Order # 12529

Title: Network Protocols

Paper type Essay

Paper format APA

Course level Undergraduate

Subject Area Other (Not listed)

# pages 1   ( or 300 words Minimum)

Spacing Double Spacing

# sources 4

Paper Details

For this assessment, create and describe the information flow of an OSI model.

To begin, select a generic work environment, such as any office that would use a phone system, to use as an example to describe how this is done.

Also, complete the practice labs provided in the Virtual Resource Portal activity for this assessment. Use these labs and the Internet to gather the information necessary to create your own analogy essay of the flow of information through the OSI model. Your analogy will include network protocols and compare these against the OSI model.

Then, complete the following:

1.Create an OSI model for a generic work environment. You can use Microsoft Word to do this.

2.Write a report that addresses the following, based on the OSI model you created. ◦Provide an explanation of at least three different network protocols used in the OSI model.

◦Explain the purpose and role of at least three of the network protocols you identify.

◦Describe the importance of the work performed by the network protocols you identify. This may include how well they do with network security. Examples include TCP/IP traffic and port security.

◦Apply the concepts from the practice lab activities for this assessment.

Additional Requirements

•Written communication: Written communication is free of errors that detract from the overall message.

•APA formatting: If you use sources, ensure that resources and citations are formatted according to APA (6th edition) style and formatting.

•Font and font size: Times New Roman, 12 point.

vulnerability

Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference of low and remote inclusion?
  • What methods can me employed to prevent a security breach?
  • What programming languages are vulnerable to this type of attack.

write in 300words.

Essay and Assignment

Essay:

Please choose any two topics from the list below and create a minimum 2-page essay answering the 2 questions (out of 4). Note: Avoid DIRECT wording from any source, rather rephrase the author’s work and use in-text citations where necessary.

ANSWER ANY 2: 

1. Name the basic constructs of an ensemble model. What are the advantages and disadvantages of ensemble models? Add a few Examples.

2. List and briefly describe the nine-step process in conducting a neural network project.

3. What is the main difference between classification and clustering? Explain using concrete examples. Add a few Examples.

4. What are the privacy issues with data mining? Do you think they are substantiated? Add a few Examples.

** Please note Do NOT write an introduction, rather just answer any 2 questions from above. 

Refer to Chapter 1 to 7 in the attached textbook:

Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6. 

Requirement: 

Minimum 2-page essay. Do not need a cover sheet, abstract, graphs.

Add references separately for each question. Include in-text citations.

Strictly follow APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$10 max. Please bid if you agree.

  

****Separate document for each assignment****

  

Assignment

What are the common challenges with which sentiment analysis deals? What are the most popular application areas for sentiment analysis? Why?

Refer to Chapter 7 in the attached textbook:

Sharda, R., Delen, D., Turban, E. (2020). Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support 11E. ISBN: 978-0-13-519201-6. 

Requirement: 

Minimum 300-350 words. The cover sheet, abstract, graphs, and references do not count.

Add references separately for each assignment question.

Strictly follow APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

  

Assignment 3:

Find an example of a code of ethics or acceptable use policy related to information technology and discuss three points that you think are important.

Requirement:

****Separate document for each assignment**** 

Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

Add reference separately for each assignment question.

Double Spaced and APA 7th Edition Format

No plagiarized content please! Attach a plagiarized report.

Check for spelling and grammar mistakes!

$5 max. Please bid if you agree.

Prof Writing & Proposal Devel

 

Do a little bit of research on grant writing versus academic (scholarly) writing. 

Then…

1) Write a one sentence statement that describes the difference in grant writing vs. scholarly writing.

2) Research a need in your community and write a 100-300 word needs section in an academic writing style, citing your references in APA format. Copy and paste into the discussion forum. 

3) Write a quick one paragraph describing the mock dissertation topic (see list of topics below) that you will write about in this class and include your research question. Use academic writing style and standard. There is no word limit. 

 

  • Students must choose from the listed topics of their school/program:

 IT Students:

  • Enhancing Cyber Security In Healthcare -With The Help Of Machine Learning
  • Using Data Science Techniques To Enhance Data Security

Legislated Privacy concerns

 

Go to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.

Using WORD, in your OWN WORDS, write an ORIGINAL brief essay of 300 words or more  :

  • Summarize the case
  • Give your opinion of the decision.
  • Describe how the case deals with the material in this chapter

Milestone 1

 In the second milestone writing assignment, you will analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.  

There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices?

Please write 350 words essay on following

 There are many mobile platform vulnerabilities listed in the readings from this week (slides 8, 9, and 10). Which do you feel is the greatest threat to users? Do you agree that people generally are not aware of the threats to their mobile devices? 

Discussion question, 350 words and 2 references.

Search the peer-reviewed literature for examples like below. You may select any topic relating to technology that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide supporting evidence, with citations from the literature

Example:   Protection of patient data has become a critical part of the scope of practice of all healthcare professionals. Routine data breaches underscore the importance of training clinical employees in protecting these data. However, beyond exposure to HIPAA regulations, little is done to educate the healthcare student about the risks and vulnerabilities of the online environment as it pertains to health data” (Swede, Scovetta, & Eugene-Colin, 2018).

Data Classification and Data Loss Prevention

 

Before you begin: review the information provided in this resource: https://www.pic.gov/sites/default/files/RACI%20Chart%20Overview%20v2.pdf

It takes a team of individuals throughout an organization who work together to safeguard the integrity and confidentiality of data resources. But, how does an organization know that it has enough people in the right roles performing the right tasks to ensure that digital assets will be protected from loss or harm?

The RACI matrix is a tool that can be used to outline the various roles and responsibilities required to provide this protection. For this discussion, you will prepare a RACI matrix that outlines roles of key players in the organization who have data protection responsibilities (i.e. asset security and data protection). Your matrix should specifically address executives (C-level), managers, supervisors, employees. The tasks that you should address are: generating information, using information, classifying information, and managing / using / implementing data loss prevention technologies.

After you have completed your chart, write a brief discussion of responsibilities for each role listed in the rows of your chart. Each role should be addressed in a separate paragraph.

Combine your matrix and your narrative descriptions into a briefing paper for a working group that has been charged with reviewing and improving the company’s data classification business processes. Post your paper in the body of your reply to this topic.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting. Use a consistent and professional style for your citations and reference list entries. (Hanging indent is NOT required.)