BigData Wk7

There is much discussion regarding Data Analytics and Data Mining.  Sometimes these terms are used synonymously but there is a difference.  What is the difference between Data Analytics vs Data Mining? Please provide an example of how each is used. 

1 and half page

Marcu, D., & Danubianu, M. (2019). Learning Analytics or Educational Data Mining? This is the Question.. BRAIN: Broad Research in Artificial Intelligence & Neuroscience, 10, 1–14. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=a9h&AN=139367236&site=eds-live

Cybersecurity Planning

1.) A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail. Why do think all of these skills are necessary? Please explain.

2.) Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. 

Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).

Your written assignment should be 3-4 paragraphs in your own words, and should include a reference citation for your source of information.

discussion

 

Discussion: Security Breach Evaluation

Learning Objectives and Outcomes

  • Analyze the given case study on security breach.
  • Recommend controls to avoid an enterprise security breach.

Assignment Requirements

Read the text sheet named “Local Breach of Sensitive Online Data” and address the following:

Using what you have learned about security breaches, describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach mentioned in the text sheet.

Respond to your peers with your point of view on their answers. Respond to at least two of your classmates’ original thread posts with between 100 – 150 words for each reply.  Make sure your opinion is substantiated with valid reasons and references to the concepts covered in the course. In addition, initiate a discussion with the students who comment on your answer.

Required Resources

  • Text sheet: Local Breach of Sensitive Online Data (ts_localbreach)

Self-Assessment Checklist

Use the following checklist to support your work on the assignment:

  • I have engaged in a discussion of the assigned topics with at least two of my peers.
  • I have raised questions and solicited peer and instructor input on the topics discussed.
  • I have articulated my position clearly and logically.
  • I have supported my argument with data and factual information.
  • I have provided relevant citations and references to support my position on the issue discussed.
  • I have compared and contrasted my position with the perspectives offered by my peers and highlighted the critical similarities and differences.
  • I have solicited peer and instructor feedback on my arguments and propositions.
  • I have offered a substantive and critical evaluation of my peer’s perspective on the issues that is opposite of mine, and supported my critical review with data and information.
  • I have followed the submission requirements.

QUANTITATIVE Journal Article Review

 

You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.) 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References  

Security Policy Plan

 

This is a two-part deliverable using MS Word and MS Project, or their open source equivalents. This assignment focuses on information as an asset and logical security techniques for a hypothetical law firm. The goal of this deliverable is to secure an information security policy, suggesting the fundamental guidelines should an untoward event occur. It can be seen that information assets security management can be reduced down to three basic principles: integrity, confidentiality, and availability. Structure a policy around and within computers and associated equipment, as well as the people using it. Note: You may create or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements

 

Write a 3–5 page paper in which you:

  • Create a cybersecurity policy describing the principle, the objective, and policy statement for the law firm’s company network.
  • Describe the roles and responsibilities by groups (e.g., position director of network security, the network security manager, network security engineers, IT area), defining roles and responsibilities.
  • Suggest the cybersecurity policy statement, an explanation of the policy statement, and the reasons why the policy statement may be controversial.
  • Determine the security testing methodology you would use to facilitate the assessment of technical controls.
Section 2

Complete the following:

  • Use Microsoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm. The project plan should include:
    • Tasks, subtasks, resources, and predecessors.
    • An outline of the planning, analysis, design, and implementation phases.
    • The use of cybersecurity in the information systems development life cycle.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

The specific course learning outcome associated with this assignment is:

Research Paper

Need a research paper. Please open the word file to see the guidelines. I have provided a template so you can follow that or you can have your own style. But strictly follow the guidelines provided. I need someone who has knowledge in cybersecurity. 

webstore

Pine Valley Furniture’s board of directors is ready to review how to implement and maintain the new webstore system.

Write a 6- to 8-page implementation and maintenance plan for the new webstore. Include the following:

Recommend an installation strategy for PVF’s student furniture webstore. The installation strategies are direct installation, single-location, parallel installation, and phased installation. Justify your recommendation by stating the advantages and disadvantages as compared to the other three installation strategies.

Outline the documentation that you would suggest being created to document the system, train, and support users.

Outline the testing plan for the system. Include brief descriptions of the activities for each element of your testing plan.

Summarize the maintenance needs of the PVF webstore, including alternative organizational structures, quality measurement, processes for handling change requests, and configuration management.

Cite any references according to APA guidelines. For maximum points, include 3 academically acceptable references.