Data Analytics Project

THE PROCESS

1. SELECT a domain area of research (COVID-19 related) *Please chat with me for pre-approval

2.  FORMULATE a problem statement & hypothesis. describe the problem in details you wish to explore.

3. FRAME the question(s) according to your domain

a. Understand A Business

b. Understand A Stakeholders

4. OBTAIN data for your project 

a. Describe the Data: Information about the dataset itself, e.g., the attributes and attribute types, the number of instances, your target variable. 

5. SCRUB the data, this includes cleaning and preparing the data for analytic purposes

6. ANALYZE the data, looking for patterns and insights (EDA & Analytics) *Use Jupyter Notebook

7. SUMMARIZE your findings

you will analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure.

  you will analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.  

Wk 1 – Apply: Positive Rights Table

 Table to use is attached.

Complete a 1- to 2-page table using the Positive Rights Table Template provided comparing your opinion of the rights listed below to a corresponding ethical theory:

  • The right to a higher education
  • The right to private phone conversations
  • The right to health care
  • The right of a presidential or government candidate to receive time on television

List 1 ethical challenge that could impact a U.S. company that wants to acquire a non-U.S.-based company.

Discussion

 

  1. How many teams are involved in recovering the mission critical systems?
  2. What is the process to secure a high level of communication among the different teams in executing the DR plan?

threat-dis

 

Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

CC W 8 A 1

 Search the Internet for companies that supply utility computing. Select 2 or 3 companies and compare them to Amazon. What services do these companies provide? What promises do they make about availability?  Grammatical and mechanical errors will be checked.  

ITISP W 3 A

 

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

Your paper should meet the following requirements:

• Be approximately 4-6 pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion question, 350 words and 2 references.

Write a critical evaluation of your learning outcomes. In your response, consider:

1. The content of this class as they relate to Team Management and managerial decision making.

2. Base on the course content, discuss new skills you acquired from this class? How relevant are the new skills to your current and/or future profession?

3. How would you apply your new knowledge?