs program to simulate playing multiple games of “Craps” (a popular casino game) to determine an approximate winning percentage.: To simulate throwing two independent dice, you need to get two random numbers in the range of 1 to 6 and add them together. Do not get a single random number in the range of 2 to 12, as each value will not reflect the odds of rolling a particular number 

TCP/IP routing protocols

The term paper for this class is worth 200 points, and it requires you to do a research and write a 2000-2500 word paper describing  RIPv2 Protocol

 The paper will include the following:

  • The paper must have a distinct and well written Introduction, Supporting Body and Conclusion; 
    • In the body include the following 
      • The history of the protocol chosen;
      • The programmable parameters of the protocol and how they affect traffic flow;
      • The major differences between the routing protocol chosen and the others that were not chosen;
      • How the chosen protocol can be used in a modern day routed network environment.
  • ·  Site at least two advantages and two disadvantages, of your chosen routing protocol subject

·  Site at least two of the most common programmable parameters of the protocol, and how they affect traffic flow

·  Discuss the major differences between the routing protocol chosen and all others that were not chosen

In the Conclusion of your Paper 

·  Discuss how your chosen protocol can be used in a modern day routed network environment. (seen in Conclusion)

Paper Sections:

Description: Your Paper MUST contain the following sections. 

* Title Page

 – Title of Paper

 – Author

 – Class

 – Professor

* Introduction

* Body

 – Support Introduction 

 – Elements (see above)

 – History

 – Advantages/Dis-advantages

 – Two Programmable Parameters

 – How do they effect traffic flow

 – Compared your chosen Protocol to all Routing Protocols we have studied

* Conclusion

 – Your Opinion of selected Routing Protocol

 – A Summary

 – Modern Day Usage