Check Attachment
Assignment
Web Analytics: The Importance of Defining Goals and Funnels
Explore and understand why defining goals and funnels are important. Please, answer the following questions:
1. What is a Website goal, define how this will assist you in visitor engagement and why would you want negative goals?
2. Describe the five funnel shapes and give examples of what they mean.
3. Can you think of a 6th funnel shape and example? (i.e. some ideas might be thought of by better understanding the Amazon shopper or a “wishlist”)
Please submit a Word Doc with your answers, in 500 words or more, and use references in support of your answers.
Q1
Topic: Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.
Instructions: Please follow the Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA.
For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each.
BI and Chryptography
Q1. evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES. You must use at least one scholarly resource. Every discussion posting must be properly APA formatted. (250 to 300 words)
Q2. What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?Your response should be 250-300 words. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.
Q3.List and briefly describe the nine-step process in con-ducting a neural network project.Your response should be 250-300 words. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.
Q4. Complete the following assignment in one MS word document and include at least two APA formatted references (and APA in-text citations) to support the work this week. (Each below question 150 words)
1.What is an artificial neural network and for what types of problems can it be used?
2.Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by arti- ficial ones? What aspects are similar?
3.What are the most common ANN architectures? For what types of problems can they be used?4.ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.
5.Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe com- monalities and differences among their findings and prepare a report to summarize your understanding.
6.What is deep learning? What can deep learning do that traditional machine-learning methods cannot?
7.List and briefly explain different learning paradigms/ methods in AI.
8.What is representation learning, and how does it relate to machine learning and deep learning?
9.List and briefly describe the most commonly used ANN activation functions.
10. What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.
11. Cognitive computing has be come a popular term to define and characterize the extent of the ability of machines/ computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real- world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report.
Cyber security planning and management – research
Select ONE ARTICLE from the following links and summarize the reading in your own words.
Your summary should be 2-3 paragraphs in length and uploaded as a WORD DOCUMENT.
There is an EXAMPLE attached to show you the format requirements. (Attached)
Plagiarism is unacceptable.
http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html
https://www.lifewire.com/learn-how-antivirus-4102748
http://www.sans.org/newsletters/
http://news.cnet.com/security/ https://www.onlinesecurity.com/news–publications-page http://www.esecurityplanet.com/views http://netsecurity.about.com/
Access Control Discussion
Describe Access Controls that you have utilized in your career or personal life. APA formatting is expected for any references. Initial posts due by Thursday end of day and two peer responses due by the end of the unit.
Cloud Computing and Digital Forensics
1.) Discuss in 500 words or more federated architecture in cloud systems. Remember that this is a cloud class not a database class.
Use at least three sources. Use the Research Databases available from the Danforth Library as your first choice.
Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.
Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Stand alone quotes will not count toward the 3 required quotes.
Write in essay format not in bulleted, numbered or other list format.
2.) Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed to be purchased. Include a price if applicable.
Write your answer using a WORD document.
300 words discussion
One of the hardest tasks you may face in Web Analytics is to convince persons outside of your team or department of the importance of the reports and KPI’s that tell the story of how well or bad you are doing with your website. Communicating your information effectively to Management and the Board of Directors, whom we will call the stakeholders, can be a daunting task, they just do not have the time to understand the details of the reports you offer. Therefore, to communicate your information, you will have to learn how to summarize and format your reports in abridged versions.
Please explain the following:
300 Words Minimum
Explain what KPIs are they designed to accomplish.
Describe how to prepare a KPI.
Explain how you would present your KPI to the Stakeholders, in brief.
pp
Practical connection paper
Full Disk Encryption
Preamble
An organization chief executive officer (CEO) was suspected of fraud, and digital forensic investigators were assigned to acquire a forensic duplicate of his laptop without his knowledge, and his laptop was configured with full disk encryption.
Restrain
The best option was to shut down the laptop, create a forensic duplicate of the hard drive, and decrypt the hard drive using an administrative decryption key. Notably, investigators had insufficient time for such laid down approach.
Plan of Action
The forensic duplicate of the data must be acquired from the live laptop while the system was left running in the chief executive Officer’s unit. The CEO was called out for an interview germane to the suspected fraud charges. The digital forensic investigators were then, able to interact with the CEO’s laptop, made changes to the system, acquire vital data on the laptop hard drive in an unencrypted format, including deleted data.
Lack of Decorum
During the acquisition process, digital investigators documented findings and enabled unauthorized access to concluding evidence. It must be recognized and acknowledged that the fundamental principle for handling forensic investigation in the most unstable environment, such as the CEO’s office, is not a smooth sailing event. Also, forensic investigators must be incredibly careful not to violate any laws and give rise to liability.
Answer All Questions (1:1 – 1:6)
Question 1:1 Do you, as an investigator, believe that forensic investigators charged with the case vehemently violated the laws and rise to liability?
Question 1:2 Do you, as an investigator, have confidence and willing to support digital forensic investigator’s conclusive evidence of this case in court?
Scenario: Try extremely hard to make allowances for forensic investigators’ operation in the most uneven crime scene to avoid breaching the fundamental principle of forensic investigation.
Question 1:3 Provide a comprehensive plan of action to guide digital forensic investigators in an unbalanced crime scene of this nature.
Question 1:4 Do you support the option that digital forensic investigators charged with this case should have obtained extra search warrant?
Question 1:5 Describe the Benefits and Drawbacks of Search Warrant on the organization’s Chief Executive Officer in such a given situation.
Question 1:6 Describe the Benefits and Drawbacks of extra Search Warrant on forensic investigators in the same given situation.