ITGE W 4 A

Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. You should use the UC library (https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles (https://scholar.google.com/ )Once you find the article, you will read it and write a review of it.  This is considered a research article review.Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Be sure to check your safe-assign score.  If it’s over 30%, you need to review the safe-assign report, revise your paper accordingly and resubmit.  You may resubmit as many times as needed BEFORE the due date. 

Final paper

 

Write your Final Project paper that requires the student to find a current case of an organization/brand/company who is either (a) engaging in a positive social responsibility campaign or (b) acting in a manner that is ethically questionable. The paper should include the following:

  1. Introduce the organization
  2. Outline the the issues involved in the case
  3. Document the Strategic Communication Tactics used in the case.
  4. Offer perspective on the behaviors in the case and its effect on stakeholders and society in general.
  5. Provide a conclusion

 

  • Assignment Format: MS Word Document; APA format

Length: 10 pages (Not including the Title or Reference Page)

Citations Required: Minimum 5 Scholarly or Professional References

Exp19_Access_Ch01_CapAssessment – Latte Delights Inventory 1.0

 Exp19_Access_Ch01_CapAssessment – Latte Delights Inventory 1.0  Project Description: In this project, you will open a database containing the inventory of a coffee shop, create a new table in which to store sales representatives (reps) information, and then add the sales rep records. You add a new product using a form and print a report. You apply a filter by selection and sort a query, and then you apply a filter by form to a table. You save both filters. Start Access. Open the downloaded Access file named Exp19_Access_Ch01_CapAssessment_Latte_Delights_Inventory.accdb. Grader has automatically added your last name to the beginning of the filename. Add the following records to the Sales Reps table, letting Access assign the SalesRepID:  LastName FirstName Address City State ZIP Eissler Karean 13 Oak Lane Montgomery PA 17752 Rai Namrata 1000 Ogden Blvd New Castle DE 19720 Pellum Katryn 286 Bergen Rd Salford PA 18957   Close the table. Open the Customers form in Form view. Use Search to locate the record for Baker Auto Supply. Modify the record so that the Address1 field displays 4508 N.W. 7 Avenue. Save and close the form. Open the Products form in Form view. Add a new product (Access will automatically add the Product ID): Coffee-Arabica Premium. The Description is 24/Case, Pre-Ground 1.75 Oz Bags, the Cost is $13 (just type 13, no $), the Markup Percent is 100%, the Brand is Premium, and the Year Introduced is 2017. Save the new record and close the form. Open the Products report and check that the report contains the new product P0026, Coffee-Arabica Premium. View the layout of the report in Print Preview and then change the page layout to Landscape. Save the report and close Print Preview. Open the Customers table. Sort the table by Customer Name in ascending order. Save the changes and close the table. Open the Revenue Stats query and sort the City field in ascending order. Apply Filter by Selection so that only stats for the last name Pellum display. Save and close the filtered query. Open the Products table. Use Filter by Form to create a filter that will identify all premium brands in the Brand field that were introduced after 2017. Apply the filter and preview the filtered table. Close the table and save the changes. Close all database objects. Close the database and then exit Access. Submit the database as directed.
 

R language expert

  1. The problem to solve.
  2. The data sources to pull from.
  3. The tool that will be used (R)
    1. Note high level graphics that will be used to solve the problem and how they will be used.

***High level, one page proposal – can submit through course messages or email. By end of session on Friday. 

On Saturday, teams will reconvene and complete the following:

  1. There must be a through data plan this includes:
    1. Where the data is online
    2. How you know the data is accurate and the plan for ensuring accuracy.
    3. An import of the data into the selected tool.
  2. A paper that includes:
    1. The data plan mentioned above
    2. The problem- note the description and why it’s a problem and how you are going to make a recommendation with the data presented.
    3. The analysis of why the data will solve the issue.
    4. Graphical representation and formulas.  The screenshots of the formulas in the tool must be present. 
    5. A summary of the consideration and evaluation of results
      1. This includes your teams’ final analysis of the problem and the resolution.

Note: The paper and data sheet (this is the raw data that will be imported into the tool) must be turned in before the end of the day on Saturday.

Discussion Board: Project Risk

In two to three paragraphs, how is project risk analyzed and why does it need to be managed? 

Use examples from personal experience, the readings, or your own research to justify your answers. 

Cite all sources. 

Data Mining

1) In your own words, Discuss in details the following data mining tasks. For each task, make sure to

discuss what the task does, three real life applications, and three algorithms. (Your answer goes in

the answer sheet and MUST be at least one and a half pages, single spacing).

A. Association rules.

B. Classification

C. Clustering

D. Anomaly detection

2) In your own words, discuss the Hierarchical clustering, Its types and 3 real life applications (Your

answer goes in the answer sheet and MUST be at least half a page, single spacing)

Remote Access Risks

All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.

Questions:
 

(1)Research the different types of VPNs and other relevant remote access applications
 

(2)Discuss what they are and some common techniques used to try and subvert their security. 

Network diagram

Network Security

 

  1. Objectives
  • To practice the formal procedure of system/network security analysis and planning.
  • To examine the vulnerability and security needs of a private organization.
  • To devise strategies to overcome potential malicious attacks, threats, and risks.
  1. Target Network

You have just been hired as an Information Security Officer (ISO) for a mobile app development company. The organization network structure is identified in the below network diagram and some services may inadequate and absent. 

Network diagram

The network specifically contains:

  • 2-Switches
  • 1-Web/FTP server with Linux operating system using port 80 and port 21
  • 1-Email Server with Exchange 2010 using port 25
  • 2-Active Directory Domain Controllers (DC) with Windows Server 2016 operating system
  • 2-Domain Name Service (DNS) Servers with Windows Server 2016 operating system
  • 2-Windows file servers using port 21
  • 3-Wireless Access Points (WAP) encrypted with WEP protocol.
  • 100 – Desktop/Laptop computers with Windows 10 operating system
  • 2- Multifunction printers (print, copy, scan, fax)
  • 1- Voice Over IP (VOIP) telephone system with 100 IP phones

The company is in a single, two story building with no fencing. The entire building is accessed using a permanent 4-digit pin.  A single security guard is located on the second floor of the building.  The security guard works Monday – Friday, 8AM to 5PM. Users are in open area cubicles on the first floor of the building. The employee work area is an open floor with no wall separating areas. The data closet is also located on the first floor of the building near the front entrance and the HVAC system in the middle of the first floor. The data closet is accessible by anyone who knows the 4-digit permanent pin that is distributed to all employees.  The facility maintenance generally cleans the building on the weekends when building with no employees or security personnel present.

  1. Assignment Details

The Chief Information Officer (CIO) has seen reports of malicious activity increasing and has become extremely concerned with the protection of the intellectual property and highly sensitive data maintained by your organization. As one of your first work assignments with the company, the CIO requested you identify and draft a report identifying potential malicious attacks, threats, and vulnerabilities specific to your organization. In addition, the CIO would like you briefly explain each item and potential impact it could have on the organization.

Write a four to six (4-6) page paper in which you:

  • Analyze five (5) or more specific potential malicious attacks and/or threats that could be carried out against the network and organization.
  • Explain in detail the potential impact of the five (5) or more selected malicious attacks.
  • Propose at least nine (9) – 3 of each type of security controls (administrative, logical/technical, and physical) that you would consider implementing to protect against the selected potential malicious attacks.
  • Analyze three (3) or more potential risks for data loss and data theft that may exist in the documented network and applications.
  • Explain in detail the potential impact of the three (3) or more selected risks for data loss and data theft.
  • Propose at least three (3) – 1 of each type of security controls (administrative, logical/technical, and physical) that you would consider implementing to protect against the selected risks for data loss and data theft.
  • List and provide a product overview of only two (2) alternatives for each logical/technical security control for both data loss/theft and malicious attacks. Include web links to the products and why those products should be considered.

Expectations

  • Use at least five credible and quality resources. Your external resources should not be more than two to three (2-3) years old.

Note: Wikipedia and similar websites do not constitute as credible and quality resources.

  • Single Word document
  • Double spaced
  • Times New Roman, size 12 font
  • One-inch margin on all sides
  • Citations and references must follow APA format
  • Include a cover page containing:
    • Title of the assignment
    • Student’s name
    • Professor’s name
    • Course title
    • Assignment due date

Note: The cover page and reference page are not included in the assignment page length requirement.