What are the project’s strengths and weaknesses? What did you learn from the visualization techniques Evaluate the project using the concepts and terminology you have learned in class.

Information Technology

Watch two other peer’ presentations, and submit a paragraph to evaluate the project:

  • What are the project’s strengths and weaknesses?
  • What did you learn from the visualization techniques
  • Evaluate the project using the concepts and terminology you have learned in class.

 

Who ultimately has ultimate responsibility for the computer security policies and organization implements and why? Consider the data owner, system owner, executive management, CIO, CEO, and the company’s Board members?

Computer security policies

Provide references for postings in APA format.

  1. Who ultimately has ultimate responsibility for the computer security policies and organization implements and why? Consider the data owner, system owner, executive management, CIO, CEO, and the company’s Board members?
  2. Which of the social engineering scams do you find the most interesting? Have any you ever been the victim of a social engineering scam?

Total word count must be 250 to 300 words

Do not cut and paste, please post original work.

 

Attack monitoring can be used to overcome problems in your system. What type of monitoring is beneficial and are there any limits you need to worry about? Is attack monitoring useful? Are there any drawbacks or shortcomings that could leave you vulnerable?

Two different Discussions

 Discussion one:

Discuss ONE of the Following Topics: 

  1. Attack monitoring can be used to overcome problems in your system. What type of monitoring is beneficial and are there any limits you need to worry about? Is attack monitoring useful? Are there any drawbacks or shortcomings that could leave you vulnerable?
  2. What does “Layer 2” refer to and how is a Layer 2 attack carried out? How dangerous is this type of attack? Where does this take place and in today’s network, is it very common?
  3. How dangerous is an untrained user in your company? What damage could possibly be done that you have seen happening by an untrained user? Whose responsibility is it to train/watch those individuals?
  4. Whose job is it to identify vulnerabilities? Should it be everyone’s job? If so, how would everyone carry this task out?
  5. Name a vector or pathway for a specific attack as discussed in the text. Give an example. Why is it important to know these vectors/pathways?

 Discussion # Two

 Discussion:

  1. A question/comment about Server form factors: Differences between Rack Mounted, Towers, and Blade Servers and your experiences with each.
  2. A question/comment about CPU performance and the different metrics used to determine how well a CPU works for your system. Discuss your preference and experience with different CPUs or instances where you had to change a CPU and any issues that came up.
  3. A question/comment about Memory: Your experience with Server memory and any issues that came up when you had to add additional modules.
  4. A question/comment about creating a safe Server environment: What has to be built to house the number of Servers that your company needs? Explain your setup (or a company you know) and what safety guards are in place to make sure the Servers maintain adequate production.

 

USE APA FORMAT PLZ

ADD REFERNCES TO SUPPORT YOUR ANSWERS

 

 

Using Intellectual property theft as the incident, use the internet or online library, find an article, case study, or publication about computer forensics that addresses the specific incident type.

Computer Forensics: Intellectual Property Theft

Using Intellectual property theft as the incident, use the internet or online library, find an article, case study, or publication about computer forensics that addresses the specific incident type.

Summarize your findings. Be sure to provide a link to the article, case study, or publication.

Using at least 500 words – summarize the article you have chosen.

Computer Forensics: USA Patriot Act of 2001

Research by finding an article or case study discussing the USA Patriot Act of 2001 and the corresponding laws or legal issues as it relates to computer forensics:
Using at least 500 words – summarize the article you have chosen. You will be graded on Content/Subject Knowledge, Critical Thinking Skills, Organization of Ideas, and Writing Conventions.

How can Goel ensure that the culture of vicarious learning is maintained at Coinmen after the implementation of a KMS? Is it advisable for Coinmen to implement an HRIS along with a KMS? What options are available to Coinmen with respect to implementing an HRIS?

Coinmen Consultants LLP: Adopting a TechnologyBased Learning Culture

Case Study Questions

Download the Coinmen Consultants LLP: Adopting a TechnologyBased Learning Culture case from the Harvard Business School Press.

Answer the following discussion questions. Please limit the size of your analysis to 34 pages 1.5 lines spacing.

1. Will the implementation of a KMS be a blessing or a curse for Coinmen? Focus on work quality, employee learning and competitive standing. State your position and support it with information from the case. Based on these three components, what is the best option for Coinmen with respect to KMS implementation?

2. To ensure unique content in projects, while still maintaining employee learning and personal development, which approach is more suitable for the organization: a personalization strategy or a codification strategy? Describe each strategy and state your position with information from the case.

3. How can Goel ensure that the culture of vicarious learning is maintained at Coinmen after the implementation of a KMS?

4. Is it advisable for Coinmen to implement an HRIS along with a KMS? What options are available to Coinmen with respect to implementing an HRIS?

Mention all possible activities you will need to complete within Project Planning phase and what are main considerations which might influence the end result.

Project Planning

Imagine you are a Project Manager hired to a newly created StartUp. Approval for the project idea was already received. Mention all possible activities you will need to complete within Project Planning phase and what are main considerations which might influence the end result.

Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?

Portfolio project

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook .

Start your paper with an introductory paragraph.

Prompt 1 “Data Warehouse Architecture” : Explain the major components of a data warehouse architecture, including the various forms of data transformations needed to prepare data for a data warehouse. Also, describe in your own words current key trends in data warehousing.

Prompt 2 “Big Data” : Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?

Prompt 3 “Green Computing” : One of our topics in Chapter 13 surrounds IT Green Computing. The need for green computing is becoming more obvious considering the amount of power needed to drive our computers, servers, routers, switches, and data centers. Discuss ways in which organizations can make their data centers “green”. In your discussion, find an example of an organization that has already implemented IT green computing strategies successfully. Discuss that organization and share your link. You can find examples in the UC Library.

Conclude your paper with a detailed conclusion section.

Draw the Bayesian network corresponding to this setup and define the necessary CPTs. Calculate which coin was most likely to have been drawn from the bag if the observed flips come out heads twice and tails once.

Artificial intelligence

Directions: Complete questions 1-7 below.

⦁ (20pt) Consider the following Cryptarithmetic problems, where all letters represent a different digit and the resulting sum is correct. Write out all of the variables, domains and constraints of the problem.

⦁ SATURN

+ URANUS

= PLANETS

⦁ YES

SEND

ME

+ MORE

= MONEY

⦁ (20pt) Consider the following set of edges between nodes. Find a coloring using colors red, blue, and green such that no two adjacent nodes are assigned the same color.

{(a, b),(a, d),(b, c),(b, d),(b, g),(c, g),(d, e),(d, f),(d, g),(f, g)}.

⦁ Define a CSP for this problem. Clearly define the variables, domains, and constraints.

⦁ Draw the binary constraint graph for this CSP.

⦁ Find at least one solution to the CSP.

⦁ (20pt) Given the below full joint distribution, calculate the following:

⦁ P(toothache)

⦁ P(Cavity)

⦁ P(Toothache | cavity)

⦁ P(Cavity | toothache ∨ catch).

⦁ (20pt) We encounter a slot machine with three independent wheels, each producing one of the four symbols bar, bell, lemon, or cherry with equal probability. The slot machine has the following payout scheme for a bet of 1 coin (where “?” denotes that we don’t care what comes up for that wheel):

⦁ bar/bar/bar pays 20 coins

⦁ bell/bell/bell pays 15 coins

⦁ lemon/lemon/lemon pays 5 coins

⦁ cherry/cherry/cherry pays 3 coins

⦁ cherry/cherry/? pays 2 coins

⦁ cherry/?/? pays 1 coin

Compute the expected “payback” percentage of the machine. In other words, for each coin played, what is the expected coin return?

⦁ (20pt )We have a bag of three biased coins A, B, and C with probabilities of coming up heads of 20%, 60%, and 80%, respectively. One coin is drawn randomly from the bag (with equal likelihood of drawing each of the three coins), and then the coin is flipped three times to generate the outcomes X1, X2, and X3.

⦁ Draw the Bayesian network corresponding to this setup and define the necessary CPTs.

⦁ Calculate which coin was most likely to have been drawn from the bag if the observed flips come out heads twice and tails once.

⦁ (30pt) In your local nuclear power station, there is an alarm that senses when a temperature gauge exceeds a given threshold. The gauge measures the temperature of the core. Consider the Boolean variables A (alarm sounds), FA (alarm is faulty), and FG (gauge is faulty) and the multivalued nodes G (gauge reading) and T (actual core temperature).

Draw a Bayesian network for this domain, given that the gauge is more likely to fail when the core temperature gets too high.

⦁ (20pt) Two astronomers in different parts of the world make measurements M1 and M2 of the number of stars N in some small region of the sky, using their telescopes. Normally, there is a small possibility e of error by up to one star in each direction. Each telescope can also be badly out of focus , in which case the scientist will undercount by three or more stars (or if N is less than 3, fail to detect any stars at all). Consider the three networks shown.

⦁ Which of these Bayesian networks are correct representations of the preceding information?

⦁ Which is the best network? Explain.

 

As a private sector organization, do you believe that an equivalent to GDPR should be implemented in the United States?

Private Sector Organizations

Review the General Data Protection Regulation (GDPR) (https://www.gdpreu.org/) of the European Commission (EU). It includes many provisions and arguably strengthens data protection for individuals within the EU. It even includes the right to be forgotten. The United States does not have a similar regulation. There have only been a few regulations implemented related to US citizens’ private data, which include medical and financial industries. Some argue implementing regulation such as GDPR in the United States would hinder innovation. They contend that the End User License Agreements (EULA) provide sufficient protections and allow the citizens to make the choice of what is and is not shared.

As a private sector organization, do you believe that an equivalent to GDPR should be implemented in the United States?