Week 13 Assignment

 Complete the following assignment in one MS word document: 

1. Describe recommendation systems

2.Describe expert systems

3.Describe chatbots

 When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source). 

Cybersecurity Threat Landscape Paper

Advanced persistent threats (APTs) have been thrust into the spotlight due to their advanced tactics, techniques, procedures, and tools. These APTs are resourced unlike other types of cyber threat actors.

Your chief technology officer (CTO) has formed teams to each develop a detailed analysis and presentation of a specific APT, which she will assign to the team.

.  

Your  report should use The Cybersecurity Threat Landscape Team Assignment Resources to cover the following five areas:

Part 1: Threat Landscape Analysis

  • Provide a      detailed analysis of the threat landscape today.
  • What has changed in the past few years?
  • Describe common tactics, techniques, and procedures to include threat actor types.
  • What are the exploit vectors and vulnerabilities threat actors are predicted to take advantage of?

Part 2: APT Analysis

  • Provide detailed analysis and description of the APT your group was assigned.      Describe the specific tactics used to gain access to the target(s).
  • Describe the tools used. Describe what the objective of the APT was/is. Was it successful?

Part 3: Cybersecurity Tools, Tactics, and Procedures

  • Describe current hardware- and software-based cybersecurity tools, tactics, and procedures.
  • Consider the hardware and software solutions deployed today in the context of defense-in-depth.
  • Elaborate on why these devices are not successful against the APTs.

Part 4: Machine Learning and Data Analytics

  • Describe the concepts of machine learning and data analytics and how applying them to cybersecurity will evolve the field.
  • Are there companies providing innovative defensive cybersecurity measures based on these technologies? If so, what are they? Would you recommend any of these to the CTO?

Part 5: Using Machine Learning and Data Analytics to Prevent APT

  • Describe how machine learning and data analytics could have detected and/or prevented the APT you analyzed had the victim organization deployed these technologies at the time of the event. Be specific.

Part 6: Ethics in Cybersecurity.  Ethical issues are at the core of what we do as cybersecurity professionals. Think of the example of a cyber defender working in a hospital. They are charged with securing the network, medical devices, and protecting sensitive personal health information from unauthorized disclosure. They are not only protecting patient privacy but their health and perhaps even their lives. Confidentiality, Integrity, Availability – the C-I-A triad – and many other cybersecurity practices are increasingly at play in protecting citizens in all walks of life and in all sectors. Thus, acting in an ethical manner is one of the hallmarks of cybersecurity professionals.

  • Do you think the vulnerability(ies) exploited by the APT constitutes an ethical failure by the defender? Why or why not? 
  • For the      APT scenario your group studied, were there identifiable harms to privacy or property? How are these harms linked to C-I-A? If not, what ethically significant harms could result from the scenario your group researched? 
  • For the      APT scenario, your group studied when the targeted organization identified in the breach were they transparent in their disclosure? Do you feel the organization acted ethically? 
  • Use additional sources of information but also describe the concept in layman’s terms.
  • Use visuals where appropriate.
  • While quality is valued over quantity, it is expected that a quality paper will result in a minimum length of 10–15 pages.

Discussion

 Describe each of the elements of a Business Continuity Plan (BCP).

 An initial post must be between 250-300 words 

IT 404

 Some of the markup elements in the following code of HTML web page have been incorrectly used. Based on the output displayed below, correct all of them in the code 

 Write an HTML to display an image of your preference, that when clicked will link to any website of your choice “should be opened in a new window”. 

What value does technology provide to life?

 Identify a philosophical question for exploration and at least one philosophical concept from which the question will be explored.
Learning Objective: Identify questions that are philosophical in nature.
Response identifies a question that is philosophical in nature and centered on the theme of digital technology. Additionally, the question can be explored using one or more selected and identified philosophical concept(s)
Include a central thesis that answers a philosophical question related to digital technology.
Learning Objective: Construct a central thesis to answer philosophical questions.
Response includes a clearly defined central thesis that reflects careful consideration of the selected philosophical question, and is informed by the chosen philosophical concept(s).
Support a central thesis using arguments drawn from philosophical concepts and academic research.
Learning Objective: Defend philosophical arguments
Response includes a minimum of three arguments that clearly support the thesis. Arguments are related to digital technology, well researched, and drawn from existing philosophical schools of thought.
Instructions
Technology-Related Philosophical Questioning
You have the opportunity at your workplace to participate in a Digital Frontiers committee with several of your colleagues. This committee’s mission is to bridge the gap between philosophical questions and new digital technologies, such as social media. For your first committee assignment, you’ve been asked to develop a white paper in which you examine how a philosophical concept applies to questions that arise from our digital world.
Drawing on your prior knowledge of philosophical concepts (including utilitarianism, deontology, virtue ethics, rationalism, empiricism, postmodernism, idealism, and materialism), write a 3- to 4-page paper that explores one of the suggested philosophical questions below.
What value does technology provide to life?
Teacher’s FeedbackEven, a good start to addressing, “What value does technology provide to life?”, reflecting on this using a variety of philosophical concepts (utilitarianism, deontology, …). In your introduction, you clearly establish your thesis, stating “As a result, technology has improved life and increased its value through diverse outcomes that could not have been realized in its absence”. In your supporting paragraphs more clearly illustrate the nature of and application of the philosophical concepts. I will open a second attempt. 

Discussion post – https://www.youtube.com/watch?v=vWbdovhZIYw

I need a 300 words discussion about https://www.youtube.com/watch?v=vWbdovhZIYw

Answer the following questions:

  • What insights did you get out of the video?
  • What best practices did the presenter discuss that you thought were valuable?
  • How would the material discuss impact ICS/SCADA systems? What systems specifically?

Please format this as APA

computer science

 

The NSA has identified what they call the First Principles of cybersecurity. The following List three of these:

PrincipleLast Name Starts WithInformation Hiding    A through HLeast PrivilegeI through QModularizationR through Z
 

Excel Chapter 6 Grader Project – Delta Paint | Exp19_Excel_Ch06_CapAssessment_Delta_Paint

 

Excel Chapter 6 Grader Project – Delta Paint | Exp19_Excel_Ch06_CapAssessment_Delta_Paint

 

12

Enter   the reference to the net profit formula in the correct location for a   two-variable data table.

13

Complete   the two-variable data table in the range E25:K45. Use cell B6 as the Row   input cell and B4 as the Column input cell. Format the results with Accounting   Number Format with two decimal places.

14

Apply   a custom number format to make the formula reference appear as a descriptive   column heading Wages. Bold and center the headings and substitution   values where necessary.

15

Create   a scenario named Best Case, using Units Sold, Unit Selling   Price, and Employee Hourly Wage (use cell references). Enter these values for   the scenario: 200,   30,   and 15.

16

Create   a second scenario named Worst Case, using the same changing cells.   Enter these values for the scenario: 100, 25, and 20.

17

Create   a third scenario named Most Likely, using the same changing cells.   Enter these values for the scenario: 150, 25, and 15.

18

Generate   a scenario summary report using the cell references for Total Production Cost   and Net Profit.

19

Load   the Solver add-in if it is not already loaded. Set the objective to calculate   the highest Net Profit possible.

20

Use   the units sold as changing variable cells.

21

Use   the Limitations section of the spreadsheet model to set a constraint for raw   materials (The raw materials consumed must be less than or equal to the raw   materials available). Use cell references to set constraints.

22

Set   a constraint for labor hours. Use cell references to set constraints.

23

Set   a constraint for maximum production capability. Units sold (B4) must be less   than or equal to maximum capability per week (B7). Use cell references to set   constraints.

24

Solve   the problem. Generate the Answer Report and Keep Solver Solution.

25

Create   a footer on all four worksheets with your name on the left side, the sheet   name code in the center, and the file name code on the right side.

26

Save   and close Exp19_Excel_Ch06_Cap_DeltaPaint.xlsx.   Exit Excel. Submit the file as directed.

SIEMENS SIMATIC

I need to write a term paper on the topic Siemens Simatic- PCS7/WINCC (SCADA) 

There are all the requirements for the term paper alongside the template for the term paper.
Please help and thank you