Create a Project Proposal

  Create 3-4 pages project proposal for the below scenario : attached the project  proposal template. 

  • Develop a project definition and scope that defines the project and articulates the business context for the project.
  • Identify problems that the proposed system is expected to solve (or opportunities the proposed project is expected to produce).
  • Create project objectives.
  • Create the project methodology or game plan.
  • Compile a high-level schedule for completing the project scope.

Scenario B: Internet Bank 

Imagine you work for a start-up company that is launching an internet bank. The internet bank will provide the following financial products and services to its customers:

· Accounts and deposits

· Credit, debit, and travel cards

· Loans

· Insurance

· Investments

· Tax services

Senior management and investors have identified the following key technical factors for the success of the internet bank:

· Scalability: The technology and software application infrastructure must accommodate high growth and new users without impacting the service levels delivered to existing users.

· Availability: Users must be supported with robust, consistent, and reliable access; excellent performance 24 hours a day, 7 days a week.

· Security: Industry-accepted security practices and a multi-level authentication system have to be put in place to authenticate and identify each user before they access their accounts and initiate transactions.

· Manageability: The technology and software applications infrastructure must be easy to manage, support, and update. 

You have been assigned to analyze your organization and develop a technical architecture to support the business processes of this internet bank.

linux

 What makes something a script versus a program?  Based on your research, describe what you think the differences are between a script and a program. What is each item better at? Describe a situation where you would use each. 

Assignment_DataScience

Data Science is a vastly growing field. Part of what makes this such a significant field to be in is its applicability to many other fields and nearly every industry. One of these is Artificial Intelligence (AI). Specifically, artificial neural networks (ANN) is a sub-field of AI. The topic is addressed beginning on page 249 of the text. The text notes issues with deep learning based on the vanishing gradient problem’s effect on learning. This is rather significant as it has made for ineffective learning, poor training, and test performance.

From the readings, intuitive reasoning, and experience, these (deep learning and vanishing gradient) appear to be related. Describe how these are related. While this is the case, also describe how these are different.

Need 3 pages with APA format and references as well.
This is ISBN of the text:9780133128901

EH Week14 P14

 

Hello,

i need this paper by 12/02 afternoon.

Strictly No plagiarism please use your own words.

please review the attachment

Assignment Questions:

  1. What is multifactor authentication and what are some examples?
  2. Ending all online crime is not a realistic goal, but simple steps can massively reduce the likelihood you’ll be the next victim.  Explain how multifactor authentication works.
  3. List 5 reasons to turn on multifactor authentication?
  4. Provide at least two additional links to articles related to multifactor authentication.

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

User Training

Topic: What kind of user training should be conducted to deal with the issue of noise. How do you strike a balance between being overwhelmed with false positives and the danger of ignoring true incidents?  What effects would false positives have on an organization?  Make sure to cite your sources.[500 words]

Assignment should follow all APA rules and include a min. of (1) citation/reference

social engineering attack (Cyber Security)

 

You have a new CEO (this is the same new CEO from Weeks 8 and 9). They are non-technical and came to your organization from a completely different market segment. You’ve been tasked with training this CEO on how to spot and avoid falling victim to a social engineering attack. You will also develop a pretend phishing email to test the CEO to see how much your training worked.

Use any persuasive techniques you have at your disposal. If you need to draw pictures, draw pictures. Slides, infographics, interpretive dance – any of these can be used to convey to the CEO what social engineering is and how to avoid falling prey. If you use something other than a letter or memo you’ll need an introductory document (yes, with letterhead!)

For the phishing email, you can type it out in Microsoft Word. It is understood that the phishing email might not be grammatically correct.

***Give your CEO a name. CEOs can be any gender***

Data Elements

Criteria of security decision-makers use to evaluate the trustworthiness of a data center for critical data?

“please provide a brief explanation of how the position (as a Mobile Application Developer) for which you are applying for CPT approval directly relates to your program of study (Ph.D IT). Please be sure to write clearly and legibly!”

Hi,

I need to submit this answer asap. if anyone can briefly provide me the best unique answer that would be really helpful. 

My Roles and Responsibilities as a Mobile Application Developer relates to IT

Detailed Scope of work:

 Support and enhance the development of the AISD Mobile application

 Experience with Tabris.js or other mobile development platforms.

 Strong Experience in JavaScript required.

 Experience with Node, React, Java, NPM, XML, OOP, UI/UX, NoSQL, GIT, MVC

o

Mobile app development Objective C/Swift – Apple, Gradle/Kotlin – And

roid

o Apache Cordova/Adobe Phone Gap

o Component based frameworks

o Developing and working with APIs

o Google Firebase and Cloud Console

 Assist Programmers with the development of multiple Java applications.

o

Applications must authenticate using single sign‐on (SSO) through our portal

, preferably   using SAML or Oauth2 for authentication.

 Experience with SAML

 Experience with Oauth2

 Experience with unit testing, Spring 5, Spring Boot, and Training/Mentoring

developers.

 Vue.js

 Hibernate