BI and Chryptography

Q1. evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES. You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted. (250 to 300 words)

Q2. What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?Your response should be 250-300 words.  There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q3.List and briefly describe the nine-step process in con-ducting a neural network project.Your response should be 250-300 words. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q4. Complete the following assignment in one MS word document and include at least two APA formatted references (and APA in-text citations) to support the work this week. (Each below question 150 words)

1.What is an artificial neural network and for what types of problems can it be used?

2.Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by arti- ficial ones? What aspects are similar?

3.What are the most common ANN architectures? For what types of problems can they be used?4.ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.

5.Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe com- monalities and differences among their findings and prepare a report to summarize your understanding.

6.What is deep learning? What can deep learning do that traditional machine-learning methods cannot?

7.List and briefly explain different learning paradigms/ methods in AI.

8.What is representation learning, and how does it relate to machine learning and deep learning? 

9.List and briefly describe the most commonly used ANN activation functions.

10. What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.

11. Cognitive computing has be come a popular term to define and characterize the extent of the ability of machines/ computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real- world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report.

Cyber security planning and management – research

Select ONE ARTICLE from the following links and summarize the reading in your own words. 

Your summary should be 2-3 paragraphs in length and uploaded as a WORD DOCUMENT. 

There is an EXAMPLE attached to show you the format requirements. (Attached)

Plagiarism is unacceptable. 

http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html

https://www.lifewire.com/learn-how-antivirus-4102748

http://www.sans.org/newsletters/

http://news.cnet.com/security/ https://www.onlinesecurity.com/news–publications-page http://www.esecurityplanet.com/views http://netsecurity.about.com/

Access Control Discussion

Describe Access Controls that you have utilized in your career or personal life.  APA formatting is expected for any references.  Initial posts due by Thursday end of day and two peer responses due by the end of the unit.  

Cloud Computing and Digital Forensics

1.) Discuss in 500 words or more  federated architecture in cloud systems. Remember that this is a cloud class not a database class. 

Use at least three sources. Use the Research Databases available from the Danforth Library  as your first choice. 

Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  

Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs. Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

2.) Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

Write your answer using a WORD document. 

300 words discussion

One of the hardest tasks you may face in Web Analytics is to convince persons outside of your team or department of the importance of the reports and KPI’s that tell the story of how well or bad you are doing with your website. Communicating your information effectively to Management and the Board of Directors, whom we will call the stakeholders, can be a daunting task, they just do not have the time to understand the details of the reports you offer. Therefore, to communicate your information, you will have to learn how to summarize and format your reports in abridged versions.

Please explain the following:
300 Words Minimum 

Explain what KPIs are they designed to accomplish.
Describe how to prepare a KPI.
Explain how you would present your KPI to the Stakeholders, in brief. 

Full Disk Encryption

  

Preamble

An organization chief executive officer (CEO) was suspected of fraud, and digital forensic investigators were assigned to acquire a forensic duplicate of his laptop without his knowledge, and his laptop was configured with full disk encryption. 

Restrain 

The best option was to shut down the laptop, create a forensic duplicate of the hard drive, and decrypt the hard drive using an administrative decryption key. Notably, investigators had insufficient time for such laid down approach. 

Plan of Action

The forensic duplicate of the data must be acquired from the live laptop while the system was left running in the chief executive Officer’s unit. The CEO was called out for an interview germane to the suspected fraud charges. The digital forensic investigators were then, able to interact with the CEO’s laptop, made changes to the system, acquire vital data on the laptop hard drive in an unencrypted format, including deleted data. 

Lack of Decorum 

During the acquisition process, digital investigators documented findings and enabled unauthorized access to concluding evidence. It must be recognized and acknowledged that the fundamental principle for handling forensic investigation in the most unstable environment, such as the CEO’s office, is not a smooth sailing event. Also, forensic investigators must be incredibly careful not to violate any laws and give rise to liability.

Answer All Questions (1:1 – 1:6)

Question 1:1 Do you, as an investigator, believe that forensic investigators charged with the case vehemently violated the laws and rise to liability?

Question 1:2 Do you, as an investigator, have confidence and willing to support digital forensic investigator’s conclusive evidence of this case in court?

Scenario: Try extremely hard to make allowances for forensic investigators’ operation in the most uneven crime scene to avoid breaching the fundamental principle of forensic investigation. 

Question 1:3 Provide a comprehensive plan of action to guide digital forensic investigators in an unbalanced crime scene of this nature. 

Question 1:4 Do you support the option that digital forensic investigators charged with this case should have obtained extra search warrant?

Question 1:5 Describe the Benefits and Drawbacks of Search Warrant on the organization’s Chief Executive Officer in such a given situation.

Question 1:6 Describe the Benefits and Drawbacks of extra Search Warrant on forensic investigators in the same given situation.

Presentation Computer Science(( must complete in 6hrs ))

Instructions

Explain and provide example when it is possible that will cover chapter 4 subjects:

Data Link Layer

Media Access Control•

Controlled Access•                         Contention Access–                  ErrorControl•                                Prevention•                                     Detection•                                     Correction–                                      Protocols•                                            Async•                                                   SDLC•                                                Ethernet•                                                 PPP–Transmission Efficiency and Throughput

Additionals resources

https://www.csus.edu/indiv/m/millerd/Ch4%20Ed7%20Notes.ppt

LOOKING FOR NATIVE WRITERS

Looking For Native Writers

I am Looking for  *EXPERIENCED* Writers that can be able to handle 10-20 pages a day with, Top notch Grammar. Well constructed Paragraphs with Topic Sentences. They should be familiar with Spss and Data analysis tools will be an advantage

If you know you can’t meet High grammatical standards don’t engage me. 

Email your samples to firstlanedollarshumanresource at g.m.a.i.l c.o.m indicating your name in the subject of your email and phone number

Call 0700152748

week 3 progress log

 

Beginning in week one, you should keep track of the time that  you spend on the planning, design, and implementation of this project.  Every week you will complete the Weekly Work Log and Hands-on Progress  Report that you started in Unit 1.  

This is a living document.

Each week you will add on to the log that you had saved for the  prior week. For example, in Unit 3, you will have Unit 1, Unit 2, and  Unit 3 work activities documented. 

After completing it for the week, you will submit your work every week.