Cyber Security

 The answer will be checked for plagiarism. 

  1. Discuss OSINT, how it works, and its role in the realm of social engineering.
  2. Why is it difficult to detect fileless malware on a traditional anti-virus tool? Explain.
  3. What are the major ingredients which you would consider if you have been 
    tasked to develop an incident response (IR) plan from the scratch?
  4. What is Cyber Threat Intelligence (CTI)? Explain the difference between Cyber Threat Intelligence and Cyber Intelligence.
  5. What is SCDA security and what are the biggest security/risk concerns of these systems?

 The answer will be checked for plagiarism.

 

Research

 

COVID-19 Open Research Dataset Challenge (CORD-19)

An AI challenge with AI2, CZI, MSR, Georgetown, NIH & The White House

(1) FULL-LENGTH PROJECT

Dataset Description

In response to the COVID-19 pandemic, the White House and a coalition of leading research groups have prepared the COVID-19 Open Research Dataset (CORD-19). CORD-19 is a resource of over 44,000 scholarly articles, including over 29,000 with full text, about COVID-19, SARS-CoV-2, and related corona viruses. This freely available dataset is provided to the global research community to apply recent advances in natural language processing and other AI techniques to generate new insights in support of the ongoing fight against this infectious disease. There is a growing urgency for these approaches because of the rapid acceleration in new coronavirus literature, making it difficult for the medical research community to keep up.

Call to Action

We are issuing a call to action to the world’s artificial intelligence experts to develop text and data mining tools that can help the medical community develop answers to high priority scientific questions. The CORD-19 dataset represents the most extensive machine-readable coronavirus literature collection available for data mining to date. This allows the worldwide AI research community the opportunity to apply text and data mining approaches to find answers to questions within, and connect insights across, this content in support of the ongoing COVID-19 response efforts worldwide. There is a growing urgency for these approaches because of the rapid increase in coronavirus literature, making it difficult for the medical community to keep up.

A list of our initial key questions can be found under the Tasks section of this dataset. These key scientific questions are drawn from the NASEM’s SCIED (National Academies of Sciences, Engineering, and Medicine’s Standing Committee on Emerging Infectious Diseases and 21st Century Health Threats) research topics and the World Health Organization’s R&D Blueprint for COVID-19.

Many of these questions are suitable for text mining, and we encourage researchers to develop text mining tools to provide insights on these questions.

In this project, you will follow your own interests to create a portfolio worthy single-frame viz or multi-frame data story that will be shared in your presentation. You will use all the skills taught in this course to complete this project step-by-step, with guidance from your instructors along the way. You will first create a project proposal to identify your goals for the project, including the question you wish to answer or explore with data. You will then find data that will provide the information you are seeking. You will then import that data into Tableau and prepare it for analysis. Next you will create a dashboard that will allow you to explore the data in depth and identify meaningful insights. You will then give structure to your data story by writing the story arc in narrative form. Finally, you will consult your design checklist to craft the final viz or data story in Tableau. This is your opportunity to show the world what you’re capable of – so think big, and have confidence in your skills!

Kaggle Website:

https://www.kaggle.com/allen-institute-for-ai/CORD-19-research-challenge

Assignment Length (word count): at least 15 pages.

References: At least 10 peer-reviewed, scholarly journal references.

Essay Help – Python 3 Language

 

Assignment Content

  1. In this course, you have learned that computer programming is key to computer science. The ability to program a succession of instructions to resolve a computing problem is a valuable skill that is integral to many aspects of modern life. You have also seen the versatility and distinguishing characteristics that make Python 3 a popular choice for programmers.

    End-of-Course Essay

    Write a 1- to 2-page essay in which you connect this course to your own career or personal life. Imagine the audience for this essay is someone who is interested in finding out about your experience with this course and the programming language.

    An essay is a short composition on a theme or subject, written in prose and generally analytic, speculative, or interpretative.

    Consider these questions as you write. You may answer all or some of the questions in your essay.

    • Why is object-oriented programming a valuable skill?
    • What are the benefits and limitations of Python 3?
    • Besides programming, what are some other tasks you can perform with Python 3?
    • How might you use the concepts you learned in this course in your career or personal life?
    • In what ways would you like to extend or strengthen your knowledge of object-oriented programming or Python 3 in particular?
    • Grading guidelines:
    • Title your essay.
    • Write 1 to 2 pages on your experience with Python 3.
    • Consider your audience as anyone interested in your experience with the course and Python 3.
    • Cite any references to support your assignment.

      Format your assignment according to APA guidelines.

      Submit your assignment.

cloud_computing

 Compare between different formal Cloud definition? Based on stale and standards? (include the NIST definitions)

Hint: SP 800-145 September 2011  The NIST Definition of Cloud Computing

write briefly on Cloud Computing Recommendations suggested by NIST .

Hint:  SP 800-146 May 2012  Cloud Computing Synopsis and Recommendations

What are the Key Security and Privacy Issues?

Hints:  SP 800-144 December 2011  Guidelines on Security and Privacy in Public Cloud Computing

 Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years. The paper should meet the following requirements:

  • 2 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

case study

Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc.

1. What are the success factors in the Scotiabank-Kabbage partnership?2. Under what conditions is the same model applicable?When will the Scotiabank-Kabbage model not work?3. Under what circumstances should Scotiabank seek fintech partnerships?4. Identify a sector (e.g., international payments, blockchain, lending or wealth management) and a geographic market where a fintech partnership would create value for Scotiabank, and explain why.5.Based on your answer to question 4, what recommendations would you make to Scotiabank’s executives for a three-year plan, choice of partner, reason for the partnership, and suggested procedure (i.e.,what partnership model to follow)?6. What challengers is Scotiabank facing in the blockchain sector? What are the implications for the bank’s blockchain partnership strategy?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay, you must include an APA-style title page and reference page

Discussion 11 – erm

The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.

Please make your initial post of 500 to 600 words .

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.