week 6

application security  Write 200 to 300 words defining security policy conformance why it is important 

Discussion: Roles and Responsibilities in IT

 

In this module, you are learning about various IT disciplines, roles, and responsibilities in the field, and the certifications and degrees that equip you for those roles. In this discussion, you will examine various IT roles to find one of interest to you. You will learn about the skills and technologies used in these roles and how they can be transferred to other IT disciplines.

For your initial post, use a website such as the Bureau of Labor and Statistics Occupational Outlook Handbook or CompTIA’s Cyberstates Interactive Map to determine your areas of interest in the IT field. Then, choose a job title or role in that area of interest. In your post, describe how this role is situated within the broader IT fields discussed in this unit, and define the responsibilities of the role.

In your responses to your peers, discuss the job title or role they chose. In your response, describe the tools, skills, and certifications your peer would need to be successful in the identified role. Additionally, describe at least one other role that these skills and certifications could be used in.

To complete this assignment, review the Discussion Rubric.

paper-1

 

Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.

task is to write a 7-10 page paper discussing the following concepts:

  • Introduction
  • Why should an organization Implement an ERM application?
  • What are some key challenges and solutions to Implementing an ERM?
  • What is Important for an effective ERM?
  • Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
  • Conclusion, final thoughts for future research
  • Recommendation

Your paper should meet the following requirements:

  • 9 pages
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
    Be clearly and well-written, concise, and logical, using excellent grammar and style techniques.  

Assignment

Discussion 1 :   List and briefly describe the nine-step process in con-ducting a neural network project.

 Discussion #2: List and briefly explain different learning paradigms/ methods in AI.

 Discussion #3: What is representation learning, and how does it relate to machine learning and deep learning? 

Security Architecture.

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. Minimum length of 800 words.

  1. When should the architect begin the analysis?
  2. What are the activities the architect must execute?
  3. What is the set of knowledge domains applied to the analysis?
  4. What are the tips and tricks that make security architecture risk assessment easier?

Measurement Strategies

 Give one example of a data collection method used in one of the studies identified in your Week 5 project. What variable was this method used to measure? 

its531_wk2analysis

4. In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed. (Note: This is a class project.)

5. Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/ watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report.

15. Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recogni-tion product.