Final Project – Information Assurance in Malware Analysis

1. In 4 pages or about 1000 words (excluding a cover page and reference page) write about final project topic (Information Assurance in Malware Analysis) using at least three references and in APA format. 

2. Also, upload a summary for presentation with at least 10 slides (excluding cover and reference page) with highlights and details (add pictures aswell) of your final project.

Use your own words and note that plagiarism score should not be more than 20.

chryptography and BI

Q1.  Check out this website called  The 25 Best Data Visualizations of 2019. Select one data visualization            example that appeals to you the most. Using your own words, answer the following questions:

  • Why do you think it was identified as one of the 25 best?
  • How many dimensions of information were captured?
  • Do you find the data useful?
  • What do you like most about it?
  • What do you like least?

response should be 250-300 words.

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations

Q2. What are the privacy issues with data mining? Do you think they are substantiated?

response should be 250-300 words

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q3.Complete the following assignment in one MS word document.

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

 1.How do you describe the importance of data in analyt- ics? Can we think of analytics without data? Explain.(150 to 200words)

2.Considering the new and broad definition of business
analytics, what are the main inputs and outputs to the
analytics continuum?(150 to 200words)

3.Where do the data for business analytics come from?
What are the sources and the nature of those incoming
data?(150 to 200words)

4.What are the most common metrics that make for
analytics-ready data?(150 to 200words)

5.Go to data.gov—a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to edu- cation, climate to public safety. Pick a topic that you are most passionate about. Go through the topic-specific information and explanation provided on the site. Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.( 200-250 words)

6.Define data mining. Why are there many names and definitions for data mining?(150 to 200words)

7.What are the main reasons for the recent popularity of data mining?(150 to 200words)

8.Discuss what an organization should consider before making a decision to purchase data mining software.(150 to 200words)

9.Distinguish data mining from other analytical tools and
techniques.(150 to 200words)

10.Discuss the main data mining methods. What are the
fundamental differences among them?(150 to 200words)

11. Visit teradatauniversitynetwork.com. Identify case studies and white papers about data mining. Describe recent developments in the field of data mining and predictive modeling.(250to 300words)

Q4. analyze the history of the Caesar Cypher and its impact on cryptography.  Feel free to also include the impact of items such as the Scytale and the Polybius square.  All of these were used long before computers.You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted.(250 -300WORDS)

IT Project Management 2 page paper

Find any example of a real project with a real project manager. Feel free to use projects in the media (such as the Olympics, television shows, or movies). Write a paper describing the project in terms of its scope, time, and cost goals. Also describe other impacts on a project, such as quality resources and risks. Discuss what went right and wrong on the project and the role of the project manager and sponsor. Also describe whether the project was a success and why. Include at least one reference and cite it on the last page. 

APA style, 2 pages, Cover Page, Microsoft Word format.

Wk 2 – Roles, Responsibilities, and Governance of Security

2 Part Assignment

 

Assignment Content

  1. One of the roles of the Chief Information Security Officer (CISO) is to translate technical jargon into business language that senior leadership and executives can understand to support business decisions.

    As the CISO, the board of directors has asked you to share your ideas for developing a cybersecurity program for the company. The board has specifically requested that you base your recommendations on the major components that make up a cybersecurity program, including personnel.

    Part 1
    Develop a 2- to 3-page table in Microsoft® Word that lists the roles and responsibilities of each of the following with respect to security.

    Use the following column headings:

    • Title
    • Role
    • Responsibilities
    • Use the following row headings:
    • Chief Executive Officer (CEO)
    • Chief Operations Officer (COO)
    • Chief Financial Officer (CFO)
    • Chief Information Officer (CIO)
    • Chief Information Security Officer (CISO)
    • Senior Security Manager
    • Information Security Architect
    • Information Security Engineer
    • Information Security Auditor
    • Information Security Analyst
    • Security Technician/Specialist
    • Part 2
      Develop a 10- to 12-slide presentation using your choice of software for the board of directors. Include a title slide, a reference slide, and detailed speaker notes. In your presentation:
    • Concisely describe cyber security governance, including major components like organizational oversight and security processes.
    • Recommend an information security control framework.
    • Logically explain how an information security control framework benefits a business.
    • Describe one organizational challenge of implementing information security and provide an example of how you, the CISO,would address the challenge.
    • Include supportive graphics and appropriate backgrounds and styles. Don’t use images unless you obtain permission from the copyright holder or you use copyright-free images.

      Format all citations according to APA guidelines.

      Submit your assignment.

Database SQL essay

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection?  Include an interesting meaningful title.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations)
With atleast 3 references 

Articlee writing

Write a 3-page paper (1000 words):  defining “what is artificial intelligence?” What is the history behind it and how can it benefit our society in the future? Provide examples and present your written findings. You must write a 3-page essay in APA format. You must include 3 scholarly reviewed references that are DIRECTLY related to the subject.