Research Paper on ROBOTICS

  

INSTRUCTIONS:

1. What to Submit

1. A Research Guide Structured paper

a. Title Page

 Running head: uppercase research title (no more than 50 characters)

Research Title (The narrowed focus determined from the main topic selected)

 Your name

 Course information

 Professor’s Information

b. Blank page

c. Abstract

One paragraph describing the research to be conducted

Keywords: max 5

d. Blank page

e. Table of Contents

f. Chapter 1

 Include 1 paragraph as the introduction

 Problem statement

 Include 1 paragraph describing the problem you plan to research

 Relevance and significance 

 Include 1 paragraph describing the research goal

 Research questions

 Add no more than 2 research questions as they relate to your research

focus

g. Chapter 2

h. Chapter 3

i. Chapter 4

j. Chapter 5

k. References

 Include at least 5 peer-reviewed journal references

NO websites

Discussion Reply!!! About 75 words

 

Part 1: Security Threats

A Facebook data breach revealed more than 530 million individuals’  personal information to hackers. This included the date of birth, user’s  name, current city, and posts made on their wall. The exposure was  discovered in 2021 even though it existed since 2019.

This breach happened when cybercriminals scraped data from Facebook’s  servers using a misconfiguration in their contact importer. As a  result, they could gain access to the personal information of millions  of people.

According to (Vojtko How to prevent security misconfiguration)  “The most common mistakes that lead to security misconfiguration are:  Unnecessary ports being left open, Unneeded services permitted to run,  Leftover pages still available to access, and Unused accounts with  certain privileges not being deleted.”

By not removing these things you are leaving the application open to  attacks. A couple of things we can do to prevent Security  Misconfiguration are: Remove unused features, Disable the use of default  accounts and passwords, and Limit access to administrator interfaces.

Part 2: Mobile devices

A desktop computer is more physically secure than laptops,  smartphones, and tablets because it is often kept in one location,  making it easier to protect. Desktop’s access to internet usually comes  from a single source, which help to fight malware easier.  

Each one of these items have different practices when it comes to  secure your device, these are a few ones that they have in common:

Always run updates, avoid public or suspicious Wi-Fi, enable remote  lock, enable user authentication, turn off device when not in use, and  restrict physical access to device.

I’m already implementing a few security practices on my mobile device  to protect it from being hacked. For example, I try to avoid social  media apps as much as possible ( I do not have Facebook, Twitter, Tik  Tok). Instagram is the only social media platform I have, and I always  try to share as less information about myself as possible.

Another practice I use is to always download files from a trustworthy source or page.

References:

Vojtko, Mark. “How to Prevent Security Misconfiguration.” Hashed Out by The SSL Store™, 28 Dec. 2020, https://www.thesslstore.com/blog/how-to-prevent-security-misconfiguration/.

BMIS662 – Application Activity Network Security Assignment

  

Application Activity Network Security Assignment Instructions

Overview

Security was once a separate topic from networking and many professionals dismissed it as unnecessary. Today, network security is one of the most important parts of the networking professional’s job. A key point in the threat environment today is that wizard hackers who hacked for the thrill of breaking in and the enhancement of their reputation have given way to career criminals. Computer crime for traditional greed motives dominates the threat environment today.

Instructions 

The planning section has many important concepts. Arguably, the most important planning principle is risk analysis. You cannot stop all attacks, any more than society can stop all robbery. The important thing is to spend money on protection only if there is a larger reduction in probable losses. 

For this activity utilize Microsoft Visio or a subsequent visual design tool and create a diagram that lists types of attackers in a way that illustrates them from most dangerous to least dangerous. 

Create categories to place these attackers in such as:

traditional hackers, 

malware writers, 

disgruntled employees, 

career criminals,

terrorist groups, 

nation-states, etc. 

Once you have completed this, describe the types of attacks that each attacker is likely to engage in, and be sure to analyze the weaknesses that these attacks are targeting as well as which layer of the OSI model they are targeting

The report must be a minimum of 7 pages, excluding the title page, Visio diagrams, and references. It must include at a minimum of 7 peer-reviewed sources to justify your assertions. 

Total of 11 Pages at least

Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.

Complexity of Information Systems Research

This week’s journal article was focused on the Complexity of Information Systems Research in the Digital World. Complexity is increasing as new technologies are emerging every day. This complexity impacts human experiences. Organizations are turning to digitally enabled solutions to assist with the emergence of digitalization. 

Please review the article and define the various technologies that are emerging as noted in the article. Note how these emerging technologies are impacting organizations and what organizations can to do to reduce the burden of digitalization.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.

The writing should be clear and concise. Headings should be used to transition thoughts. Don’t forget that the grade also includes the quality of writing.

Journal articles:

Current Events and Trend Reports: CBI & the Musk Neuralink

 

Current Events and Trend Reports: CBI & the Musk Neuralink

Elon Musk cofounded Neuralink in 2016. He noted his goal is to create a chip that could enable a “brain-computer interface.” On Tuesday 9th, Musk and various senior staffers at Neuralink presented the company’s ambition to design a chip capable of being implanted in the human brain that could receive and transmit signals to the organ. According to Musk, the company has already had some success — with monkeys. Here is what we know thus far:

  • Elon Musk’s neurotechnology company, Neuralink, has pulled back the veil on its ambitions to implant chips in people’s brains.
  • During a Q&A session at a live presentation on Tuesday, Musk surprised his Neuralink colleagues by announcing that the firm had tested its technology on monkeys with some success.
  • Musk said “a monkey has been able to control a computer with its brain,” though he did not elaborate further on what this involved.
  • Neuralink’s president, Max Hodak, said that he wished the company didn’t have to experiment on animals but that it’s a necessary “step in the process.”

Research Internet and reputable information sources to examine the impact of this current event. Summarize your findings and write at least a one-page word document. In your report you will also need to address and respond to the following questions:

  1. From your point do you think CBI is a natural evolution in our Digital Transformation? Why or why not?
  2. Examine and evaluate the social impact in terms of human behavior and interactions with such technology? Try to list the pros and cons and note the winners and losers 
  3. Knowing that every technology will lead to the creation of more technology, what would envision as the most likely next technology that will come as a result of using Neuralink?

PS; please see attached picture for screenshot

visualization or infographic and imagine the contextual factors

Select any example visualization or infographic and imagine the contextual factors have changed:

  1. Fully describe and detail the visualization or infographic.
  2. Describe changes you will make to the work 
    1. If the selected project was a static work, what ideas do you have for potentially making it usefully interactive? How might you approach the design if it had to work on both mobile/tablet and desktop?
    2. If the selected project was an interactive work, what ideas do you have for potentially deploying the same project as a static work? What compromises might you have to make in terms of the interactive features that wouldn’t now be viable?
    3. What about the various annotations that could be used? Thoroughly explain all of the annotations, color, composition, and other various components to the visualization.
    4. What other data considerations should be considered and why? 
  3. Update the graphic using updated data, in the tool of your choice (that we’ve used in the course), explain the differences.

Be sure to show the graphic (before and after updates) and then answer the questions fully above.  This assignment should take into consideration all the course concepts in the book.  Be very thorough in your response.  The paper should be at least three pages in length and contain at least two-peer reviewed sources.Your work must be entirely original, checked with Grammarly, and make use of proper grammatical conventions.

ITSM

1.  Examine Alexa’s skill in ordering drinks from Starbucks.

APA, Plagiarism Free, Latest 3 Reference, In-Text Citations, 250 to 350 words.

Assignment

 Select one network scanning software tool (there is a list in your required reading slides) and explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up. 

Case Study – Improving Business-to-Business Sales Using Machine Learning Algorithms

Case Summary: Champo Carpets is one of the largest carpet manufacturing companies based in India, with customers across the world, including some of the most reputed stores and catalog companies. Champo Carpets is based out of Bhadohi, Uttar Pradesh, which is one of the most famous clusters of carpet weaving in India. This cluster is spread over 1,000 sq. km and comprises many villages and districts in and around it. The company is a vertically integrated manufacturer and exporter of carpets and floor coverings, with more than 52 years of existence. At the beginning of 2020, the company employed 1,500 people with a capacity to produce 200,000 pieces of carpets and floor coverings per month. As part of sales and marketing, Champo Carpets shared sample designs with its potential customers, based on which the customer placed an order. The sample design selection was done in various ways and the process itself is costly and elaborate. To capture industry trends, a team of the company visited various trade shows and events and sent samples to the client as per the latest fiber and color trends. However, their sample-to-order conversion ratio was low compared to the industry average. This had cost repercussions as well as lost opportunities. The company identified the cause as inaccurate targeting of products to their customers. It subsequently implemented an enterprise resource planning (ERP) application and has been capturing data at every point of production as well as sales. They believe this accumulated data can help target their products accurately to the right clients and design an appropriate recommender system.

Learning Objectives The primary objective of the case is to illustrate how machine learning algorithms can be used to manage business-to-business (B2B) sales. The learning objectives include the following:

Access attached the full case or article. After a critical review of the case, respond to the questions below.

For a better understanding of the issues related to the problem, knowledge of data visualization using Tableau, R, or Python programming will be useful.
1. With the help of data visualization, provide key insights using exploratory data analysis.
2. What kind of analytics and machine learning algorithms can be used by Champo Carpets to solve their problems and in general, for value creation?
3. Develop ML models to help identify features that contribute toward conversion (or non-conversion) of samples sent to customers.
4. Discuss the data strategy for building customer segmentation using clustering. What are the benefits Champo Carpets can expect from clustering?
5. Discuss clustering algorithms that can be used for segmenting Champo Carpets’ customers.6. Develop customer segmentation using K-means clustering. Discuss the optimal number of clusters, significant variables, and cluster characteristics.
7. Discuss the data strategy that can be used for building recommender system models.
8. Develop an association rule mining algorithm, which can be used for recommendation.
9. Build collaborative filtering techniques for recommender systems.
10. What will be your final recommendations to Champo Carpets?

Requirements:

  • Your analysis will be considered complete, if it addresses each of the 9 components and subcomponents outlined above.
  • Use of proper APA formatting and citations. Supporting evidence from outside resources should be used and those must be properly cited. 
  • Include your best critical thinking and analysis to arrive at your justification.
  • Approach the assignment from the perspective of the senior executive leadership of the company.

    Answer all questions thoroughly. Min 7-8 pages without reference page and main header page.