BSW

In 250 words Common Weakness Enumeration >

CWE-20: Improper Input Validation Score  33.47.  Write a brief overview of their scoring system 

Explain proper policy implementation steps and describe factors relating to its success.

 

Scenario

Two health care organizations have recently merged. The parent organization is a large medical clinic that is HIPAA compliant. The clinic recently acquired a remote medical clinic that provides a specialty service. The remote clinic is organized in a flat structure, but the parent organization is organized in a hierarchical structure with many departments and medical clinics. These organizations are in the process of aligning their operations. You are asked to make major refinements to the organization’s cell phone use policy immediately.

Assignment Requirements

Read the scenario carefully and then research examples of cell phone policies and implementation. Write a report citing examples of at least three successful cell phone policy implementations found in your research. Indicate how you would analyze your organization, and then how you would identify and finalize a cell phone use policy for the organization. In addition, provide a rationale as to what types of business challenges would be overcome or enhanced.

Required Resources

  • Access to the Internet

Submission Requirements

  • Format: Microsoft Word
  • Font: Times News Roman, 12-Point, Double-Space
  • Citation Style: Your school’s preferred style guide
  • Length: 1–2 pages

Self-Assessment Checklist

  • I wrote an academic paper clearly.
  • I provided an adequate analysis.
  • I provided at least three applicable policy implementations.

E-Business Strategy – Paper discussing attached Amazon Article Paper and Memo to the CEO Amazon

Subhject: E-Business Strategy

Instruction:

* Read the attached Amazon Article. 

* Discuss the eight unique features Ubiquity,Global Reach,Universal Standards,Richness,Information Density,Interactivity,Personalization/Customization,Social Technology in relvant to article.

* Discuss Amazon’s dominance and disruption mentioned in the article. 

* Also, analyze the e-Business strategies discussed in the article and the impact these strategies have on the marketplace

Important DELIVERABLES: Two items:

————————————————–

*** Item # 1. A 4-5 paper with 4 minimum references.

*** Item # 2. A short memo to the CEO of Amazon stating your opinion of Amazon’s e-Business strategies.

Discussion

Discussion 4 – What is the role of NLP in text mining? Discuss the capabilities and limitations of NLP in the context of text mining.

Internet Exercise 7 – Go to kdnuggets.com. Explore the sections on applications as well as software. Find names of at least three additional packages for data mining and text mining.

Needs to be APA 7 formatted

APA Sources *

*Full PDF *

https://apastyle.apa.org/products/publication-manual-7th-edition-introduction.pdf?_ga=2.183019553.642115030.1600870599-379008561.1600870599

Sample Paper 

https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/apa_sample_paper.html

*APA 6 vs APA 7 *

https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_formatting_and_style_guide/apa_changes_7th_edition.html

Strategic Management

Read the attached case study answer the questions at the end of the text in a 2 and a half page paper (excluding title and reference pages) include at least three peer-reviewed sources found.

Note: My assignments will need actual references from EBSCO host, google scholar, and semantic scholar With a website link at the end.  Only use APA 7th edition. 

security architecture 9.1

 If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface? 

Assignment

 

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. 450 words minimum

In today’s fast-paced, often “agile” software development, how can the secure design be implemented?

No SQL

Introduction

NoSQL databases are systems designed to run without interruption of service. Many web-based businesses require data services that are available without interruption.

For example, databases that support online purchasing need to be available 24 hours a day, 7 days a week, 365 days a year.

Requirements

You will research the different strategies used by NoSQL databases to ensure high availability, and write a short report on your findings.

Here are the specific requirements:

1. Define what is high availability, and how to measure it.

2. Write a report to explain how a NoSQL database can be highly available. You must use specific examples of existing NoSQL databases in your answer (Identify 5 NoSQL databases. For each, explain the strategies for high availability.

3. The main part of the report should be no more than 600 words.

4. In a bibliography, include the references you used to write the body of the report.

5. Include a proper cover page for the report with:

a. The Assignment number and title

b. Your name and Student ID

c. The due date

ERM Week 2

Q1.  275 words

Enterprise Risk Management Integrating with Strategy and Performance Executive Summary. (2017, June). Retrieved from https://www.coso.org/Documents/2017-COSO-ERM-Integrating-with-Strategy-and-Performance-Executive-Summary.pdf

Do, H., Railwaywalla, M., & Thayer, J. (2016). Integration of ERM with Strategy (p. 35). Retrieved from Poole College of Management, NCSU website: https://erm.ncsu.edu/az/erm/i/chan/library/Integration_of_ERM_and_Strategy_Case_Study.pdf

  • Which case study in the paper among above two was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

Q2. research paper – SEPARATE Document – 5 full pages

  Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications. Your paper should meet these requirements: 

  • Be approximately 5 full pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Introduction to data mining

Question 1

Suppose that you are employed as a data mining consultant for an Internet search engine company. Describe how data mining can help the company by giving specific examples of how techniques, such as clustering, classification, association rule mining, and anomaly detection can be applied.

Question 2

Identify at least two advantages and two disadvantages of using color to visually represent information.

Question 3

Consider the XOR problem where there are four training points: (1, 1, −),(1, 0, +),(0, 1, +),(0, 0, −). Transform the data into the following feature space:

 Φ = (1, √ 2×1, √ 2×2, √ 2x1x2, x2 1, x2 2).

Find the maximum margin linear decision boundary in the transformed space.

Question 4

Consider the following set of candidate 3-itemsets: {1, 2, 3}, {1, 2, 6}, {1, 3, 4}, {2, 3, 4}, {2, 4, 5}, {3, 4, 6}, {4, 5, 6}

Construct a hash tree for the above candidate 3-itemsets. Assume the tree uses a hash function where all odd-numbered items are hashed to the left child of a node, while the even-numbered items are hashed to the right child. A candidate k-itemset is inserted into the tree by hashing on each successive item in the candidate and then following the appropriate branch of the tree according to the hash value. Once a leaf node is reached, the candidate is inserted based on one of the following conditions:

Condition 1: If the depth of the leaf node is equal to k (the root is assumed to be at depth 0), then the candidate is inserted regardless of the number of itemsets already stored at the node.

Condition 2: If the depth of the leaf node is less than k, then the candidate can be inserted as long as the number of itemsets stored at the node is less than maxsize. Assume maxsize = 2 for this question.

Condition 3: If the depth of the leaf node is less than k and the number of itemsets stored at the node is equal to maxsize, then the leaf node is converted into an internal node. New leaf nodes are created as children of the old leaf node. Candidate itemsets previously stored in the old leaf node are distributed to the children based on their hash values. The new candidate is also hashed to its appropriate leaf node.

How many leaf nodes are there in the candidate hash tree? How many internal nodes are there?

Consider a transaction that contains the following items: {1, 2, 3, 5, 6}. Using the hash tree constructed in part (a), which leaf nodes will be checked against the transaction? What are the candidate 3-itemsets contained in the transaction?

Question 5

Consider a group of documents that has been selected from a much larger set of diverse documents so that the selected documents are as dissimilar from one another as possible. If we consider documents that are not highly related (connected, similar) to one another as being anomalous, then all of the documents that we have selected might be classified as anomalies. Is it possible for a data set to consist only of anomalous objects or is this an abuse of the terminology?