Subject: INFORMATION ASSURANCE
Question 1: Write a 300+ word essay (APA format & 2 latest scholarly journal article references 2016 on words)
What are some of the industry-standard certifications that exist? Which ones are the most sought after in the IT security field and why? What are the requirements for the certifications, test, number of questions, duration, domain, years of experience required?
Subject: ETHICAL HACKING
Question 2: Write a 300+ word essay (APA format & 2 latest scholarly journal article references 2016 on words)
Explain your thoughts on the future of IoT and the security implications. Why do you believe it is important to secure these devices as they become more common in our lives and our businesses?
Question 3: Write a 6+ page paper (APA format & latest scholarly journal article references 2016 on words)
Refer attached document for details "Final Research Project - IoT.docx"
Subject: Business Intelligence
Question 4: Write a 300+ word essay (APA format & 2 latest scholarly journal article references 2016 on words)
List and briefly describe the nine-step process in con-ducting a neural network project.
Question 5: Write a 700+ word essay (APA format & 2 latest scholarly journal article references 2016 on words)
Part 1 (100+ wordS): What is deep learning? What can deep learning do that traditional machine-learning method cannot?
Part 2 (100+ wordS): List and briefly explain different learning paradigms/methods in AI.
Part 3 (100+ wordS): What is representation learning, and how does it relate to machine learning and deep learning?
Part 4 (100+ wordS): List and briefly describe the most commonly used ANN activation functions.
Part 5 (100+ wordS): What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.
Part 6 (200+ wordS): Cognitive computing has become a popular term to define and characterize the extent of the ability of machines/computers to show “intelligent” behaviour. Thanks to IBM Watson and its success on Jeopardy!, cognitive computing and cognitive analytics are now part of many real world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to solve complex real-world problems. Summarize your findings in a professionally organized report.
Subject: Operational Excellence
Question 6: Write a 300+ word essay (APA format & 2 latest scholarly journal article references 2016 on words)
Research and locate an article relating to Supply Chain Management systems and how they can be used to support business processes and efficiency. After reading the article, provide a brief summary of what you have learned. DO NOT quote the article--only describe what you learned from reading it.
***NOTE: Only review a single article and Intext Citations is a must.
Subject: Data Science and Big Data Analytics
Question 7: Write a 4+ page paper (APA format & latest scholarly journal article references 2016 on words)
This week's article provided a case study approach which highlights how businesses have integrated Big Data Analytics with their Business Intelligence to gain dominance within their respective industry. Search the UC Library and/or Google Scholar for a "Fortune 1000" company that has been successful in this integration. Discuss the company, its approach to big data analytics with business intelligence, what they are doing right, what they are doing wrong, and how they can improve to be more successful in the implementation and maintenance of big data analytics with business intelligence
Refer to the below articles:
Elhoseny, M., Kabir Hassan, M., & Kumar Singh, A. (2020). Special issue on cognitive big data analytics for business intelligence applications: Towards performance improvement. International Journal of Information Management, 50, 413–415. https://doi.org/10.1016/j.ijinfomgt.2019.08.004
Integrated Understanding of Big Data, Big Data Analysis, and Business Intelligence: A Case Study of Logistics. Sustainability 2018, 10(10), 3778; https://doi.org/10.3390/su10103778
Krivo, A., & Mirvoda, S. (2020). The Experience of Cyberthreats Analysis Using Business Intelligence System. 2020 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT), Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT, 2020 Ural Symposium On, 0619–0622. https://doi.org/10.1109/USBEREIT48449.2020.9117694
Subject: Enterprise Risk Management
Question 8: Write a 300+ word essay (APA format & latest scholarly journal article references 2016 on words)
The readings this week expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.
Refer to the below articles:
Montasari, R., & Hill, R. (2019). Next-Generation Digital Forensics: Challenges and Future Paradigms. 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), Global Security, Safety and Sustainability (ICGS3), 205. https://doi.org/10.1109/ICGS3.2019.8688020
Sahinoglu, M., Stockton, S., Barclay, R. M., & Morton, S. (2016). Metrics Based Risk Assessment and Management of Digital Forensics. Defense Acquisition Research Journal: A Publication of the Defense Acquisition University, 23(2), 152–177. https://doi.org/10.22594/dau.16-748.23.02
Nnoli, H. Lindskog, D, Zavarsky, P., Aghili, S., & Ruhl, R. (2012). The Governance of Corporate Forensics Using COBIT, NIST and Increased Automated Forensic Approaches, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, Amsterdam, 734-741.
Question 9: Write a 500+ word essay (APA format & latest scholarly journal article references 2016 on words)
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Refer the attached for course details: "Syllabus.docx"
candidate works as a software developer
Question 10: Write a 4 page + essay (APA format & latest scholarly journal article references 2016 on words)
After reading the required articles this week, please write a research paper that answers the following questions:
1.What are mobile forensics and do you believe that they are different from computer forensics?
2.What is the percentage of attacks on networks that come from mobile devices?
3.What are challenges to mobile forensics?
4.What are some mobile forensic tools?
5.Should the analysis be different on iOS vs Android?