BI and Chryptography

Q1. evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES. You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted. (250 to 300 words)

Q2. What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?Your response should be 250-300 words.  There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q3.List and briefly describe the nine-step process in con-ducting a neural network project.Your response should be 250-300 words. There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q4. Complete the following assignment in one MS word document and include at least two APA formatted references (and APA in-text citations) to support the work this week. (Each below question 150 words)

1.What is an artificial neural network and for what types of problems can it be used?

2.Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by arti- ficial ones? What aspects are similar?

3.What are the most common ANN architectures? For what types of problems can they be used?4.ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.

5.Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe com- monalities and differences among their findings and prepare a report to summarize your understanding.

6.What is deep learning? What can deep learning do that traditional machine-learning methods cannot?

7.List and briefly explain different learning paradigms/ methods in AI.

8.What is representation learning, and how does it relate to machine learning and deep learning? 

9.List and briefly describe the most commonly used ANN activation functions.

10. What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.

11. Cognitive computing has be come a popular term to define and characterize the extent of the ability of machines/ computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real- world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report.

ET WK3 – S

 Research Paper – 5 Full pages

Contingency Planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:

(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.

Your paper should meet these requirements:

  • Be approximately 5 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques

 Wang, H.-M. (2003). Contingency planning: emergency preparedness for terrorist attacks.  IEEE 37th Annual 2003 International Carnahan Conference OnSecurity Technology, 2003. Proceedings., Security Technology, 2003. Proceedings. IEEE 37th Annual 2003 International Carnahan Conference on, Security Technology, 535–543. https://doi.org/10.1109/CCST.2003.1297616 

Parametric and Non Parametric Analyses

 

Part 1

A principal wants to determine if a new ACT preparation program is effective. The data are contained in the schools.sav data file. Open the schools.sav file in SPSS. Use SPSS to determine whether a significant improvement existed between student performance on ACT tests in 1993 (act93) and ACT tests in 1994 (act94). Assume that the same students were involved in 1993 and 1994 testing. (This requires a t-test. Review Chapter 10 of the Green & Salkind text for information on paired t-tests and reporting APA results interpretation and writing.)

Create a report that answers the principal’s question. Write these conclusions in formal APA results format. Include your SPSS output to support your conclusion.

Part 2

A pharmaceutical company wants to determine whether there is a need for a new medication based on the data in the electric.sav file. Specifically, they want to determine whether a person is alive or dead 10 years after a coronary incident and whether that is reflected in a significant difference in the patients’ cholesterol levels (chol58) taken when the event occurred. Use chol58 as a dependent variable and VITAL10 as your independent variable. Complete the following:

  • Analyze these conditions to determine whether there is a significant difference between the cholesterol levels (vital10) of those who are alive 10 years later compared to those who died within 10 years.
  • Include the SPSS output, which validates your conclusion.
  • Write a brief paragraph describing your conclusions.

Refer to Unit 6 in the Green & Salkind text for specific information about SPSS tests and APA results interpretation and writing. Pay attention to the Levene’s test throughout for determining whether the assumption of equal variance was met when you make your final decisions about the analysis.

What conclusion did you reach? Write these conclusions in formal APA results format. Include your SPSS output to support that conclusion.

Part 3

Occasionally, you have 1 independent variable that has 3 or more levels or groups. For a parametric data set, an analysis of variance (ANOVA) is the proper calculation. Use an ANOVA to address the following scenario:

A financial planner is interested in understanding the relationship between the dependent variable of the income level of respondents (rincdol) and the independent variable of their education level (ndegree) from the gss.sav data file. Use SPSS to complete the following:

  • Run an ANOVA to determine the overall conclusion.
  • Use the Bonferroni correction as a post-hoc analysis to determine the relationship of specific levels of degree level to income.
  • Explain the overall conclusions based on the analysis, and describe the relationship(s) between the levels of the degree earned and income.
  • Write your conclusion of the findings based upon the output using proper APA formatting.

Submit both the SPSS output file and your Word summary. (Refer to the Green & Salkind section about a one-way ANOVA for information on APA results interpretation and writing.)

Discussion about CIA

Write at least 500 words analyzing a subject you find in this article: https://www.911.gov/pdf/OEC_Fact_Sheet_Cyber_Risks_NG911.pdf 
related to a threat to confidentiality, integrity, or availability of data. Use an example from the news.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Week 4 discussion

 

Create one discussion thread and answer the following questions:

(Chapter 5): How is the implementation of network security similar and different between on-perm and cloud environments? Give some examples.

(Chapter 6): How is the management of network security similar and different between on-perm and cloud environments? Give some examples.

Note: The first post should be made by Wednesday 11:59ET and you should post at least two more times throughout the week to your classmates. Please engage early and often.

Your initial post should be 250-300 words. There must be at least two APA formatted reference (and APA in-text citation) to support your thoughts in the post. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Week Research Paper 2 – Info Tech Strat Plan

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.
• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Aligning Risks, Threats, and Vulnerabilities to COBIT P09 Risk Management Controls

  Introduction

Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, first released in 1996. ISACA is an IT professionals’ association centered on auditing and IT governance. This lab will focus on the COBIT framework. The lab covers two released versions: COBIT 4.1, which is currently the most implemented version, and COBIT 5, which was released in June 2012. A newer version, COBIT 2019, was released in 2019.

Because COBIT 4.1 is freely available, with registration, at the time of this writing, the lab uses this version to present the handling of risk management. COBIT presents this topic using a set of COBIT control objectives called P09. COBIT P09’s purpose is to guide the scope of risk management for an IT infrastructure. The COBIT P09 risk management controls help organize the identified risks, threats, and vulnerabilities, enabling you to manage and remediate them. This lab will also present how COBIT shifts from the term “control objectives” to a set of principles and enablers in later versions.

In this lab, you will define COBIT P09, you will describe COBIT P09’s six control objectives, you will explain how the threats and vulnerabilities align to the definition for the assessment and management of risks, and you will use COBIT P09 to determine the scope of risk management for an IT infrastructure.

  1. Define what COBIT (Control Objectives for Information and related Technology) P09 risk management is for an IT infrastructure.
  2. Describe COBIT P09’s six control objectives that are used as benchmarks for IT risk assessment and risk management.
  3. Explain how threats and vulnerabilities align to the COBIT P09 risk management definition for the assessment and management of IT risks.
  4. Use the COBIT P09 controls as a guide to define the scope of risk management for an IT infrastructure.
  5. Apply the COBIT P09 controls to help organize the identified IT risks, threats, and vulnerabilities.

 Deliverables

Upon completion of this lab, you are required to provide the following deliverables to your instructor:

  1. Lab Report file;
  2. Lab Assessment (worksheet or quiz – see instructor for guidance).