Web server auditing

  

Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. provide an overview of how to audit the web server’s security and implement best practices.

week 6 doc

 Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case. 

Operational Excellence week -2

 Tell us about a time when you were leading a project and had to suddenly change direction. Who initiated the change? How did you handle the situation with the project team and other stakeholders? 

400 Words 

discussion

After completion of the week 3 assignment, please briefly describe and explain your recommendations for the manager in the assignment.  What tool or tools did you recommend and why?  In order to receive full credit, you must comment on two other classmates posts.

Assignment

  

Chapter #5: 

1. What is an artificial neural network and for what types of problems can it be used? 

2. Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial ones? What aspects are similar? 

3. What are the most common ANN architectures? For what types of problems can they be used? 

4. ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode. 

5. Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding. 

6. Go to neuroshell.com. Look at Gee Whiz examples. Comment on the feasibility of achieving the results claimed by the developers of this neural network model. 

Chapter #6: 

1. What is deep learning? What can deep learning do that traditional machine-learning methods cannot? 

2. List and briefly explain different learning paradigms/ methods in AI. 

3. What is representation learning, and how does it relate to machine learning and deep learning? 

4. List and briefly describe the most commonly used ANN activation functions. 

5. What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN 

6. Cognitive computing has become a popular term to define and characterize the extent of the ability of machines/ computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real-world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report. 

Discuss data visualization

 Discuss the data visualization in the attached file below (Data Visualization Example) and mention what was right and what did not work? How could you make it better? I want you to respond to at least three other posts to receive points. You can use the attached data file below (Example Data File) to create a better visualization. 

Policy and legal_Week 12

This quiz is based on the material in Chapter 7 of the text. 

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. Describe Digital Literacy (how to know what is real on the web). 

2. None of these people exist. What does this mean to you?

3. Why is Wikipedia more reliable than a paper encyclopedia?

4. How useful are crowd sources answers?

5. What are some drawbacks to crowd sourced answers?

6. Do people generally utilize the diversity of sources on the Internet effectively?

7. How reliant are we and how reliant should we be on getting our news from social media?

8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?

9. If models are simplifications or reality, why do we rely on them?

10. Why was this model, used by Amazon for hiring, wrong?

11. Why did Skynet declare war on the human race?

3 Discussions S

Discussion 1.2

What is so special about GIS? Is GIS art or Science?

Discussion 2.1

What is the difference between GIS and CAD? Why GIS and CAD both exist?

Discussion 2.2

Imagine you are looking at a geodatabase that contains 50 states, 500 cities, and 100 rivers. How many feature classes are there? How many features? How many attribute tables? How many total records in all the attribute tables? 

Networking

 1) Name the three essential elements of a basic structured cabling network? How are they installed and what are the components that are involved with them?   (300 words)

Need to 2 Replies discussion for same question for 150 words too.

MeetMe vs Facebook

-Visit MeetMe website and compare it to Facebook. In what ways is it similar to Facebook, and in what ways is it different? Which do you prefer, and why?

-MeetMe- another social network aimed at meeting new people

-2pages worth APA style

-Reference page