BSWP Week 4

Assignment on secure passwords. 

Then pick and three passwords: one not secure, one acceptable, and one very secure. Then write a brief description of the passwords you have chosen, indicating why they are secure or not secure. 

Post between 200 and 300 words. 

Organ Leader & Decision Making (reflection)

  

This discussion topic is to be reflective of the course material.  Therefore, use your own words to respond to the following questions:

1. What other topics would you have liked to have covered in this course?

2. What reading did you find most interesting and why?

3. How has this course changed your perspective or outlook moving forward?

4. Any other topic of interest that you would like to add.

Cloud Computing Research paper

For this project, select an organization that has leveraged Cloud Computing technologies to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.

  • Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
  • Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
  • Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
  • Conclusion:  Summarize the most important ideas from the paper and make recommendations or how they might have achieved even greater success.

  • The paper must adhere to APA guidelines including Title and Reference pages.  
  • There should be at least three scholarly sources listed on the reference page.  
  • Each source should be cited in the body of the paper to give credit where due.  
  • Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. 
  • The body of the paper should be 3 – 5 pages in length.  
  • The Title and Reference pages do not count towards the page count requirement

Case Study – Filecoin

Please read the Filecoin case study (see HBS Coursepack) and answer the following questions with substantive answers in a cohesive essay. Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc. 

Youtube link to get started: https://www.youtube.com/watch?v=EClPAFPeXIQ&feature=emb_logo

1. How did Filecoin conduct its ICO?

2. How is Filecoin’s ICO similar to and different from:    a) an equity IPO?    b) a crowdfunding initiative on, for example, Kickstarter, Indiegogo, GoFundMe?

3. What are the pros and cons of Filecoin conducting a fundraising through an ICO?

4. Why should investors be attracted to Filecoin?

5. Why should be wary of Filecoin?

6. Why are regulators encouraging or opposing ICOs?

7. What have some regulators done in response to ICOs?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page.

Pick one of the following for your Big Data Research paper?

 Articles to read:

 

Marcu, D., & Danubianu, M. (2019). Learning Analytics or Educational Data Mining? This is the Question. BRAIN: Broad Research in Artificial Intelligence & Neuroscience, 10, 1–14. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=a9h&AN=139367236&site=eds-live

Hariri,  R.H., Fredericks, E.M. & Bowers, K.M. (2019). Uncertainty in big  data analytics: survey, opportunities, and challenges. Journal of Big Data, 6: 44. https://doi.org/10.1186/s40537-019-0206-3

Question:

While  this weeks topic highlighted the uncertainty of Big Data, the author  identified the following as areas for future research.  Pick one of the  following for your Research paper:

  • Additional  study must be performed on the interactions between each big data  characteristic, as they do not exist separately but naturally interact  in the real world.
  • The scalability and efficacy of existing analytics techniques being applied to big data must be empirically examined.
  • New  techniques and algorithms must be developed in ML and NLP to handle the  real-time needs for decisions made based on enormous amounts of data.
  • More  work is necessary on how to efficiently model uncertainty in ML and  NLP, as well as how to represent uncertainty resulting from big data  analytics.
  • Since  the CI algorithms are able to find an approximate solution within a  reasonable time, they have been used to tackle ML problems and  uncertainty challenges in data analytics and process in recent years.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at  least two scholarly journal articles to support your positions, claims,  and observations, in addition to your textbook. The UC Library is a  great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.

Machine learning Project

Machine Learning Course Project 

 

 This course project is an opportunity for you to explore a machine learning problem of your choice. 

 There are many datasets out there. UC Irvine has a repository that could be useful for you project: 

  using this link (http://archive.ics.uci.edu/ml/index.php)

Project guideline

**Classifier Implementation 

Implement a classifier or classification algorithm. It can be any classification algorithms we learned or have not learned in the class. 

1. Project Proposal should be 1 page long and Include the following information: 

-Project title; 

-The name of classifier or classification algorithm that you will implement; 

-The programming language you will use; 

-The format of training data you will use, i.e., the source of data set, the attributes’ types, the range of attributes’ values, the size of training set, etc. 

2. Project Report should be maximally 8 pages long and be written by using this link( https://nips.cc/Conferences/2020/PaperInformation/StyleFiles) 

and Include the following information: 

-Abstract 

-The description of implementation process, such as flowchart, functions, pseudocode, or partial codes;

-The description about 1) using training set to build the classifier, and 2) applying the classifier on a small amount of test instances. That is to show how your classifier works, as well as the training errors and test errors. 

-Conclusion 

3. Presentation (10 ~ 20 pages)

-Explain the source code files; 

-Present how your classifier works; 

-Evaluate your classifier. 

Data Science & Big Data Analy

 This week’s reading centered around how Big Data analytics can be used with Smart Cities. This is exciting and can provide many benefits to individuals as well as organizations. For this week’s research assignment, You are to search the Internet for other uses of Big Data in RADICAL platforms. Please pick an organization or two and discuss the usage of big data in RADICAL platforms including how big data analytics is used in those situations as well as with Smart Cities. Be sure to use the UC Library for scholarly research. Google Scholar is the 2nd best option to use for research. 

 paper should meet these requirements:

  • Be approximately 5 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

intext ciations,references,quality work,no plagrism.please plagrism report

Week 2 Discussion: Data Classification and Data Loss Prevention

 

Before you begin: review the information provided in this resource: https://www.pic.gov/sites/default/files/RACI%20Chart%20Overview%20v2.pdf

It takes a team of individuals throughout an organization who work together to safeguard the integrity and confidentiality of data resources. But, how does an organization know that it has enough people in the right roles performing the right tasks to ensure that digital assets will be protected from loss or harm?

The RACI matrix is a tool that can be used to outline the various roles and responsibilities required to provide this protection. For this discussion, you will prepare a RACI matrix that outlines roles of key players in the organization who have data protection responsibilities (i.e. asset security and data protection). Your matrix should specifically address executives (C-level), managers, supervisors, employees. The tasks that you should address are: generating information, using information, classifying information, and managing / using / implementing data loss prevention technologies.

After you have completed your chart, write a brief discussion of responsibilities for each role listed in the rows of your chart. Each role should be addressed in a separate paragraph.

Combine your matrix and your narrative descriptions into a briefing paper for a working group that has been charged with reviewing and improving the company’s data classification business processes. Post your paper in the body of your reply to this topic.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting. Use a consistent and professional style for your citations and reference list entries. (Hanging indent is NOT required.)

Assignment and Discussion

 

Week 9 – Discussion

In a corporate, networked setting, should end users be allowed to install applications on their company workstations, whether the applications are on a DVD or downloaded from the Internet? Be sure to weigh security against usability. 

 

Internet Research – Wk 9

For this assignment, you are asked to locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed. 

 

Week 9 Discussion – The Remote Worker

 In no less than 250 words, describe a solution to securely connect a remote worker from their home and connected to the Internet to their company network.  How does this solution work and what is needed on the company network and the remote worker’s network to accomplish your solution?  Respond to two other learners by the end of the week. 

   

Week 9 Assignment

  • 9.1 Give examples of applications of IPsec.
  • 9.2 What services are provided by IPsec?
  • 9.3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
  • 9.4 What is the difference between transport mode and tunnel mode?
  • 9.5 What is a replay attack?
  • 9.6 Why does ESP include a padding field?
  • 9.7 What are the basic approaches to bundling SAs?
  • 9.8 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?