chryptography and BI

Q1.  Check out this website called  The 25 Best Data Visualizations of 2019. Select one data visualization            example that appeals to you the most. Using your own words, answer the following questions:

  • Why do you think it was identified as one of the 25 best?
  • How many dimensions of information were captured?
  • Do you find the data useful?
  • What do you like most about it?
  • What do you like least?

response should be 250-300 words.

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations

Q2. What are the privacy issues with data mining? Do you think they are substantiated?

response should be 250-300 words

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q3.Complete the following assignment in one MS word document.

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

 1.How do you describe the importance of data in analyt- ics? Can we think of analytics without data? Explain.(150 to 200words)

2.Considering the new and broad definition of business
analytics, what are the main inputs and outputs to the
analytics continuum?(150 to 200words)

3.Where do the data for business analytics come from?
What are the sources and the nature of those incoming
data?(150 to 200words)

4.What are the most common metrics that make for
analytics-ready data?(150 to 200words)

5.Go to data.gov—a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to edu- cation, climate to public safety. Pick a topic that you are most passionate about. Go through the topic-specific information and explanation provided on the site. Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.( 200-250 words)

6.Define data mining. Why are there many names and definitions for data mining?(150 to 200words)

7.What are the main reasons for the recent popularity of data mining?(150 to 200words)

8.Discuss what an organization should consider before making a decision to purchase data mining software.(150 to 200words)

9.Distinguish data mining from other analytical tools and
techniques.(150 to 200words)

10.Discuss the main data mining methods. What are the
fundamental differences among them?(150 to 200words)

11. Visit teradatauniversitynetwork.com. Identify case studies and white papers about data mining. Describe recent developments in the field of data mining and predictive modeling.(250to 300words)

Q4. analyze the history of the Caesar Cypher and its impact on cryptography.  Feel free to also include the impact of items such as the Scytale and the Polybius square.  All of these were used long before computers.You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted.(250 -300WORDS)

Wk 1 – NIST Publications and Outcomes

 2 Part question is below both need to be completed

Assignment Content

  1. Part 1
    The National Institute of Standards and Technology (NIST) publishes Special Publications (SP) to help government agencies and private companies develop and support security programs. The SP 800 subseries deals specifically with computer security. SPs are considered guidelines for nongovernment entities whereas both NIST Federal Information Processing Standards (FIPS) documents and the SPs are required standards for government agencies. 

    Prepare a 1- to 2-page table in Microsoft® Word or a Microsoft® Excel® table in which you outline how a CISO would use the NIST publications to develop security policies.

    Include the following column headings: 

    • SP number 
    • SP name  
    • SP purpose
    • Include the following row headings: 
    • SP 800-30 
    • SP 800-34 
    • SP 800-37 
    • SP 800-39 
    • SP 800-53
    • Part 2
      You were recently hired as CISO for a healthcare company that qualifies as a “Covered Entity” under HIPAA, which means it must comply with the standards of the HIPAA Security Rule. 

      Using the table you created in Part 1, write a 2- to 3-page informal comparison outlining the overarching components and outcomes of your NIST-based structure as compared to a structure operating in the global marketplace. Logically explain how NIST compliance influences information security governance and is part of formulating the organization’s desired outcomes. 

      Cite all sources using APA guidelines. 

      Submit your assignment, including the 1- to 2-page table and the 2- to 3-page comparison.

urgent and needed in 6 hours

Review the draft papers. Before Tuesday, post a critique for two (2) or more of these selection papers including your evaluation of how well the students justified their recommendations.

3. Before 11:59 PM ET Tuesday, post a reply to 2 different selection papers (reply in their threads) which contain your vote for the best technology selection recommendations. Along with your vote, provide a brief one paragraph justification for your choice. (These count as your follow-up postings to your peers.)

PLE week3 p3

 

Hello,

i need this paper by 1/27 afternoon.

Strictly No plagiarism please use your own words.

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

1. What is privacy?

2. What risks, if any, does facial recognition software raise?

3. How much information about you can be found on-line with a simple google search? 

4. How much information about you can be found by searching government and commercial databases?

5. Describe informed consent. 

6. Should secondary use of consumer provided data be available without notice to the consumer?

7. How do data mining and predictive analytics work? 

8. Watch this Science Friday video by Ira Flatow. And, offer your opinion – Are advancing algorithms taking our free will? 

9. Should Facebook be regulated, at least as far as it’s privacy and data policies? 

10. How many public cameras is too many? 

reference link:  https://hackablepodcast.com/episodes/locked-out

 

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

EH week4 DB

Hello,

i need this paper by 09/16 afternoon.

Strictly No plagiarism please use your own words.

Cryptography is used to protect confidential data in many areas. Chose one type of cryptography attack and briefly explain how it works (examples include: ciphertext-only attack, known-plain-test attack, chosen-plaintext, chosen-ciphertext attack, timing attack, rubber hose attack, adaptive attack).

Write a 300 words paper.

Strictly No plagiarism

Ethical Hacking

 

Select one type of cryptography or encryption and explain it in detail. Include the benefits as well as the limitations of this type of encryption. Your summary should be 2-3 paragraphs in length and uploaded as a TEXT DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

Be sure ti include your reference citation.

implementation of innovation technologies.

 

This week’s journal article focuses on attribution theory and how it influences the implementation of innovation technologies.  Two types of employee attributions are noted in the article (intentionality and deceptive intentionality), please review these concepts and answer the following questions:

  1. Provide a high-level overview/ summary of the case study
  2. Note how constructive intentionality impacts innovation implementations
  3. Find another article that adds to the overall findings of the case and note how attribution-based perspective enhances successful innovation implementations.  Please be explicit and detailed in answering this question.

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research.  Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

  • 3-5 pages in length (not including title page or references)
  • APA guidelines must be followed.  The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.
  • A minimum of five peer-reviewed journal articles.

The writing should be clear and concise.  Headings should be used to transition thoughts.  Don’t forget that the grade also includes the quality of writing.

Business process redesign

If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.

• Be approximately 4-6 pages in length, not including the required cover page and reference page.