Computer Science
[ORDER SOLUTION] Rapid Miner
Using Rapid Miner to identify predictive analytics from the Sales-Win-Loss data set. Specifically identify any
significant correlations and clusters within the data set. Any other interesting relationships identified in the
data should also be addressed. The main body of the memo should be 3 pages or less with any supporting
documentation in attached appendixes.
Software:
Rapid Miner is available from the eLearning web site (Windows only) or from Rapid Miners web site (Mac
version available but it is newer than the book). Mac users are advised to use a Windows emulation program
(e.g., Boot Camp). The instructions provided in this link should be helpful: (https://support.apple.com/bootcamp). You should also be able to seek help with the instructions from the ITS Help Desk at (850) 474-2075,
(They should be able to walk you through the process.)
Appendix:
The appendix should contain a screen shot of your Rapid Miner Process screen. This can obtained by using
the snipping tool in Windows then it can be pasted into a Word document.
Data Description:
This sample has the following format:
# rows = 78,025
# columns = 16
Column Name Description +
Client Size by Employee Count Employee sized by number of clients. Values are:
[ORDER SOLUTION] Access vs. Excel
Some say that Microsoft Excel and Microsoft Access can both be used for database management. While it’s true that Excel does have some database management features, is there a rationale for using one program over the other?
In crafting your response to this week’s discussion, do some research into exactly what Excel and Access DO – what is the primary purpose of each program?
Knowing that, provide your research-based response to this statement:
You can use either Microsoft Excel or Microsoft Access to store and manage data. True/False/It Depends
Include in-text citations in APA format and a list of References in APA format at the end of your posting.
[ORDER SOLUTION] Designing Security Policy for a Company
Designing Security Policy for a Named Company of Your ChoiceDefinition of a Policy
By definition, security policy refers to clear, comprehensive, and well-defined plans, rules, and practices that regulate access to an organization’s system and the information included in it. Good policy protects not only information and systems, but also individual employees and the organization as a whole.
A policy generally has these characteristics:
Communicates a consensus of judgment
Defines appropriate behavior for users
Identifies what tools and procedures are needed
Provides directives for Human Resources action in response to inappropriate behavior
May be helpful if it is necessary to prosecute violators
Purpose. The purpose of this project is to ensure that appropriate measures are put in place to protect Your Companys information and the Information Technology Services (ITS) systems, and equipment of the infrastructure.
Requirements:
a. Students are required to select a company of their choice. It could be an existing company or your own creation. This is an individual project; not a group project!
b. For the company/organization you selected or made up, create a comprehensive Security Policy you deem appropriate to address all aspects of their infrastructure. Please bear in mind that the purpose of this document is to ensure that appropriate measures are put in place to protect corporate information and the Information Technology Services (ITS) systems, services, and equipment of Your Company and associated infrastructure. This means that the policy aspects you select should address all the functional areas of the organization. First, conduct a brief research of the company you intend to use for this project to learn more about their security functional areas. This will help you to determine the policy aspects you should use.
Policy Templates designed for this purpose are available for use by the public from the SANS website at no cost (pages 4 – 5). A minimum of TWELVE aspects must be selected from all the FOUR major functional security areas (General Security, Network Security, Server Security, Application Security). Many of the Aspects listed in each main Security Functional area also have sub-categories, so you may have to dig further down to download those specific policy documents. Dont use any policy that is not applicable to Your Company. For example, there is no need to use the Lab Security Policy if your company doesnt have a lab.
Your duty is to search and replace all generic company names in the template documents with your chosen Company Name. You also have to customize the templates to match the needs of your company. Each template comes in pdf or Word format. For easy editing, it is recommended that you download the Word format. Your document should be formatted in sections by each Security Policy Aspect. For example, if Acceptable Use Policy ends in the middle of page 20, start the next policy aspect on page 21.
c. Table of Content (ToC) Create ToC listing all the policy and sub policy aspects used in your document.
d. Abstract Create an Abstract describing the companys functional security areas and explaining the need of this document by your company. In simple terms, describe/state how the company will benefit from this Security Policy document.
e. Formatting Since this is a formal document, it must be formatted appropriately. Page number the document, create Header/Footer, insert company logo at appropriate page location, spell-check the entire document. You may use APA style for this project. Abstact and ToC pages should be numbered in Roman Numerals (not counted towards total page-count). Apply regular page-numbering to the remaining document (Page 1 and up)
f. Definition of Terms Use this section to help non-technical readers understand the technical jargons used in the document. The Templates provide that so use them.
g. References Make sure to cite all used documents, graphics, etc., that were not your own creation.
h. Cover page Create appropriate title for the cover page, stating phrases like: Security Policy for Company Name, Prepared by Your Name, Date/Semester, etc. Simply, be creative!
i. Submit a hard copy to your professor and upload a digital copy to Blackboard Dropbox as instructed by your professor. Store your copy in a safe place for future reference. You never know when !
Words of Encouragement:
Dont see this as a tedious task. Enjoy doing it and learn useful lessons from it. Read this email statement from a former student who completed this project years ago:
I wish to thank you for assigning the Security Policy project and guiding us through the process. On my new job, one of the first tasks I was assigned to do along with two other coworkers was to create a Security Policy for the company. The other two individuals had no clue as to how to start the project. Our job became much easier when I showed them my Monroe Project.
Note: See next two pages for the SANS website address (URL) and other pertinent information.
https://www.sans.org/security-resources/policies
Find the Policy Template You Need! Below are links to the Policy Documents.
General
Acceptable Encryption Policy
Acceptable Use Policy
Clean Desk Policy
Data Breach Response Policy
Disaster Recovery Plan Policy
Digital Signature Acceptance Policy
Email Policy
Ethics Policy
Pandemic Response Planning Policy
Password Construction Guidelines
Password Protection Policy
Security Response Plan Policy
End User Encryption Key Protection Policy
Network Security
Acquisition Assessment Policy
Bluetooth Baseline Requirements Policy
Remote Access Policy
Remote Access Tools Policy
Router and Switch Security Policy
Wireless Communication Policy
Wireless Communication Standard
Server Security
Database Credentials Policy
Technology Equipment Disposal Policy
Information Logging Standard
Lab Security Policy
Server Security Policy
Software Installation Policy
Workstation Security (For HIPAA) Policy
Application Security
Web Application Security Policy
CAUTION: Policy, Standard, Guideline are terms often confused by many students.
The following definitions of Security Policy, Standard, and Guidelines, by SANS will be helpful as you plan your research project
A policy is typically a document that outlines specific requirements or rules that must be met. In the information/network security realm, policies are usually point-specific, covering a single area. For example, an “Acceptable Use” policy would cover the rules and regulations for appropriate use of the computing facilities.
A standard is typically a collection of system-specific or procedural-specific requirements that must be met by everyone. For example, you might have a standard that describes how to harden a Windows 8.1 workstation for placement on an external (DMZ) network. People must follow this standard exactly if they wish to install a Windows 8.1 workstation on an external network segment. In addition, a standard can be a technology selection, e.g. Company Name uses Tenable SecurityCenter for continuous monitoring, and supporting policies and procedures define how it is used.
A guideline is typically a collection of system-specific or procedural specific “suggestions” for best practice. They are not requirements to be met but are strongly recommended. Effective security policies make frequent references to standards and guidelines that exist within an organization.
[ORDER SOLUTION] Technology and Innovation as Strategy
1. Discuss the potential of an innovation to establish competitive advantage. Give suitable examples from real market.
2. When and how does the vertical integration become a solution for a company to maintain its competitive advantage? Enrich your answer by suitable examples from Saudi market.
each question not to be less than 275 words ( page and half for each questing )
? Support your submission with course material concepts, principles, and theories from the textbook along with at least two scholarly, peer-reviewed journal articles.
? A mark of zero will be given for any submission that includes copying from other resource without referencing it.
Network Infrastructure Design Diagram
Kamehameha Institute is an organization that provides educational offerings to nontraditional students.
The organization has different offerings depending on the group:
Kamehameha Branded This offering focuses on the general public and provides services directly to its student.
Co-Branded This offering provides the same services as the Kamehameha Branded; however, they are resold by a third party and labeled as
. Kamehameha Strong
White Label While the service offering is the same, these services are labeled solely with the third parties information.
Due to the security and regulatory requirements as well as the concern of corporate espionage, many security concerns must be addressed.
You have been tasked to design a network infrastructure for three facilities located in Honolulu, Hilo, and Lihue. The design is to be based on the following:
There is constant connection between the three locations, carrying at least 75 Mbps of data.
Each facility has three floors, rectangular with dimensions of 250 feet by 400 feet.
There needs to be 150 network connections on the first and second floor of each building. The data center in each building is located on the third floor and requires 75 network connections. Additionally, the Honolulu location will require additional network connections for failover.
The primary data center is located at the Hilo location.
A failover data center is located at the Lihue facility.
Protection from intrusions should be detailed.
The primary web servers (including primary application and primary database servers) are located at the Lihue location.
Redundant database servers are located at the Hilo location.
All servers must have redundancy.
A plan to verify security and failover measures will be required.
THIS WAS THE FEED BACK FOR RESUBMISSION:
There was a second part to this assignment that makes up 2 of the 5 grading elements and that’s what really set your grade back. There is also some more detail that you can add into your topology to make it a better solution. Let me know if you have any questions on your resubmission.
1.1.3: Present ideas in a clear, logical order appropriate to the task.: In this element I’m evaluating the overall presentation of your network topology diagram. Putting myself in the shoes of a client receiving this diagram, I’m trying to answer the question “Does this diagram explain visually my network topology?”
This is a good start, you’ve got a lot of the bones here that make up a good network diagram proposal. For full credit I’m looking for the devil in the details with your proposal. When I look at a topology I should see each networking device that you intend to use and then some solid information on those networking devices like the hardware models, the port density provided, and anything else that the customer is specifically looking for in their requirements. Rework this adding in that meticulous detail and you’ll be in a good place.
2.2.2: Evaluate sources of information on a topic for relevance and credibility.: In this element I’m looking to see that you have met the client’s expectation of having three floors at each location and that floors one and two each support 150 connections. I’m looking to see that floor three is clearly identified as the data center for each location and contains 75 connections.
You’ve done a great job breaking out each site and cleanly labeling them but think about how the customer is going to be looking at the diagram. They are wanting to see that you’ve taken the time to accurately describe their network so for full credit here you’ll want to be sure that each of the three floors is represented. Couple of different ways you could do that visually or with text but right now it’s hard to know for sure which elements support which floor. The customer also has really specific port density requirements that they have given you so you’ll want to be sure that the devices you are recommending meet those requirements. Do you want to go with a single modular switch or does a more traditional tiered campus network make since at each site. Knowing that the third floor is a datacenter how should that play into what you are recommending? Take some time to go over the LabSim sections on network design and maybe do some independent research on campus network design to get a good idea of how you might want to approach this. In your resubmission be sure that I can see each floor of each location and that the port density is easy to see and understand.
10.1.1: Identify the problem to be solved.: In this element I’m looking to see that you have accommodated the client’s unique design requests for each site in the topology.
1. Honolulu should include a primary datacenter.
2. Hilo should include production database servers.
3. Lihue should have failover infrastructure with additional connections.
It looks like you are representing a majority of these specific requirements but it could be a little more obvious in your topology drawing. Think about if you needed to present this in your very first meeting with the customer and all you are able to go off of is this diagram. When the customer asks: “Where are the enterprise web servers at in your solution?” you’ll want to be able to point to a specific object in Honolulu per their requirements. Finding the right amount of detail in these topology diagrams takes some practice but at a minimum you want to be sure that if a customer has taken the time to describe it as a requirements that you show it on the diagram. You’ve done well identifying the Lihue failover site and it’s fine to represent it as a separate location but specifically look into how you want to represent your databases in Hilo and web servers in Honolulu.
10.1.2: Gather project requirements to meet stakeholder needs.: In this grading element I want to see that the client’s requirement of 75 Mbps throughput to the internet is met. I am also looking to see how well defined the WAN solutions are in your proposed topology.
You’ve got a good platform to build on in your resubmission for this section because you’ve got your WAN links identified. For full credit you know that the customer has given you a requirement that the internet connections should be a minimum of 75Mbps bandwidth so you’ll want to be sure that you chose a technology that supports this bandwidth and mark the specific bandwidth you are recommending on the topology diagram. You also know that the customer wants failover in Lihue so you’ll have some amount of replication traffic. As a network engineer you don’t need to implement replication but when a customer has these kinds of requirements it should be an indicator that you need to somehow provide for a secure WAN technology. You can do secure WAN in one of two ways through IPSEC tunnels or through private WAN technologies. Do a little exploration on WAN technologies and revise your solution to account for these requirements it’s completely fine to purpose both a public internet WAN and a private WAN going to different areas of the network.
10.1.3: Define the specifications of required technologies.: In this element I’m looking to see that you have corresponding network address information for all areas of your proposed topology. At a minimum, you should account for Management, the Production Endpoints, the Server Assets, and WAN/VPN/Internet.
I think you might have missed completing or attaching this part of the assignment. You should include a subnet chart that details the addresses you want to use in your solution. Take a look at the assignment instructions for an example. Let me know if you have any questions on this.
13.1.1: Create documentation appropriate to the stakeholder.: In this element I’m reviewing your addressing scheme to ensure that it is technically accurate and that you have provided the correct ID, range, mask, CIDR, and broadcast for each subnet. I’m also reviewing your solution for how reasonable it is to ensure that you haven’t over or under allocated addresses.
Same as the above element it looks like you left this part out of your submission. Let me know if you need any help or have any questions.
13.2.1: Evaluate vendor recommendations in the context of organization requirements.: In this element I’m evaluating the redundancy, failover provisions, and security provided by your solution. As the customer has requested that failover be provided to Lihue and general redundancy of critical assets I’m aiming to identify that through your diagram. The topology diagram should include a firewall, an intrusion prevention system, and VLAN segregation of critical assets. Internet facing assets should be in a DMZ to minimize the risks to internal clients.
You have a firewall object at each location which is a great start. Most importantly here I’m looking for DMZ and VLAN configurations to be shown visually on your topology. How do you want to isolate your end users at layer two with VLANs? You know based on the requirements that the customer has a datacenter and user population at each location so a single VLAN is out of the question but put some thought into how you want to break everything apart at layer two. For the DMZ I’m looking to understand how internet facing assets in the datacenter (like the Honolulu web servers) are situated behind your firewall. Within your campus design I’m interested to see how you build out redundancy between your networking devices. This starts by showing how these devices interconnect and then work to eliminate single points of failure. Think about your client and their mission. Having a desktop go offline from a failure isn’t a big deal but a whole floor or a whole building is probably unacceptable. Where can you build redundancy into your campus with additional links or devices to maintain a reasonable state of redundancy?
I used Draw.io for my diagram. Let me know what type of file you want me to upload, for now I just did .pdf.
[ORDER SOLUTION] Data Mining and Big Data
Discuss what is “Big Data” and the concept of “Data Mining” in detail. Provide a few examples of how Data Mining and Big Data are used in business these days. Discuss what “Predictive Analytics” is. Provide a couple of examples of how it is used in business. Finally discuss in detail what is “Business Analytics”. Provide a couple of examples of using “Business Analytics”. Report must be original, if using web sources rephrase the discussion. provide at least 3 sources for the report.
[ORDER SOLUTION] Cloud and Hybrid Builds
Explain how Cloud Service Models (IaaS, SaaS, PaaS) and How Microsoft Office 365, Azure Fit In?Explain the AWS?Read SP 1800-4 DRAFT Mobile Device Security: Cloud and Hybrid Builds then write a summary for this publica
[ORDER SOLUTION] TAM and The Components
This weeks journal article was focused on how information and communication innovation drives change in educational settings. The key focus of the article was how technology-based leadership has driven the digital age. Also, that the role of technology leadership incorporates with the Technology Acceptance Model (TAM).In this paper, address the following key concepts: Define TAM and the components.Note how TAM is impacting educational settings.Give an overview of the case study presented and the findings.Please be sure that journal articles are peer-reviewed and are published within the last five years The paper should meet the following requirements:3-5 pages in length (not including title page or references) APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.A minimum of five peer-reviewed journal articles. The writing should be clear and concise. Headings should be used to transition thoughts. Dont forget that the grade also includes the quality of writing.
[ORDER SOLUTION] Current Research on Blockchain Technology
Using the University Digital Library or the Google scholar website locate articles discussing different use of Blockchain Technology.Where Is Current Research on Blockchain Technology? 1.Your final document should include an Abstract and a Conclusion. 2. This assignment should be in APA format and have to include at least six references. 3. Minimum of 1000 words.
[ORDER SOLUTION] An Automated Tool For Sql Injection And Database
Refer the following videos and use the below-metioned link for articles at lease use 3 articles as a reference. SQL Injection https://www.youtube.com/watch?v=h-9rHTLHJTY https://www.youtube.com/watch?v=_jKylhJtPmI https://www.youtube.com/watch?v=ciNHn38EyRc Watch this video on the SQL Slammer worm https://www.youtube.com/watch?v=Zbd4Vk9LO3gWatch these videos on inference attacks https://www.youtube.com/watch?v=Z9ZjtvcgOcs https://www.youtube.com/watch?v=rrwUCOEJFJM https://www.youtube.com/watch?v=dx-R_AFQsc0 Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. in essay format not in outline, bulleted, numbered, or another list format. Use the five-paragraph format. Each paragraph must have at least five sentences. Include an interesting meaningful title.Include at least one quote from each of 3 different articles. Use the https://libguides.nec.edu/az.php, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one full sentence (no more, no less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format, not in bulleted, numbered, or another list format. It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proofread your work or have it edited. Find something interesting and/or relevant to your work to write about. Please do not submit attachments unless requested.
Use Promo Code: FIRST15