What types of risks does this organization have? Do they have publicly available policies or procedures?

For this assignment, you will look at the obvious risks that UBER Company may have.
1. Create a PowerPoint slideshow that will demonstrate your findings.

Submissions with a Turn-it-in similarity score over 25% will not be accepted and you will need to re-accomplish the assignment or accept a zero. Use your own words to paraphrase what you see on the internet.

Instructions

1. Create a PowerPoint slideshow that will demonstrate your findings.

Questions you should address:

1. What types of risks does this organization have? Do they have publicly available policies or procedures? Think both logical and physical for this and account for emergencies.

2. Who would be affected by each risk that you have noted? How would they be affected?

3. What types of access controls do they have in place to mitigate some risks? Think about ALL of the access controls they have in place, physical and technical.

4. What assets does this organization have?

5. Given the information you have, if you were part of their security team, what types of safeguards would you put in place? Consider cost and the value of the asset you would be protecting.

6. Are there easy, free, or inexpensive fixes that could be put in place right away?

Describe the difference between vulnerabilities and threats.

1. Describe the difference between vulnerabilities and threats.

2. What types of threats is the business (Uber company)you chose susceptible to?

3. What types of information would Uber company like to protect?

3. Which laws might they ( Uber ) be subject to?

Submissions with a Turn-it-in similarity score over 25% will not be accepted and you will need to re-accomplish the assignment or accept a zero.

Write a one – two page paper on where you found the information, how it can be used, and what type of threat it poses to an organization.

Explore aggregated information gathering for the company (Uber)
Here are a few suggestions to help you get started. The goal is to look for publicly available information, start with the organization’s website. Look at the About Us, Contact Us for the general mailing address. Then use a search engine to find out more, look for things such as names and phone numbers of executives, their assistants, organizational charts, organizational policies, view their Linked-In, social media, and yellow pages. Can you find any financial reports or earnings reports? How is their reputation? Do they have good or bad reviews? If so, what do reviewers praise the business about? What do they complain about?

Write a one – two page paper on where you found the information, how it can be used, and what type of threat it poses to an organization. You can submit this in a table format if that is easier for you to express your thoughts.

Design A Functional Network On The Design Level For An Organization

Each network (e.g : Switches, Routers, Firewalls) used must have an explanation for the drawings.

Also, at the end , explain:

1) the feasibility of the proposed Network Design (e.g : whether this network diagram is technically viable or not?)

2) Suitability of the proposed Network Design for the given scenario (e.g : Is the proposed Network Design

suitable for the given scenario?)

The most important is the drawing/diagram of the network and the explanation for each network used.

Explore how adult nurses prevent pressure ulcers in elderly patients within the hospital setting

Explore how adult nurses prevent pressure ulcers in elderly patients within the hospital setting

How has your spiritual or moral foundation helped you navigate through your professional or academic journey?

Building a Solid Foundation

Resources

  • Bible

Instructions

  1. Read 1 Corinthians 3:10–15.
  2. Respond to the following Questions:
    1. How has your spiritual or moral foundation helped you navigate through your professional or academic journey?
    2. Describe the difficulty of studying cybersecurity policy without an understanding of the technical components of cybersecurity.
  3. Your postings should also:
    1. Be well developed by providing clear answers with evidence of critical thinking.
    2. Add greater depth to the discussion by introducing new ideas.

Write a paper that addresses cybercrime law in revenge pornography.

The strength of your paper is assessed in terms of both the logic of your position and how well your points are supported by reference to data and the literature.

For people not knowing how to begin, the five-paragraph essay format is often especially appropriate. In this format, you develop an essay of five paragraphs. The first is an introduction that tells the reader what you will cover and defines key terms. The second through fourth provide support for the position announced in the first, and the last is a summary and restatement of the position.

Direct quotes are not appropriate for this assignment. Paraphrased ideas or citing general support can be noted by simply identifying the source (e.g., Yar and Steinmetz). Specificity is valued, so if you rely on a work that appears in the book, try to cite the specific author(s), rather than the author of the book (for example, Reynes, or Reynes in Yar and Steinmetz).

Please keep in mind the following points:
1. The papers are to be double-spaced with Times New Roman 12-point font and 1-inch margins.
2. Your essay should be no less than 3 full pages.

Write a paper that addresses cybercrime law in revenge pornography. Make sure to examine state, federal, and international law that seeks to reduce this type of criminal behavior.
How do these laws allow police to conduct investigations? To what extent are these laws able to control cybercrime and how likely will the criminal justice system, in general, be at reducing this type of cybercrime?

Explain all models that are used in producing performance results

In this project you will look at a general representation learning method called Big Transfer that was found that is particularly good in specialized small label downstream tasks.

(from the abstract) Transfer of pre-trained representations improves sample efficiency and simplifies hyperparameter tuning when training deep neural networks for vision. We revisit the paradigm of pre-training on large supervised datasets and fine-tuning the model on a target task. We scale up pre-training, and propose a simple recipe where by combining a few carefully selected components, and transferring using a simple heuristic, we achieve strong performance on over 20 datasets.

Tasks / Rubric (100 points)
Write a 2 page (excluding pictures) summary of what transfer learning (10 points)
Write a 2 page (excluding pictures) summary of what architectural improvements, if any, the authors have assumed on top the ResNet-xyz V1 architecture and why (20 points)
Write a 4 page (excluding figures) summary of the key points that need to be made so a non-expert can understand the differences between GN, WS and BN. The top 3 comparisons will make it to my class notes with attribution. (30 points)
Write a 2 page (excluding figures) summary of MixUp regularization and how this may help (30 points).
Explain all models that are used in producing performance results (eg RetinaNet) (10 points)
NOTE:

5 points will be subtracted if you dont issue a pull request of your work to the github with a branch name that equals your UCID.
After your submission we may call you and ask you to explain what you wrote. Copying text and images for documenting your arguments are OK but make sure you understand it. The corresponding points will be subtracted up to 100% if we find that don’t understafktnd what you put in the report.

Examine how different networks are managed by the OS.

Exploring Different Parts of an Operating System Using Venn Diagrams
An excellent way to explain how the different parts of an operating system (OS) support each other is by using a Venn
diagram. This can show how the different parts intersect to form the whole system.
In this project, you will create Venn diagrams displaying the different areas of an OS. Your Venn diagrams should illustrate
the five tasks that OSs perform, which are listed below:
1. process management,
2. memory management,
3. file system management,
4. device management, and
5. system security/network management.
For each task, you will include a Venn diagram and approximately two paragraphs of explanation. Each Venn diagram and
associated explanation will be on one page, for a project total of five pages. Your explanations should include the information
below.
Explain the components.
Describe the task’s role in OS security.
Identify the major tasks of an OS.
Examine how different networks are managed by the OS.
All sources must be referenced; paraphrased and quoted material must have accompanying citations and be
cited per APA style.

Examine how different networks are managed by the OS.

Exploring Different Parts of an Operating System Using Venn Diagrams
An excellent way to explain how the different parts of an operating system (OS) support each other is by using a Venn
diagram. This can show how the different parts intersect to form the whole system.
In this project, you will create Venn diagrams displaying the different areas of an OS. Your Venn diagrams should illustrate
the five tasks that OSs perform, which are listed below:
1. process management,
2. memory management,
3. file system management,
4. device management, and
5. system security/network management.
For each task, you will include a Venn diagram and approximately two paragraphs of explanation. Each Venn diagram and
associated explanation will be on one page, for a project total of five pages. Your explanations should include the information
below.
Explain the components.
Describe the task’s role in OS security.
Identify the major tasks of an OS.
Examine how different networks are managed by the OS.
All sources must be referenced; paraphrased and quoted material must have accompanying citations and be
cited per APA style.