Subject: ETHICAL HACKING
Question 1: Write a 400+ word essay (APA format & 2 latest scholarly journal article references 2016 on words)
For question details, refer attached document "Multifactor-Authentication-assignment.docx"
Subject:Leadership Paradox and Inter-team Relations
Question 2: Write a 350+ word essay (APA format)
A. What is the leadership paradox? Give some reasons why a leader can encounter difficulty in newly formed teams or groups using a participative management system. Support your discussion with at least two (2) external sources.
B. Present a discussion of the strategies for encouraging participative management in the workforce, and how to implement each of these strategies. Support your discussion with at least two (2) external sources.
C. What serious biases or misassumptions do groups that are involved in inter-team conflict sometimes experience? How do these biases and prejudices affect the ability of teams to accomplish their goals? Support your discussion with at least two (2) external sources.
Subject: Business Intelligence
Question 3: Write a 300+ word essay (APA format & 2 latest scholarly journal article references 2016 on words)
What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?
Question 4: Write a 800+ word essay (APA format & 2 latest scholarly journal article references 2016 on words)
Part 1 (100+ wordS): What is an artificial neural network and for what types of problems can it be used?
Part 2 (100+ wordS): Compare artificial and biological neural networks. What aspects of biological networks are not mimicked by artificial ones? What aspects are similar?
Part 3 (100+ wordS): What are the most common ANN architectures? For what types of problems can they be used?
Part 4 (100+ wordS): ANN can be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.
Part 5 (100+ wordS): Go to neuroshell.com. Look at Gee Whiz examples. Comment on the feasibility of achieving the results claimed by the developers of this neural network model.
Part 6 (200+ wordS): Go to Google Scholar (scholar.google.com). Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain.Observe commonalities and differences among their findings and prepare a report to summarize your understanding.
Subject: Data Science and Big Data Analytics
Question 5: Write a 300 word + essay (APA format & latest scholarly journal article references 2016 on words)
Several Big Data Visualization tools have been evaluated in this weeks paper. While the focus was primarily on R and Python with GUI tools, new tools are being introduced every day. Compare and contrast the use of R vs Python and identify the pros and cons of each. Provide an example of both programming languages with coding examples as well as your experience in using one or both programming languages in professional or personal work. If you have no experience with either language, please discuss how you foresee using either/both of these languages in visualizing data when analyzing big data.
Subject: Enterprise Risk Management
Question 6: Write a 300+ word essay (APA format & latest scholarly journal article references 2016 on words)
The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack - so lets discus both this week.
For reference: Hou, J., Li, Y., Yu, J. & Shi, W. (2020). A Survey on Digital Forensics in Internet of Things IEEE Internet of Things Journal, I(1),1-15,.
Chen, J. & Zhu, Q. (2019). Interdependent Strategic Security Risk Management With Bounded Rationality in the Internet of Things. IEEE Transactions on Information Forensics and Security, 14(11), 2958-2971.
Borek, A. (2014). Total Information Risk Management: Maximizing the Value of Data and Information Assets (Vol. First edition). Amsterdam: Morgan Kaufmann Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=e000xna&bquery=Total+Information+Risk+Management%3a+Maximizing+the+Value+of+Data+and+Information+Assets&type=0&searchMode=And&site=ehost-live&custID=s8501869&groupID=main&profID=ehost
Question 7: Write a 4 page + essay (APA format & latest scholarly journal article references 2016 on words)
Q: Your task this week is to write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.