Final

 Please make  posts on the lessons learned for the Into to Data Mining course 

Syncsession

 

Write a 4-5 page paper (deliverable length does not include the title and reference pages)

  • What does the term intellectual property encompass, and why are organizations so concerned about protecting intellectual property?
  • What are the strengths and limitations of using copyrights, patents, and trade secret laws to protect intellectual property?
  • What is plagiarism, and what can be done to combat it?

Sync Sessions are held four times per term.  For the exact dates and times please check the course schedule under the Course Overview area.  To connect to a Sync Session, please click on the Sync Session Classroom area and select the appropriate session.

Due: Assignment is due Thursday of the second week in the module.

Solarwinds attack

Answer the following using the given link:- https://www.zdnet.com/article/third-malware-strain-discovered-in-solarwinds-supply-chain-attack/

Question 1: Explain the issue discussed as you understand it.

Question 2: Who is impacted? And how are they impacted?

Question 3: what are possible mitigations or ways to avoid the negative impacts?

Computer science

I did this project but I got some wrong steps.  I`m uploading the instructions and what I did too.

This is my teacher comment: Good job! Some points were deducted for formatting errors (margins were not customized, rubric does not all fit onto one page) and multiple spelling/typing errors. Otherwise, nice work! 

Cyber security mini project proposal and materials needed

Topic: Home Automation Security and Vulnerabilities (need 3 word copies)

1) Submit mini project Topic with brief explanation. ( Home Automation Security and Vulnerabilities ) due today

2) Submit a brief abstract describing your mini project. (2nd copy) 

3) Subit minsi project materials.(3rd copy)

600-800 words, double spaced, written in APA format, showing sources and a biblography

PLEC Week 4

 

Discuss in 500 words your opinion whether Edward Snowden is a hero or a criminal. You might consider the First Amendment and/or the public’s right to know as well as national security concerns. 

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.   Include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Do Not Doublespace.

Write in essay format not in bulleted, numbered or other list format.

Denial of Service Attack 2.0

  • Define a denial-of-service attack in your own words.
  • Explain how this type of attack can adversely impact infrastructure.
  • Explain methods organizations can implement to prevent DoS attacks from occurring.
    3000 words