Search the UC Library and/or Google Scholar for a “Fortune 1000” company that has been successful in integrating Big Data Analytics with their Business Intelligence?

 

This week’s article provided a case study approach which highlights  how businesses have integrated Big Data Analytics with their  Business Intelligence to gain dominance within their respective  industry.  Search the UC Library and/or Google Scholar for a “Fortune  1000” company that has been successful in this integration. Discuss the  company, its approach to big data analytics with business  intelligence, what they are doing right, what they are doing wrong, and  how they can improve to be more successful in the implementation and  maintenance of big data analytics with business intelligence. 

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at  least two scholarly journal articles to support your positions, claims,  and observations, in addition to your textbook. The UC Library is a  great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent  grammar and style techniques. You are being graded in part on the  quality of your writing.

Reading Assignments

 

Big Data Visualization: Allotting by R and Python with GUI Tools. (2018). 2018  International Conference on Smart Computing and Electronic Enterprise  (ICSCEE), Smart Computing and Electronic Enterprise (ICSCEE), 1https://doi.org/10.1109/ICSCEE.2018.8538413

Integrated Understanding of Big Data, Big Data Analysis, and Business Intelligence: A Case Study of Logistics. Sustainability 2018, 10(10), 3778; https://doi.org/10.3390/su10103778

Security Risk Assessment

 Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format double space and have to include at least two references and 400 words. 

  • When should the architect begin the analysis?
  • What are the activities the architect must execute?
  • What is the set of knowledge domains applied to the analysis?
  • What are the tips and tricks that make security architecture risk assessment easier?

BSW W9

In 200 words,

Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is it dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

Assignment and Discussion

 

Week 10 – Discussion

Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a person’s eye and stores that image in a database. Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not?

Writing Assignment – Wk 10

Some common biometric techniques include:

  1. Fingerprint recognition
  2. Signature dynamics
  3. Iris scanning
  4. Retina scanning
  5. Voice prints
  6. Face recognition

Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs. 

Week-10 Discussion

 In no less than 250 words, describe a hacking tool that is used to gain access to a network.  Explain how the tool is used, how it works and how a netwoprk administrator can prevent this tool from access the network 

 

Week 10 Assignment

  • 10.1 What are three broad mechanisms that malware can use to propagate?
  • 10.2 What are four broad categories of payloads that malware may carry?
  • 10.3 What are typical phases of operation of a virus or worm?
  • 10.4 What mechanisms can a virus use to conceal itself?
  • 10.5 What is the difference between machine-executable and macro viruses?
  • 10.6 What means can a worm use to access remote systems to propagate?
  • 10.7 What is a “drive-by-download” and how does it differ from a worm?
  • 10.8 What is a “logic bomb”?
  • 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
  • 10.10 List some of the different levels in a system that a rootkit may use.
  • 10.11 Describe some malware countermeasure elements.
  • 10.12 List three places malware mitigation mechanisms may be located.
  • 10.13 Briefly describe the four generations of antivirus software.
  • 10.14 How does behavior-blocking software work?
  • 10.15 What is a distributed denial-of-service system?

Ethical Obligations in Information Security Proposal

Students will develop privacy policy and protocols for a highly regulated organization in the United States that will have a mix of remote, work from home, and multiple business offices. The privacy policy will need to address all work locations in support of the privacy of confidential information. Consider elements such as shared workspaces in the home and workplace, printing, telephone conversations, use or personal devices (computers and phones), access to the internet, etc.

Case scenario

 

Case scenario. An HU Investment Firm employee who had signed a non-disclosure agreement at the time of hire was identified as posting corporate protected information on the internet which has led to a loss of corporate income and trust of the companies that the corporation represents and does business with. The corporation has taken the incident to a Law firm in an attempt to lead to prosecution against the employee who has since been fired.

Write a Summary Report to the Prosecutor based on the case scenario and your work in previous units.

1. Applicable laws and policies that relate to cyber defense

2. Describe the major components of each pertaining to the storage and transmission of data.

3. Describe the responsibilities related to the handling of data as it pertains to legal, ethical and/or agency auditing issues.

4. Describe how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it.

5. Support your report with documents that you have created previously, such as the Risk Assessment Report and the Mitigation Plan. 

Remember to use a professional writing style and support your statements with logical evidence. 

Final Research Project

  

Data Analysis and Data Mining

As more and more people are becoming connected over the internet and are also becoming more and more dependent to technology, the level of data that happens to be developed over time has been on a gradual rise since the internet and tech boom in 2002*. This sudden increase in data has resulted in various forms of data being developed. One of these forms is known as data analysis where as the other happens to be data mining. These two concepts can closely be assumed to relate, however, this is never the case since these two concepts happen to be rather different in a large number of ways.

For instance, data analysis happens to deal with the extraction, cleaning, transformation, remodeling, visual representation and grouping of data into information that can be consumed and used in making decision or coming up with a particular conclusion. Thus, this does point out that data analysis is mainly used for the main purpose of making sense of complex data that is yet to be processed into understandable information (Zaki & Meira, 2014). Data analysis also happens to be used in testing hypothesis, this results in placing data analysis in being used in statistics, mathematics as well as computer science based structures as a means of deriving a set of findings or conclusions from collected data. 

On the other hand, data mining does happen to follows some principles of data analysis and can be grouped under data mining, however, data mining happens to be the extensive exploration and evaluation of large amounts of data with the purpose of retrieving or identifying a hidden pattern in a large data set. Data mining is also used in developing machine learning and AI system models that happen to be used in conducting effective data analysis. data mining is also known as information discovery since it ends up looking at various sets of data and attaining a fixed finding from the data set presented (Zaki & Meira, 2014). Data mining is also used in a large structure of data that contains immense complexities since it does not require visualization as a result of its initial purpose of making data usable, that is, turning raw data into valuable information.

References

Zaki, M. J., & Meira, W. (2014). Data mining and analysis: fundamental concepts and 

algorithms. Cambridge University Press.

Emerging concepts that are using Big Data and Blockchain Technology

The Final Portfolio Project is a comprehensive assessment of what you have learned during this course.  

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data.

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately 6-8 pages long, including both a title page and a reference page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet these requirements:

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Impact of IT week 2

Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources.

Respond to three of your classmates by Sunday at midnight. Your responses should be at least 100 words and should be substantive. You should offer additional resources, insight, or other helpful feedback. A simple “I like your post” will result in a 0.

Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade. 

Discussion_Grading_Rubric_Final (2).docx

Grading_Late_Discussion-1 (3).docx

Topics:

  • What is freedom of surveillance? How does it apply to you at your place of employment? Are there exceptions?
  • What is an inadvertent leak of information? How has it affected the adoption of technology?
  • How do businesses benefit from search engines?
  • Should we allow facial recognition at sporting events? What about shopping malls?
  • How much should a user post on social media? Why?