Information System
Information Security Engineer
Your instructor will assign you to a group. Within your group you can set up a group WebEx, chat, skype, or other communication tool to determine how best to complete this case study. Each person will contribute to the collaboration portion to complete this case study. Include the Names of each member on your team and a brief description as to how they participated.Active participation is expected, but the quality, not the quantity, is the key to creating a successful collaborative learning environment for everyone. Instructional approaches for this course are highly interactive and experiential.Scenario/SummaryYou have just been hired as an Information Security Engineer for a large, multi-international corporation. Unfortunately, your company has suffered multiple security breaches that have threatened customers’ trust in the fact that their confidential data and financial assets are private and secured. Credit-card information was compromised by an attack that infiltrated the network through a vulnerable wireless connection within the organization. The other breach was an inside job where personal data was stolen because of weak access-control policies within the organization that allowed an unauthorized individual access to valuable data. Your job is to develop a risk-management policy that addresses the two security breaches and how to mitigate these risks.You will submit your answers as a single paper from the team. Include the Names of each member on your team and a brief description as to how they participated.
A Cryptographic System
Analyze and apply the most appropriate solutions to problems related to the field of Security and Information Assurance.You are assigned to manage keys for a cryptographic system in your company. You found that one of the keys is leaked. What is the impact of a leaked cryptography key to a company? Provide four (4) recommendations to compromise this vulnera
Predicting The Oscars
Description:Please download the Oscar_2000_2018.csv dataset provided.This dataset amounts to a total of 1,235 movies from 2000 to 2018, where each film has 100+ features including:It sports 20 categorical, 56 numeric, 42 items, and 1 DateTime field totaling 119 fields giving you plenty of details about various aspects of the past nominees and winners.The dataset is organized such that each record represents a unique movie identified by the field movie_id.The first 17 fields have to do with the metadata associated with each movie e.g., release_date, genre, synopsis, duration, metascore.Tasks:Part 1: EDA1. Using a scatterplot or a pair plot show the relationship between features user_reviews and critic_reviews. Find the Pearson’s correlation coefficient(r) between the 2 features.2. Plot the average duration per certificate feature. In other words, x-axis would be certificate and the y-axes would be the average duration.3. Plot a histogram for the genre feature. Note that the field genre needs to be split first to find the frequency for each individual genre type; Comedy, Romance, Action etc. (Hint: Functions like strsplit in R or split in Python can be used)Part 2: Model Building1. You are going to predict Oscar_Best_Picture_won feature; this will be your target variable. Remove all of the features which has the convention Oscar_Best_XXX_won except for the target variable Oscar_Best_Picture_won.2. Convert the target variables type to a numerical type by doing the transformation, Yes = 1, No = 0.3. Remove columns with high cardinality, i.e., for every column that has a unique value frequency of 70% or higher, remove them from the dataset.4. Perform a time split and create a training dataset spanning the period 2000-2017 and a test dataset for the movies released in 2018 – use year feature for the data split5. Create a tree-based model to predict the target Oscar_Best_Picture_won6. Use the model to predict the test dataset and find the maximum predicted valueOptional: Go back to the initial dataset and find the movie in 2018 that is associated with the maximum predicted value.
Board of Directors
SUMMARIZE the composition (in terms of functional background, education, experience, demographics, etc.) of TMT (top management team) and BoD (board of directors) of your assigned company. What conclusionsrelated to corporate governance issuescan you draw?
Social Media Analytics
This assessment of a 4,000 word research paper is designed to demonstrate a students completion of the following Learning Outcomes:1. Demonstrate an understanding of concepts underlying social media analytics and be able to apply them appropriately in business settings;2. Critically evaluate and implement specialist technologies to harvest, analyse and visualise social data from individuals to corporate perspectives;3. Synthesise and apply social analytics and appropriate techniques on social information;4. Critically evaluate, design, prototype and implement social media applications and visualization for business story telling.
Managing Products
What role do you feel that VR/AR/MR will play in the future for managing products within an enterprise supply chain system? Please elaborate on how new technologies can be applied in various areas across supply chains in detail with business use casesI have attached few files and link for research. please use research articles for addition research purpose.i need detailed work.. 350+ words.
[SOLVED] Audit of Web Servers
Write a discussion post on following topic:Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege.Please make your posts substantive. A substantive post will do at least two of the following:· Ask an interesting, thoughtful question pertaining to the topic· Answer a question (in detail) posted by another student or the instructor· Provide extensive additional information on the topic· Explain, define, or analyze the topic in detail· Share an applicable personal experience· Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)· Make an argument concerning the topic.At least 2 (scholarly) journal source should be used. Be your references in correct APA 7 format and cite each reference at least once, but as many times as you rely on it. Citations support each sentence relying on a reference, not an entire paragraph. Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations. Initial posts need to be 300 words minimum .
[SOLVED] Sales Data
Eileen Dover, CEO of Good For You! Bakery, decided to open outlet stores two years ago. In some ways, this was a good decision as some stores appear to be doing well. However, the overhead to operate brick-and-mortar stores is high. Ms. Dover wants to examine the data to see which, if any, stores are underperforming so that she can close underperforming outlets if necessary.Good For You! Bakery has data stored in two separate legacy tables: one table for sales data, and one table for cost data. When Ms. Dover created these tables early in the business, she associated each record with a unique store number. (In SAS®, each record is called an observation.)Now Ms. Dover wants you to pull all of this data into two data sets in SAS® , join the data sets, and answer the following questions:Which three stores netted the most profit in 2017? (Note that profit is equal to sales revenue minus costs.)Which three stores netted the least profit in 2017?What recommendation would you give the CEO regarding potential store closings? Include your rationale in detail.
[SOLVED] Types of Prototypes
1. First Read the Houde & Hill reading.2. There are three sections:· the problem with prototyping· a model of what prototypes prototype· further examples3. Read each section4. You should be able to answer these questions:· why prototype?· what is a prototype?· what types of prototypes are there?· Can you give examples of each?
[SOLVED] The Different Firewall Types
Compare and contrast the different firewall types and explain their importance (Packet filtering, stateful/ stateless inspection, NGFW/Layer 7, Network Based, application, and proxy firewalls).Please DO NOT USE outside sources or quote your book directly for these discussion – summarize what you want to say in your own words and use examples to illustrate your meanin
Use Promo Code: FIRST15