Security Conscious & Architecture

Briefly respond to all the following questions. Make sure to explain and back up your responses with facts and examples. This assignment should be in APA format.

1) As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations? (Minimum 600 Words – at least two references)

2) How should cache handling be accomplished in order to minimize the ability of the attacker to deliver a payload through the cache? (Minimum 600 Words – at least two references)

security architecture 11

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references 600 words .

One of the big challenges with cloud-based reputation checks is performance. Users do not typically want to wait a few seconds while the reputation of potential URLs is checked. Most of us have come to expect that websites are at the immediate tips of our fingers and that access and loading of the content should take place rapidly and immediately. This presents a tricky security problem. Since the reputation service exists in the cloud, the challenge can be summed up as, “How can a reputation be securely retrieved without slowing Web access down so much as to create a poor user experience?”

journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization

 

This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:

  1. How do trustworthy and ethical leaders enhance knowledge sharing in organizations?  How does this impact the rate of information technology implementations?  How does this impact data management within organizations? 
  2. How does servant leadership assist with transferring knowledge in an organization?
  3. When thinking about data analytics, how does transformational leadership assist with building good data structures?

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

essay 1 page

Do a research on comparing Window phone to other phones and their significance or their shortcomings to other phones also need to know how windows products are easier or harder to create Apps to comparing to other MOBILE devices

Remarks:

– about 1 full-page

– normal English skill, no need advanced

– need it within 20Hrs

Name the basic constructs of an ensemble model. What are the advantages and disadvantages of ensemble models?

Please a topic from the below list and create a one-page essay answering the question noted below. 

Please use at least one reference and ensure it’s in APA format  (as well as the in-text citation).  Also, ensure to NOT COPY DIRECTLY  from any source (student or online source), rather rephrase the author’s  work and use in-text citations were necessary.

  • Name the basic constructs of an ensemble model. What are the advantages and disadvantages of ensemble models?
  • List and briefly describe the nine-step process in conducting a neural network project.
  • What is the main difference between classification and clustering? Explain using concrete examples.
  • What are the privacy issues with data mining? Do you think they are substantiated? 

Exploratory Data Analysis

After the data is collected, we perform exploratory data analysis using simple visualization methods to gain a better understanding of the data that we will be working with during the analytical process.

In this critical thinking assignment, you will use the results from the preliminary data analysis that you completed in the previous week and use R and Tableau to investigate the variables of interest to the research questions.

R can be downloaded free from the closest mirror servers in Turkey: either https://cran.pau.edu.tr/ or https://cran.ncc.metu.edu.tr/.

Here is the list of all mirrors: https://cran.r-project.org/mirrors.html

Tableau for Students can be downloaded free here: https://www.tableau.com/academic/students.

Students will need to apply for a student license (and extend when it expires): https://www.tableau.com/academic/students#form

Scenario:

Continuing with the scenario you selected for your assignment last week—Titanic or Telecom Customer Churn—complete the following requirements. You will be utilizing some of your previous work in this assignment.

Requirements:

Part I: Contextualization

In the Introductory section of your report, provide a contextualization of the dataset by doing the following:

  1. Specify the selected dataset.
  2. Summarize the three research questions you have constructed.
  3. Summarize the findings from the preliminary data analysis.
  4. For each research question, identify the target (dependent) and predictor (independent) variables.

Part II: Statistical Description

  1. Write an R script that uses the summary() method to generate the statistical descriptions of the variables in the data subset. Capture the outcome from the R code.

Part III: Univariate Analysis

  1. Write an R script to count the different values of each relevant variable (column) in the dataset(s).
  2. Use the counts calculated for task prompt E to generate a histogram for each variable in Tableau.
  3. Summarize the findings from the inspection of the histograms that support the univariate distribution analyses.

Part IV: Bivariate Analysis

  1. Select appropriate visualization formats to depict the relationship between the target and the predictor variables.
  2. Summarize the observations from the visual inspections of the visualizations completed in task (a).

Part V: Outliers

  1. Describe the outliers in the dataset(s). Provide the calculations used to identify them using any tool and method of choice.

Part VI: Reporting

  1. Write a detailed APA-formatted report that summarizes the findings from the Exploratory Data Analysis for an audience of data analyst peers. Include details on the methodology and tools and support the findings with appropriate visualizations and screenshots of outputs from the use of the software tools.

Please respond to each of the task prompts organized by the Parts of the assignment. Your work for parts I-V should be total of 3-4 pages (approximately 1 page per part).

The report required for task prompt VI is a stand-alone document that will organize some of the elements of the responses to the other task prompts in a professional report that summarizes your actions, code, and findings and should not exceed 3 pages.

You will upload a zipped file that includes the responses to the task prompts your report, and all supporting files, including the R code and Tableau files.

Use Saudi Electronic University academic writing standards and APA style guidelines, citing at least two references in support of your work, in addition to your text and assigned readings. Include a title and reference page.

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.

SE

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

2 questions – Each question needs 3 answers – with 1 APA reference for each answer – Each answer atleast 200 words

 Discussion 1: Examine Alexa’s skill in ordering drinks from Starbucks (i.e. What is the development of the skills?  (From what to what level of features). 

 Discussion 2: Research Apple Home Pod. How does it interact with smart home devices?  Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.