Data Analytics Project

THE PROCESS

1. SELECT a domain area of research (COVID-19 related) *Please chat with me for pre-approval

2.  FORMULATE a problem statement & hypothesis. describe the problem in details you wish to explore.

3. FRAME the question(s) according to your domain

a. Understand A Business

b. Understand A Stakeholders

4. OBTAIN data for your project 

a. Describe the Data: Information about the dataset itself, e.g., the attributes and attribute types, the number of instances, your target variable. 

5. SCRUB the data, this includes cleaning and preparing the data for analytic purposes

6. ANALYZE the data, looking for patterns and insights (EDA & Analytics) *Use Jupyter Notebook

7. SUMMARIZE your findings

Hexadecimal Calculator using Swift

Implement a hexadecimal calculator for iOS. Requirements: 

• The calculator should support 4 basic arithmetic operations: + – * and / 

• The calculator will operate on hexadecimal numbers, not decimal numbers 

• The calculator only needs to operate on unsigned integers (i.e. UInt). You do not need to consider negative numbers or fractions.

 • The calculator should support the 16-digit hexadecimal numbers (i.e. The range of the numbers is from 0 to FFFF FFFF FFFF FFFF). Prevent the user from entering a number that is greater than FFFF FFFF FFFF FFFF. 

• The calculator should handle overflow and underflow gracefully. The app must not crash. 

• The calculator should handle division-by-zero error gracefully. The app must not crash. 

• The calculator should be able to support most of the devices and orientations. If it does not support the old devices earlier than iPhone 6, it is okay. 

Hint:

 • To convert a string to a hex number, use “radix: 16” as an argument. 

For example: var s:String? 

s = “1A” 

var intHex:UInt = 0 

intHex = UInt(s!, radix: 16)! 

print(intHex) 

// shows 26

 intHex = 90

 s = String(intHex, radix: 16).uppercased()

 print(s!)

 // shows 5A

• It is recommended that you use a UI label instead of a text field, so that the user will not type directly by using a keyboard. You will need to provide a button for each digit. 

• Strings may be concatenated by using + operator. 

E.g. var s1 = “1234” var s2 = “5” 

print(s1 + s2)

 // shows 12345 

You may want to do string concatenation in the action of each digit button.

 • To prevent the user from entering a number exceeding the size of 16 digits, you may verify the length of the string associated with the UI label. 

• To handle overflow and underflow, use &+, &-, and &* instead of +, -, and *. 

• To support different devices and orientations, use stack view, scroll view, or both. 

• Design your algorithm first! 

Think about the status of the calculator: when to take the first operand, when to take the second operand, when to append digits to the current number, and when to refresh the current number, etc. The functionality of your hex calculator worth 60% of the credit, while the appearance of the user interface worth 40%. When you submit the assignment, please compress the entire project folder into a single zip file, and upload it to D2L. In addition, please provide 4 to 5 screenshots of your app in different devices and orientations. If your app doesn’t work on every device/orientation, please specify why.

Wk 5 – HIPAA Compliance Planning

4 Part Assignment
1.Write a 1- to 2-page high-level executive summary of the legal and regulatory compliance requirements for Health Coverage Associates executives. The summary should provide

2.Write a 1- to 2-page concise outline of the contents of the security management plan.
3.Compile a 1-to 2-page list of at least 10 of the CIS controls that provide key alignment with the administrative (policies), physical (secured facilities), and technical safeguards required under HIPAA to protect against the attacks listed above. Include corresponding NIST controls mapped to the selected CIS controls.   
4. Write a 1- to 2-page concise outline of the contents of the security management plan.
 

Assignment Content

  1. Your company is a security service contractor that consults with businesses in the U.S. that require assistance in complying with HIPAA. You advertise a proven track record in providing information program security management, information security governance programs, risk management programs, and regulatory and compliance recommendations. You identify vulnerabilities, threats, and risks for clients with the end goal of securing and protecting applications and systems within their organization.

    Your client is Health Coverage Associates, a health insurance exchange in California and a healthcare covered entity. The Patient Protection and Affordable Care Act (ACA) enables individuals and small businesses to purchase health insurance at federally subsidized rates. In the past 6 months, they have experienced:

    • A malware attack (i.e., SQL Injection) on a critical software application that processed and stored client protected health information (PHI) that allowed access to PHI stored within the database
    • An internal mistake by an employee that allowed PHI to be emailed to the wrong recipient who was not authorized to have access to the PHI
    • An unauthorized access to client accounts through cracking of weak passwords via the company’s website login
    • Health Coverage Associates would like you to develop a security management plan that would address the required safeguards to protect the confidentiality, integrity, and availability of sensitive data from the attacks listed above and protect their assets from the vulnerabilities that allowed the attacks to occur. 

      Write a 1- to 2-page high-level executive summary of the legal and regulatory compliance requirements for Health Coverage Associates executives. The summary should provide

    • Accurate information on the HIPAA requirements for securing PHI
    • FISMA and HIPAA requirements for a security plan
    • Scope of the work you will perform to meet the Health Coverage Associates’ requests
    • Compile a 1-to 2-page list of at least 10 of the CIS controls that provide key alignment with the administrative (policies), physical (secured facilities), and technical safeguards required under HIPAA to protect against the attacks listed above. Include corresponding NIST controls mapped to the selected CIS controls.

      Write a 1- to 2-page concise outline of the contents of the security management plan. Include

    • Policies Health Coverage Associates will need to manage, protect, and provide access to PHI
    • The recommended risk management framework Health Coverage Associates should adopt
    • Key elements Health Coverage Associates should include in its plan of actions and milestones
    • Cite all sources using APA guidelines.

      Submit your assignment.

Assignment

  

Chapter #5: 

1. What is an artificial neural network and for what types of problems can it be used? 

2. Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial ones? What aspects are similar? 

3. What are the most common ANN architectures? For what types of problems can they be used? 

4. ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode. 

5. Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding. 

6. Go to neuroshell.com. Look at Gee Whiz examples. Comment on the feasibility of achieving the results claimed by the developers of this neural network model. 

Chapter #6: 

1. What is deep learning? What can deep learning do that traditional machine-learning methods cannot? 

2. List and briefly explain different learning paradigms/ methods in AI. 

3. What is representation learning, and how does it relate to machine learning and deep learning? 

4. List and briefly describe the most commonly used ANN activation functions. 

5. What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN 

6. Cognitive computing has become a popular term to define and characterize the extent of the ability of machines/ computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real-world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report. 

ISO

 

Lopes, M., Guarda, T. & Oliveira, P. (2019). How ISO 27001 Can Help Achieve GDPR Compliance. 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-6.  https://ieeexplore.ieee.org/document/8760937?arnumber=8760937 

Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43. 

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

computer forensic

 As a cyber investigator, you are investigating a group known as BLGRUS (Bootleggers R Us) that is allegedly posting your company’s music files without your permission.  Write a 2-3 page document on your plan to infiltrate their group (keep in mind their motivations to commit the offense), identify the users, send any legal documentation, and preserve evidence. 

Discussion 55

 

Mr. Bradley Willman Against Superior Court Judge C. Kline

  • The Law enforcement officers are excessively zealous, striving retrospectively to justify their interest in vulnerable, innocent children and imploring the judiciary system’s sympathy.
  • Yet again, most police officers have been convicted for possessing child pornography despite pretense claims as undercover investigators. Masquerading and demonstration to justify the overzealous interest in innocent children, the victim of sex offenders can be counterproductive, as verified in the case against Superior Court Judge Ronald C. Kline.

Preamble

  • Bradley Willman, Canadian vigilante sent a Trojan horse program to California Judge Ronald C. Kline, gained unauthorized access to his computer, and found a diary detailing his sexual fantasies involving children and approximately 100 images alleged to be child pornography. 
  • Judge Kline’s defense team. At first, the team suggested that the intruder may have planted the evidence.
  • Judge Ronald C. Kline. Judge Kline later admitted downloading pornography from the Internet, asserting that one or two pornography images on his computer could be illegal and further stated that he never intended to keep any of the images.
  • Judge Kline’s Defense Team. As the case remains in litigation, the defense team argued that all evidence obtained by Mr. Willman must be suppressed because his actions were criminal and was acting as an agent of law enforcement when he broke into Judge Kline’s computer. 
  • On behalf of Mr. Willman, the prosecuting team denied the allegation that Mr. Willman acted as a police agent but was a cooperative suspect in the case and accused as potential suspect in at least three U.S. Customs Service investigations of child pornography. 
  • Ruling and Consequence.  A federal judge ruled that Mr. Willman acted as a police informant, corrupted all evidence he obtained from Judge Kline’s computer. It is worth noting that the outcome of Mr. Willman’s case against Judge Kline can put forth an across-the-board implication for Judge Kline Defense team and the prosecuting team in the encounter with online informants.
  • Lesson Learned. Before conducting an undercover investigation, investigators must take steps to protect their identity and assumed the position of anonymity, if possible. Also, investigators must use expressly designate computers and mobile devices used in the process of undercover investigations. Investigator Must do so to avoid commingling of evidence, possible allegations of personal pedophilic interests, and permanently circumvent far-reaching implications, shame, and humiliation in court.
    1. Judge Kline later admitted downloading pornography from the Internet, asserting that one or two pornography images on his computer could be illegal and further stated that he never intended to keep any of the images.

Question 1. Describe in detail the plan of action, amplifying steps to submit court appeal on behalf of Judge Ronald C. Kline.

  1. Bradley Willman sent a Trojan horse program to California Judge Ronald C. Kline, gained unauthorized access to his computer, and found a diary detailing his sexual illusions and imaginations involving children and approximately 100 images alleged to be child pornography. However, Judge Kline’s defense team alleged that the evidence was planted by (the Intruder) Mr. Bradley William.

Question 2. Describe in detail the plan of action, amplifying steps to submit court petition on behalf of Mr. Bradley Willman.

THE LIFE CYCLE DEFINING

Your Research Project is due this week. It must consist of:

1. 5 source annotated bibliography

2. slide presentation with 12 or more slides

3. Summary or Abstract containing at least 750 words.

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use the Research Databases available from the Danforth Library not Google.

COMPUTER SCIENCE

 Read the Orlando Marathon Case Study , found in this week’s module. Then respond to the following questions by due date listed in the syllabus:

  1. Consider  the responsibilities of risk management programs and risk in volunteer  management. What steps should be taken to prepare for the event in  compliance with the responsibilities of risk management programs and in  the aftermath of the Boston Marathon events. Assume that terrorism  threats on this event would be extremely heightened.
  2. What are all of the risks that you need to consider for the organization and for volunteers?
  3. In  what ways would you approach each of these risks? (Think about  elimination, reduction, assumption, transfer, etc). Explain your  rationale.

By the Saturday following the due date listed on  the syllabus at 11:59pm, respond to at least 1 other student. Do you  agree with the steps they selected to prepare for the event? Are there  risks they did not identify that should be included?