Fundamentals of Data Science week 2

Using  the same dataset as last week or a different one, select two  qualitative variables and two quantitative variables. Explain why you  selected these variables. 
Analysis:

  • For your qualitative variables, create a contingency table and calculate the association between them. 
  • For  your quantitative variables, calculate the correlation between them.  Include scatter plot to visually represent this relationship. 

Interpretation:  Explain your findings. What does the association or correlation say  about the relationship between your variables? Is the relationship  strong, weak, positive, negative, or nonexistent? 
Reflection:  Reflect on the importance of understanding associations and  correlations in data analysis and how they can guide further data  investigation. 
Submission Format: Your submission should be a maximum of 500-600 words. Submit your assignment in APA format as a Word document or a PDF file. Include  both your written analysis and any visualizations or tables that  support your findings. If you use any software for your calculations  (Excel), please include your code or  formulas as well.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Firewalls

Question #1: Research two software firewalls and explain the advantages and disadvantages of each one of them. Which one would you recommend and why?

Question #2: What are the challenges in securing networks (internet, LANs, wireless)? Which network is most difficult to secure and why?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion 6

 Please see the attached discussion Word document for questions. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

best practices

You have been promoted as the manager of the e-commerce site for the company you working for. You are concerned about a recent SQL attack that happened. Your team reacted to the situation by notifying you immediately. You and your team were successful in containing and correcting the issues that allowed the website and database to be compromised by an SQL injection attack.

Knowing that many of the issues can be created by human error, you have decided to evaluate the processes your team uses when they code. As their leader, it is your responsibility to be current on all the best secure coding practices. Your job is to create guidelines for best coding practices, which you will present to your team.

Follow the instructions below

Provide at least three reasons why it is less expensive to build secure software than to correct security issues after a breach.

Outline the objectives and purpose of your company’s “best secure coding practices” and explain how it will influence your division.

Evaluate which method of the secure software development lifecycle will best serve your team, and explain how you plan on implementing your thoughts into your existing processes.

Identify three resources that can be used as “reference material” and act as a beginner’s guide for new employees. Outline the importance of each resource and how each resource can assist new coders. 

Outline all the major aspects of the best practice coding guideline, including objectives, purpose, resources, and methodology

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

isc242 Respond to post 1&2

Brandon 

Security design principles are fundamental concepts that provide a basis for understanding, developing, and evaluating security mechanisms. These principles include least privilege, fail-safe defaults, economy of mechanism, complete mediation, open design, separation of privilege, least common mechanism, and psychological acceptability (Gollmann, 2011). Authentication methods are used to verify the identity of users, systems, and applications. The most common method is password-based authentication, where users are required to enter a unique password. However, this method has its weaknesses such as the possibility of password cracking or guessing. To mitigate these risks, organizations implement password policies that dictate the complexity, length, and expiration of passwords (Jermyn, et al., 1999). In terms of other authentication methods, two-factor authentication (2FA) or multi-factor authentication (MFA) have been adopted widely. 2FA requires the user to provide two different types of information, typically something they know like a password, and something they have, such as a security token or a smartphone app. MFA extends this by requiring additional verification methods like biometrics (Furnell, 2007).

The principle of least privilege suggests that a user should be given the minimum levels of access necessary to complete their tasks. This can be achieved through the use of role-based access control (RBAC), where access rights are based on the role of the user within the organization (Sandhu et al., 1996). Similarly, the principle of fail-safe defaults means that access decisions should deny by default, and the access should be granted only when permitted. This principle can be implemented through the use of access control lists (ACLs), where each resource has an associated list of users that are permitted access (Gollmann, 2011). Ultimately, organizations should consider these security design principles when implementing authentication methods and password policies to ensure the security of their systems and data.

 Ezikiel

The principle of “Least Privilege” shows the importance of restricting user access to only the resources essential for their role within the organization. By implementing strong authentication methods, like biometrics or multi-factor authentication (MFA), and strong password policies, organizations can ensure that only authorized individuals have access to sensitive data or critical systems. This principle not only reduces the potential impact of insider threats but also mitigates the consequences of external attacks seeking to exploit weak authentication mechanisms. These measures not only enhance the overall security of a business but also create a culture of accountability among it’s users. Regularly updating password policies to show evolving security threats and educating people about the importance of secure authentication practices further solidifies the organization’s dedication to protecting against potential breaches. Additionally, implementing automated access controls that adjust user permissions based on changing roles or responsibilities aligns with the principle of least privilege, ensuring that users only have access to the resources necessary for their current tasks. Through these multifaceted approaches, organizations can effectively mitigate the risk of unauthorized access and protect sensitive assets from potential compromise. 

 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Can this be done in 12 hours?

 50 words

Older Adults and Advanced Care Planning

For this week’s discussion, share your thoughts about advanced care planning or communicating with older adults.

  • Please refer to concepts covered in this week’s resources or activities.
  • Attaching an article, video, podcast, meme, et cetera, as part of your post is always a good idea, but remember that you will need to write sufficient text in the post to meet the required point total for the post. Points will not be earned for merely attaching the resource and submitting a post without any descriptive text.
  • Note: Do not create your post as a reply to the pinned post. Instead, use Yellowdig’s Create option to create a new post.

Select one of the following prompts to begin your discussion post this week:

  • Advanced care planning is not just about old age. After reading the material for this week, what are your thoughts about developing your own advanced care plan?
  • Share a link or an attachment to an advanced directive template. Discuss at least one strength and one limitation of the advance directive you shared.
  • It may take more time to build a rapport with an older client as compared to a younger client. Discuss three steps you would take to build a rapport with an older adult. Discuss one thing you shouldn’t do when building a rapport with an older adult and why.
  • Delivering bad news is never easy. What are three things you learned about delivering bad news?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

two part question

 

Once I’ve learned about my field’s discourse community, what do I do with that information?

After you have looked at your program in the library’s page, do the following steps.

  1. Go to a generative Artificial Intelligence (AI) site, such as ChatGPT or Google Bard, and type a question like this into the site’s chat box:

What style of writing do professionals in the field of ___(type in your program)___ use?

Example questions to ask AI:

What style of writing do professionals in the field of nursing use? 

What style of writing do professionals in the field of sports fitness use?

Copy and paste the answer from AI into a Word document. Be sure to write in the name of the AI tool you used to get these results. You will be pasting this information in the template to be turned in.

(NOTE: This site is a comprehensive catalog of AI tools: Futurepedia, The Largest AI Tools Directory. It is updated daily. Do a search for General Writing to get started.)

  1. Open the template for the assignment and save it as a Word file with the title “(Your last name) Report on Communication.”
  2. Answer the questions on the template with the information you have gathered and the analysis you have done.

 

Item 1 of the Portfolio:  Report on the Communication in My Field of Study (due in week 2)

For this assignment you will complete a form, providing information about 4 things:

  1. The program (discipline) you are studying (examples: Intelligence Studies or Criminal Justice).
  2. Some ways you learned about folks in your discipline (looking at journals, websites, organizations, books, blogs, podcasts, etc.).
  3. Tips for communicating with folks in your discipline gathered from Artificial Intelligence (AI).
  4. YOUR tips for communicating with folks in your discipline (merging AI observations with your own).

Read the information below for a broad understanding of the purpose of this assignment. Refer to the attached template for more specific details on what to do.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Unit 5 Part 2

  1. Why do      you use curl and Wappalyzer™  for?      Describe what else you can use for the same purpose?
  2. Describe      a UNION based SQL injection attack. Provide the syntax of a union based      SQL injection attack and describe it.
  3. Research      the Internet and discuss five ways an organization can prevent SQL      injection attacks. Describe which of these ways is the best way to prevent      an attack and why. Provide citations.
  4. provide      three ways in which you can obtain system information using SQL injection      in the urbank.com login page. System information could include current      user, database version, operating system, user password hash, table names,      usernames, passwords, etc. Provide the syntax of the command used to      obtain system information 
  5. the      str_ireplace(script, null, ) function disallows the SCRIPT element used in      Reflected XSS lab from being executed. Your pentesting assignment is to      research and identify how you would bypass the str_ireplace function and      get a different script to run. Provide the syntax of the script that you      will use as well as a screenshot of your results. Describe how you      bypassed the str_ireplace function and got a different script to run.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

The vulnerabilities of Cybersecurity and future of supply chains

This is for a research class in IT. Using the three sources that I will provide merge it into your own research or merge the three sources together and write a 6-7 page paper on the main topic from the three sources. Leave the abstract blank since I already have written the abstract for it. I have also provided a sample paper of what the paper and format should look like along with a template. Must be your own work. 0% plagiarism and AI( Artificial intelligence tolerance). The provided three sources must be used. Supporting references of your choice can also be used in addition to the 3 primary sources.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Cloud security power point

The CIO and CFO have been working on a new plan to save money by moving a majority of their workload to the cloud. They didn’t bring the CISO into the mix until the last steps of planning, and they’ve already chosen a mixture of SaaS, PaaS, and IaaS tools to meet their requirements. These spans a variety of cloud providers as the CIO said it would increase resilience if one cloud provider became unavailable.

The CISO isn’t happy and needs another presentation from you quickly on cloud security. He’s generally unfamiliar with Cloud as he’s always managed on-premises tools. He’s asked you to prepare a solution that covers the following information:

  • What is the difference between IaaS, SaaS, and PaaS?
  • Who bears the majority of security responsibility with an IaaS provider? A PaaS? A SaaS?
  • What are some of the basic tenets of cloud security?
  • Is security more difficult in a multi-cloud environment? If so, would the loss of the additional resilience (as stated by the CIO) by moving to a single cloud provider be worth it?

PowerPoint Requirements

  • Minimum Slides: No minimum. Do what you think is right.
  • Must use proper grammar/spelling/APA formatting.
  • No crazy templates
  • You must record yourself presenting the presentation. It does not need to include a video of yourself, but it does need to include an audio recording.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now