Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories in this course could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Cluster Analysis
Need 10 page paper(APA format) discussing the strengths and weaknesses of Cluster Analysis.
POST2
Check Attachment!!
Assignment
Practical Connection
Research Paper
Course: Introduction to Blockchain and Crypto-currency.
Length: Minimum of 5000 words for paper.
Using the University Digital Library or the Google scholar website locate articles discussing Blockchain Technology or crypto-currencies.
1. Discuss with your teammates what kind of subject you want to research.
2. Pick a subject related to Blockchain or Cryptocurrencies.
3. Work on an outline for your research paper.
4. Do a power point presentation that consists of at least 10 slides.
Your final document should include an Abstract and a Conclusion. This assignment should be in APA format and have to include at least 12 references.
Powerpoint presentation
make a PowerPoint presentation with speaker notes.
with designs, figures, and all if necessary.
Structured External Assignment Proposal
The objective is to present a Bid Response Proposal that provides a security solution for any business process of your choice. The financial business has 60 employees and is struggling with security issues both internal and external. Employees use laptops and have remote access to the office systems. Your Bid Response needs to be a turnkey solution that will provide a solution to but not limited to the following problems (so be creative):
1) Equipment is disappearing
2) No building or computer room security.
3) No policies (AUP)
4) No virus protection and experiencing viruses daily
5) No intrusion detection and experiencing intrusions daily
6) Passwords compromised
7) There is an Internet connection but no protection and content filtering
8) Sensitive information is being copied from systems
9) If a disaster should happen to the building there are no plans to recover
Big Data
The rising importance of big-data computing stems from advances in many different technologies. Some of these include:
- Sensors
- Computer networks
- Data storage
- Cluster computer systems
- Cloud computing facilities
- Data analysis algorithms
How does these technologies play a role in global computing and big data?
Minimum 300 words. Include intex citations and references.
Dessertion Paper
Effective strategies on the Internet of Things (IoT) cybersecurity.
Discussion
Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
- Ask an interesting, thoughtful question pertaining to the topic
- Answer a question (in detail) posted by another student or the instructor
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Share an applicable personal experience
- Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
- Make an argument concerning the topic.
At least two scholarly source should be used in the initial discussion thread. Use proper citations and references in your post.
