DIscussion1

 

using the Erl et al. (2013) book as your ONLY source, respond to the following:

  1.  IN YOUR OWN WORDS, define Identity and Access Management (IAM) and explain its importance to organizations.
  2. Erl et al. noted that “IAM  mechanisms exist as systems of four components.” List three of  these components and ways each is vital to organizational success.

Big Data and Data Analytics on Social Media

  Write a 12 pages research paper on Big Data and Data Analytics on Social Media

Big Data and Data Analytics on Social Media

     

Cover: 

Include   the names of those who participated in the project

Table   of contents: 

Use   a Microsoft Enabled Table of Contents feature.

Background:   

Describe   the issue, discuss the problem, and elaborate on any previous attempts to   examine that issue.

Research   Questions:

In   your identified problem area that you are discussing, what were the research   questions that were asked?

Methodology:

What   approach did the researcher use, qualitative, quantitative, survey, case   study? Describe the population that was chosen.

Data   Analysis:

What   were some of the findings, for example, if there were any hypotheses asked,   were they supported?

Conclusions:

What   was the conclusion of any data collections, e.g., were research questions   answered, were hypotheses supported?

Discussion:

Here   you can expand on the research and what the big picture means, how do the   results found in your literature review help organizations with the problems   of handling, managing and safeguarding all this data. What do you see as   long-term impacts and what further research could be done in the field?

References:

Include   at least ten scholarly references in APA format.

(a) Provide a background of the company chosen. 

(b) Determine the problems or opportunities that that this project will solve. What is the value of the project? 

(c) Describe the impact of the problem. In other words, is the organization suffering financial losses? Are there opportunities that are not exploited? 

(d) Provide a clear description regarding the metrics your team will use to measure performance. Please include a discussion pertaining to the key performance indicators (KPIs). 

(e) Recommend a big data tool that will help you solve your problem or exploit the opportunity, such as Hadoop, Cloudera, MongoDB, or Hive. 

(f) Evaluate the data requirements. Here are questions to consider: What type of data is needed? Where can you find the data? How can the data be collected? How can you verify the integrity of the data? 

(g) Discuss the gaps that you will need to bridge. Will you need help from vendors to do this work? Is it necessary to secure the services of other subject matter experts (SMEs)? 

(h) What type of project management approach will you use this initiative? Agile? Waterfall? Hybrid? Please provide a justification for the selected approach. 

(i) Provide a summary and conclusion. 

(j) Your written paper must have at least 10 reputable sources and 10-to-15-pages. 

(k) Please write the paper in APA Style

project 3

 

Class Discussion Topics

prepare 2 slide powerpoint for each question with diagram too 

  1. Discuss the pros and cons of the memory management schemes presented in this chapter. If given an option, which scheme would you implement and why?
  2. Discuss the difference between associative memory and cache memory and the steps involved in using these types of memory.
Projects

write 2 page paper for each question 

  1. Choose an operating system and submit a report on approaches to manage its virtual memory.  
  2. Working in teams of four, write pseudocode for the first-in-first-out (FIFO) and least-recently-used (LRU) page replacement policies.

User Interface Design Document.

  

Assignment:

create a User Interface Design Document for this desktop part of the vehicle of interest application. 

The project background and requirements information are attached. Take the template User Interface Design Template and complete it for your design. 

You are to use Pencil GUI Designer for screen mockups.

This design must conform to good design standards.

Cyber Law – assignment 1

 Using a Microsoft Word document, please define:

·        Internet/World Wide Web

·        Transmission Control/Internet Protocol (TCP/IP)

·        Packet

·        Router

·        Domain Name Service (DNS)

No word count specified. Please add references.

Team management

 What other areas of organizational behavior or design are impacted by information technology, and what are the implications for organizational change? 

Linux Implementation Proposal: Training Guide

 

Linux Implementation Proposal: Training Guide

Hide Assignment InformationTurnitin®Turnitin® enabledThis assignment will be submitted to Turnitin®.Instructions

You’ve won the business! Faster Computing has agreed to the project. As the final stage of pre-implementation, you have been asked to produce a training guide that will demonstrate how to install Linux and provide an overview of several common commands, as follows:

(11.1.3: Install the software.) 

  • Use a hypervisor of your choice to install Linux. Many hypervisors are available, such as Oracle’s VirtualBox, which is a free download. In addition, as part of UMGC’s agreement with VMware, you can download VMware Workstation for free. See below for specific screenshot requirements. You should include at least 3 screenshots (e.g., disk partitioning, timezone selection, creating the default account). Each screenshot should be accompanied by a brief explanation of what you did.
    NOTE: It is not necessary to include screenshots of installing the hypervisor software.

(1.2.3: Explain specialized terms or concepts to facilitate audience comprehension.)

  • Demonstrate command-line operations that will provide the following information:
    • A listing of files in a directory and common file attributes
    • The current directory (hint: also known as the present working directory)
    • Create a file, then copy it to a different directory
    • Create a second file and move it to a different directory
    • Remove the first file, as well as the copy you created
    • The manual page for a given command
    • Create a text file, then use an editor to modify the content. Then display the content of the modified file

(1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience.)

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., ls, cp, mv, rm) in your documentation as well as in your screenshots. 

(11.2.1: Configure technology according to stakeholder specifications and requirements.)

  • Show running processes on the system. Demonstrate how to search for a specific process
  • Forcibly stop a running process

In the above section (demonstrate CLI operations) show the commands with options/arguments (e.g., top, kill, -9, ps) in your documentation as well as in your screenshots. 

(13.1.1: Create documentation appropriate to the stakeholder.)

The deliverable for the final phase of the project is a written paper with screenshots. There is no minimum or maximum page requirement, but all of the requirements must be met.  Use the Training Guide Template to record your work. This section will be graded upon the overall usefulness of the training guide to the organization.

(11.3.1: Add and update systems as required.) 

This portion of the training guide helps determine your submission is unique.

Important Requirement

On the final screenshot, you need to open a command line and type in the following commands (without the quotes):

“date”

“echo CMIT391”

“echo ” (Replace your name here with your name)

The recommended format is to provide screenshots incorporated within the written narrative. The screenshots must all be your own. Screenshots from external sources are not permitted. You must include the specific screenshot listed above or your project will not be accepted.

(1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension.)

The training guide must have a cover page, an introduction, summary, and at least 3-5 references.

(1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal.)

Employ proper spelling and grammar. All Linux commands must be lower case.

(2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions.)

In your conclusion of at least a paragraph, summarize why using Linux is beneficial for employees, management, and the organization as a whole.

How Will My Work Be Evaluated?

In this training guide, you will demonstrate how to install Linux and provide an overview of common commands for your client/customer. You’ll be combining your technical skills with effective communication techniques to provide learning resources for the client/customer.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.4: Explain the relationship between the ideas presented to enhance clarity and comprehension. 
  • 1.2.2: Employ a format, style, and tone appropriate to the audience, context, and goal. 
  • 1.2.3: Explain specialized terms or concepts to facilitate audience comprehension. 
  • 1.4.2: Use vocabulary appropriate for the discipline, genre, and intended audience. 
  • 2.2.3: Explain the assumptions underlying viewpoints, solutions, or conclusions. 
  • 11.1.3: Install the software. 
  • 11.2.1: Configure technology according to stakeholder specifications and requirements. 
  • 11.3.1: Add and update systems as required. 
  • 13.1.1: Create documentation appropriate to the stakeholder. 

Week 2 Discussion: Data Classification and Data Loss Prevention

 

Before you begin: review the information provided in this resource: https://www.pic.gov/sites/default/files/RACI%20Chart%20Overview%20v2.pdf

It takes a team of individuals throughout an organization who work together to safeguard the integrity and confidentiality of data resources. But, how does an organization know that it has enough people in the right roles performing the right tasks to ensure that digital assets will be protected from loss or harm?

The RACI matrix is a tool that can be used to outline the various roles and responsibilities required to provide this protection. For this discussion, you will prepare a RACI matrix that outlines roles of key players in the organization who have data protection responsibilities (i.e. asset security and data protection). Your matrix should specifically address executives (C-level), managers, supervisors, employees. The tasks that you should address are: generating information, using information, classifying information, and managing / using / implementing data loss prevention technologies.

After you have completed your chart, write a brief discussion of responsibilities for each role listed in the rows of your chart. Each role should be addressed in a separate paragraph.

Combine your matrix and your narrative descriptions into a briefing paper for a working group that has been charged with reviewing and improving the company’s data classification business processes. Post your paper in the body of your reply to this topic.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting. Use a consistent and professional style for your citations and reference list entries. (Hanging indent is NOT required.)

Threat modeling

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

 Course Textbook: Chapter 8

Cagnazzo, M., Hertlein, M., Holz, T., & Pohlmann, N. (2018). Threat Modeling for Mobile Health Systesm. ResearchGate. http://10.1109/WCNCW.2018.8369033

Ruiz, N., Bargal, S.A., & Sclaroff, S. (2020). Disrupting DeepFakes: Adversarial Attacks Against Conditional Image Translation Networks and Facial Manipulation Systems.

  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

AmazonEcho

  

Instructions

1. Please read these two articles: 

· Using forensics against a fitbit device to solve a murder:  https://www.cbsnews.com/news/the-fitbit-alibi-21st-century-technology-used-to-help-solve-wisconsin-moms-murder/

· How Amazon Echo could be forensically analyzed! https://www.theverge.com/2017/1/6/14189384/amazon-echo-murder-evidence-surveillance-data

2. Then go around in your residence / dwelling (home, apartment, condo, etc) and be creative.

3.  Identify at least five appliances or devices that you THINK could be forensically analyzed and then identify how this might be useful in an investigation. Note – do not count your computer or mobile device. Those are obvious!

4. I expect at least one paragraph answer for each device. 

Why did I assign this? 

The goal is to have you start THINKING about how any device, that is capable of holding electronic data (and transmitting to the Internet) could be useful in a particular investigation!