Cyber security Research paper

  

The Research Report, select one of the following research areas:

i) Cyber Security and INTRANET Cloud Computing 

ii) Cyber Security and EXTRANET Cloud Computing 

iii) Cyber Security and Machine Learning

iv) Cyber Security and Artificial Intelligence

v) Cyber Security and Internet of Things (IoT)

vi) Cyber Security and Robotics

vii) Cyber Security and Medical Technology

Computer security

Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment. Please complete this and upload your work by clicking the BLUE LINK ABOVE (as a WORD DOCUMENT).

Testing Hypotheses

 

In this assignment, you will test for a significant difference between the average resting heart rate of males and the average resting heart rate of females in your heart rate data.  You have observed that the mean rates are not exactly the same but are they significantly different?  You may use either of the two methods for testing a hypothesis illustrated in Realizeit:  compare the two confidence intervals or use the data analysis tool to run a two-sample test with unequal variances as shown in the topic of testing two-samples.

Steps

  1. Write the null hypotheses being tested
  2. Run the analysis either by using data analysis and the two-sample test or by comparing the two confidence intervals
  3. Interpret your data to determine if the resting male heart rate is the same as the resting female heart rate. Remember we are looking for whether the difference is a significant one, not just whether they are not the same.

Additional Instructions:

Your assignment should be typed into a Word or other word processing document, formatted in APA style. 

discussion

 

Discussion

R is a language and environment for statistical computing and graphics. It is a GNU project which is similar to the S language and environment which was developed at Bell Laboratories (formerly AT&T, now Lucent Technologies) by John Chambers and colleagues. R can be considered as a different implementation of S. There are some important differences, but much code written for S runs unaltered under R.

Reply post

Why are statistical programming languages important to data scientists? What are some advantages and disadvantages the R programming language has over the other main statistical programming languages (i.e. Python, SAS, SQL)?

When replying to a classmate, offer your opinion on what they posted comparing the R programming language to the other statistical programming languages. Using at least 3 – 5 sentences, explain why you agreed or disagreed with their evaluation of the different statistical programming languages.

Data Center Security

Write about Data Center Security in 700 Words  double spaced paper, written in APA format, showing sources and a bibliography  and also prepare PPT consisting of 10-12 slides about Data Center Security

Discussion: Multilayer User Access Control

 

Learning Objectives and Outcomes

  • Identify what implementation method(s) can be used to incorporate multilayer access control
  • Describe and how each method benefits multilayered access control.

Assignment Requirements

Read the worksheet named “Multilayer User Access Control” and address the following:

Using what you have learned about building a multilayer access control system, identify what implementation method(s) can be used and how each method benefits multilayered access control.

Course Reflection

  

Summative Discussion Board

Review and reflect on the knowledge that you have gained from this course. Based on your review and reflection, write at least 3 paragraphs that address the following:

  • How will you continue to grow your  skills in quantitative analysis?
  • How has this course changed your  perception of use of the quantitative method for dissertation research?
  • What approaches could have yielded  additional valuable information? 

The main post should include at least 1 reference to research sources, and all sources should be cited using APA format.

Topics Discussed in this Course

IBM SPSS tool 

Quantitative research

Categorical Variablke Analysis 

Survey Analaysis

Variable and types of variance

Measure of Central tendency and spread

Parametric and Non parametric tests

Chi Square Analysis and cross tabs 

Corelation and Regression Analysis and Effect Size

Linear Regression Analysis

Quantitative literature review

For the final project, you will be conducting a forensics investigation using one of the following items: A smartphone A network (ideally, a wireless network)

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.