Access control Assignment 14

Discuss the importance of the testing phase of the Software Development Life Cycle.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

All paper are checked for plagiarism using SafeAssign, you can review your score.

Discussion

1. Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.

2. What are the privacy issues with data mining? Do you think they are substantiated?

I Need Both Should be in 2 Separate documents.

Question 1: 

 

Using the Web or other resources, research an example of Cyber Terrorism.

Write a brief Discussion describing the terrorism attack and it’s the aftermath. Comment on ways the attack could have been prevented.  Explain between 200 and 300 words.

 

Question 2 :

Write an essay of at least 500 words discussing how a blockchain implementation would improve data security in the military, education, or another context. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered, or another list format.  

Use the five-paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.

Discussion 11 – erm

The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.

Please make your initial post of 500 to 600 words .

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Job Search Website Final Report

I am creating a Job Search website and I need a professional final report in English. I will provide a lot of resources from where you need to make the report from. it will include: Website code, PowerPoint with information about the project, and specifications on how to create this report.

Please READ it carefully.

Thank you!

200-250 words

 Kirk (2016) tells us that data adjustments affects what data is displayed and presentation adjustments affects how the data is displayed. Each of the adjustments involve specific features. Data adjustments include: Framing, Navigating, Animating, Sequencing, and Contributing. Presentation adjustments include: Focusing, Annotating, and Orientating. Select one feature and expand on it. 

summary paper, 1000 words

This is the link to the paper: https://arxiv.org/pdf/1602.04938.pdf

After you read the paper you will summarize the paper in 1000 words.

While summarizing the paper you should be answering few questions throughout your summary.

1. What is the problem?

2. Why is it interesting and important?

3. Why is it hard? (E.g., why do naive approaches fail?)

4. Why hasn’t it been solved before? (Or, what’s wrong with previous proposed

solutions? How does this differ?)

5. What are the key components of the approach and results? Also include any

specific limitations.

6. Can you think of counterexamples for examples given?

7. Is the approach clearly described? Can you outline the steps or summarize the

approach?

8. Does the work address the problem stated earlier in the paper? How?

9. Does the approach seem objective? Clearly state how?

10. Wrap up your paper by answering What is the conclusion of the research?

Discussion-virusus and malicious code . Due today

  • Explain the key differences between viruses and other malicious codes. Identify at least three different types of viruses and describe the main differences between each one. Next, explain both the potential threat posed by viruses and other malicious codes and their main effects on computers and productivity.
  • Discuss the fundamental lesson(s) that we can learn from the attacks of viruses and other malicious codes. Speculate on the main steps that both individuals and businesses can take in order to protect themselves from attacks that may occur in the future.