Machine Learning Model Training 2.

  

Assignment 3: Machine Learning Model Training 2 

• Two multi-part, multiple-choice questions.

•  AI in Healthcare with Phase 2 data set (HTML file)

• Details of the Q1 & Q2 m/c questions are shown in the attached question files.

• Lecture notes on Machine Learning in Healthcare for your reference

Business Continuity and Disaster Recovery Plans Scenario

 

You are an IT system manager working for  the KION Group with the main headquarters in Frankfurt, Germany.  Forklift trucks and warehouse automation equipment are the company’s  main products. A disaster that destroys half or all of a  modern business’s data center is the worst-case scenario. This includes  all of the computers and discs inside it. While such a scenario is  uncommon, it is possible, and not just in the event of a major natural  disaster, such as an earthquake or electrical surges due to a storm.  These circumstances can permanently destroy data centers. The strength of the KION group is  determined by the quality of a business impact analysis (BIA). Because  this is the blueprint that will get you out of any situation, no matter  how big or small, you can navigate easily if the map is well-made.  However, if the information is out of date, incomplete, or otherwise  compromised, you will have difficulty getting back to business as usual. Ensuring you have offsite backups of  your data is the greatest approach to preparing your organization for a  disaster like this. If your production data is stored on-premises in one  of your data centers, you’ll need to make backups of it in a different  data center, or the cloud. If your data is stored in the cloud, you have  the option of backing it up to local storage, another cloud, or another  area of the same cloud. It is essential to restore backup data  on new infrastructure as quickly as possible. Moving significant volumes  of data via the Internet takes a long time, so it’s not a good idea in  the event of a crisis. Moving physical copies of discs from one location  to another could be faster in some situations. Alternatively, it may be  faster and easier to set up new servers in the data center where your  backup data is stored, link them to the backup data, and then use them  as production servers. Because your team is performing so well,  senior management at the KION group decided that your team must  establish a business continuity plan (BCP) and a disaster recovery plan  (DRP) to deal with difficulties that may arise now or in the future.  You’ve been tasked with creating these new plans. 

Instructions

Write a 3–4 page paper in which you:  

  1. Summarize the primary purpose of a BIA, including why a BIA is often classified as confidential.
  2. Explain how a BIA helps evaluate data and categorize risks with  respect to technology, individuals, and the organization in regard to  the above scenario.
  3. Explain the purpose of a BCP, including how a BCP helps to  mitigate risks in regard to the above scenario, and recommend two best  practices to follow when creating a BCP.
  4. Explain the purpose of a DRP, including how a DRP helps to  mitigate risks in regard to the above scenario and recommend one best  practice to follow when creating a DRP.
  5. Use at least two quality resources in this assignment. Note: Wikipedia  and similar websites do not qualify as quality resources. The Strayer  University Library is a good source for resources.

Your assignment must follow these formatting requirements: 

  • This course requires the use of Strayer Writing Standards. For  assistance and information, please refer to the Strayer Writing  Standards link in the left-hand menu of your course.

The specific course learning outcome associated with this assignment is: 

  • Evaluate and categorize risk with respect to the technology, the  individuals, the enterprise, and the recommend appropriate responses.

5.3 Preliminary PPt

  1. This is Phase 4 of your final capstone project.
  2. Submit your preliminary PowerPoint project presentation using the assignment link.
  3. The presentation should be a minimum of five slides. Make sure to include an introduction and conclusion in the presentation.

designing user interfaces

 

Designing User Interfaces 

Design an effective UI with any technology of your choice (e.g., FrontPage, Dreamweaver, or other) for a business you might like to start or lead.

  • Use one of the following methods to turn in your assignments
    • If you are using a server
      • ZIP your files and provide the URL to the assignment
      • Upload your files
    • If you do not have server access
      • ZIP your files and provide a screenshot of the assignment
      • Upload your files

 NOTE:  You do not need to create the rest of the pages unless you want to at the moment. Your UI should consist of at least the basic webpage components including the header, navigation, content layout and footer. Although you do not need to stylize the pages yet, you can do so in preparation for next week.

Resource
http://youtu.be/lSFDC643r-Y?hd=1

Textbook

Web Programming and Internet Technologies, 2nd ed. (2016). Scobey, P., & Lingras, P. Burlington, MA: Jones & Bartlett Learning.  

Chapter 3  
In this chapter, we will identify the importance of creating a distinction between content structure and its presentation. We will also examine HTML tags and elements and the important attributes for each.

Chapter 4
In this chapter, we will identify how CSS styles are used to communicate with various browsers and how HTML elements are displayed within each platform.

module 2

It is very important to read the lecture attached the risk performance because the risk matrix form needs to be included in the assignment 

 

Assignment Details

For this week’s course project assignment, address the following elements:

  • An explanation of PII (Personally Identifiable Information).
  • A list of the data fields used based on the information disclosed in the CIO email message.
  • Identification of PII fields.
  • Using the risk matrix in this week’s lecture, include the risk level for this application.
  • An assessment of whether symmetric Ciphers are the BEST solution. Include at least one paragraph for each of the following sections.
  • A description of practical stream ciphers.
  • An analysis of DES and alternatives. Provide a comparison of the benefits and shortcomings of the following Symmetric ciphers: DES, 3DES, AES.

Week#11 Discussion

 The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program. 

 

Reading Assignments

  

Montasari, R., & Hill, R. (2019). Next-Generation Digital Forensics: Challenges and Future Paradigms. 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), Global Security, Safety and Sustainability (ICGS3), 205. https://doi.org/10.1109/ICGS3.2019.8688020

Sahinoglu, M., Stockton, S., Barclay, R. M., & Morton, S. (2016). Metrics Based Risk Assessment and Management of Digital Forensics.  Defense Acquisition Research Journal: A Publication of the Defense Acquisition University, 23(2), 152–177. https://doi.org/10.22594/dau.16-748.23.02

mod1

 

Examine the Organizational Chart for XYZ Technology Services and list the operational risks and the possible outcomes (should that risk occur) for each business unit. List a minimum of 3 risks per business unit. Be sure to identify risks that are appropriate for each business unit.

Organization Chart

For this project, populate the following columns on the tab labeled “Risk Assessment Form” in the provided Risk Register spreadsheet.

Risk Register

A few examples are provided below:

Risk Identification table

Note: Make sure to refer to your Risk Management Plan and work on the relevant areas. This is a good week to address the Introduction section in your Risk Management Plan.

Risk Managment Plan 

tableau assignment

instructions are attached. the final project must be twbx format. I already gave the dataset so you just need to do the work with that