Vulnerabilities and threats associated with data being stored

Describe vulnerabilities and threats associated with data being stored, in transit, and in use.
Compare two cryptography tools and strategies for the project that would be beneficial for protecting data being stored, in transit, and in use.
Describe at least three additional noncryptography strategies for protecting stored data, data in transit, and/or data in use for the company.
Describe strategies and identify at least two tools for supporting the AAA framework in the company’s security solution.
Determine how you would consider applying access control and identify management to protect stored data, data in transit, and/or data in use for the company.
Define at least two policies or guidelines that you would include in the organization’s data security manual.

Sample Solution

Data security strategy.

complete a data security strategy. This is done by gathering facts about the selected organization and identifying necessary information.

Describe vulnerabilities and threats associated with data being stored, in transit, and in use.
Compare two cryptography tools and strategies for the project that would be beneficial for protecting data being stored, in transit, and in use.
Describe at least three additional noncryptography strategies for protecting stored data, data in transit, and/or data in use for the company.
Describe strategies and identify at least two tools for supporting the AAA framework in the company’s security solution.
Determine how you would consider applying access control and identify management to protect stored data, data in transit, and/or data in use for the company.
Define at least two policies or guidelines that you would include in the organization’s data security manual.

Sample Solution

Data collections

Conduct a literature review of big data handling approaches in smart cities including techniques, algorithms, and architectures.You are to review the literature on smart cities and Big Data Analytics and discuss problems and gaps that have been identified in the literature. You will expand on the issue and how researchers have attempted to examine that issue by collecting data – you are NOT collecting data, just reporting on how researchers did their collection.Paper Layout:

Title Page
Table of contents: Use a Microsoft Enabled Table of Contents feature.
Background: Describe the issue, discuss the problem, and elaborate on any previous attempts to examine that issue. Be sure to include techniques, algorithms, and architectures.
Research Questions:
In the identified problem area that you are discussing, what were the research questions that were asked? Be sure to include main research questions from all the literature you are reviewing.
Methodology:
What approach did the researcher use, qualitative, quantitative, survey, case study? Describe the population that was chosen. You will discuss the methodology for all the literature you are reviewing.
Data Analysis:
What were some of the findings, for example, if there were any hypotheses asked, were they supported?
Conclusions:
What was the conclusion of any data collections, e.g., were research questions answered, were hypotheses supported?

Sample Solution

Data Management

Data Management Information System Design and Implementation Proposal Report

Now that you have a better understanding of what types of information systems a business may use for its daily operations and to support its customers, you will select an enterprise or organization (real or fictitious) of your choosing to determine which data management information systems can best support it. By then end of this class, the goal is to prepare a comprehensive proposal for the design and implementation of an information system that can support data management.

In this first Individual Project (IP), you will describe your selected organization’s issues related to data management, such as using sales to forecast future production needs. You will also set up the report outline so that you can add to it each week. The combined weekly IP assignments will be your final Key Assignment deliverable.

You will be working on many parts of the proposal throughout each week that will lead you to complete the final proposal report. Each week, you will receive IP assignment information and a deliverable for each IP.

Project Selection

First, you must choose a company or enterprise (can be hypothetical) along with a product(s) that fits the following criteria:

Nontrivial: The enterprise or organization utilizes or has the potential to utilize information systems.
Domain knowledge: You will apply concepts you learned in Unit 1 for BADA200.
Select a company and product that fit these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. What you choose will be used for all of the assignments each week.

Sample Solution

Datasets

Communicating information learned from data is often most effectively done by creating visual representations of the findings. In this group assignment, you will work with your collaborative group to create bars and graphs based on public health data.

The objective of this assignment is to help each other learn and reinforce this crucial skill set used in data analysis.

Each member of the group should work on the following:

Locate datasets available from the CDC, NIH, or another public source.
Use Microsoft Excel® to create bar charts and side-by-side bar graphs of your datasets.
In the discussion area for your group, post your charts and graphs and provide a brief explanation of your analysis and any tips you can share about your process for creating the visualizations that other members of your group can benefit from.

Sample Solution

Frequency distribution on the data

Use the free version of SPSS to review, demonstrate, and execute the following functions:

  1. Enter the following data:

Case 1: Age 24. Weight 165. Gender Male. Pretest score 65. Post test score 80

Case 2: Age 28. Weight 150. Gender Female. Pretest score 65. Post test score 75

Case 3: Age 23. Weight 125. Gender Female. Pretest score 80. Post test score 85

Case 4: Age 31. Weight 150. Gender Male. Pretest score 83. Post test score 90

Case 5: Age 24. Weight 150. Gender Male. Pretest score 75. Post test score 80

1b) Run descriptive statistics on the data

1c) Run a frequency distribution on the data

1d) Create a graph of posttest scores

  1. Complete the SPSS Assignment Table below

Item 2.1: What was your mean? Response? Comment?

Item 2.2: What were your t-test results? Response? Comment

Item 2.3: What was your standard deviation? Response? Comment

Sample Solution

Many business activities generate data

Many business activities generate data that can be thought of as random. An example described in the textbook is the servicing of cars at an oil change shop. Each car entering the shop can be considered an experiment with random outcomes. A variable of interest in this experiment could be the amount of time necessary to service the car. Service time will vary randomly with each car.

We can often capture the most relevant characteristics of a stochastic process with a simple probability distribution model. We can then analyze the model to make predictions and drive decisions. For instance, we could estimate the number of technicians the oil change shop needs to service demand on a Saturday afternoon. Discuss the following:

What is a random variable?
How would you differentiate a discrete from a continuous random variable?

Sample Solution

Relational databases

For decades, relational databases remained essentially unchanged; data was segmented into specific chunks for columns, slots, and repositories, also called structured data. However, in this Internet of Things (IoT) era, databases need to be reengineered because the very nature of data has changed. Today’s databases need to be developed with the needs of IoT in mind and have the ability to perform real-time processing to manage workloads that are dynamic. For example, relational databases should be able to work with real-time data streaming and big data (an example was presented in the unit lesson).

Scenario: eHermes wants their personnel to be able to view security video footage in real-time and provide them with the ability to query video footage for viewing. Choosing a database solution such as MongoDB would allow eHermes to store mobile self-driving video footage in the same database as the metadata.

To do this, eHermes needs a way to manage the demands of real-time data streaming for real-time analytics. Conduct some research for a NoSQL database application such as MongoDB or Cassandra that could meet this need. How would switching to a real-time database solution help eHermes remain competitive? Create a PowerPoint presentation that does the following:

· Provides a brief introduction to IoT.

· Presents an argument to the eHermes CEO that switching to a more dynamic database structure (NoSQL real-time database) will meet the demands of IoT.

· Introduces some features of the database you chose, whether it is MongoDB, Cassandra, or another database.

· Describes how switching to a more dynamic database will give eHermes a competitive advantage?

Sample Solution

Data Mining

· What were the traditional methods of data collection in the transit system

· Why are the traditional methods insufficient in satisfying the requirement of data collection

· Give a synopsis of the case study and your thoughts regarding the requirements of the optimization and performance measurement requirements and the impact to expensive and labor-intensive nature.

Sample Solution

IoT device can send data to a cloud service.

A sensor within an IoT device can send data to a cloud service. For example, AWS IoT is a cloud service that can store data from IoT device sensors. Once that data is received, a service can write a DynamoDB table based on certain rules. DynamoDB is a non-relational database (NoSQL). To learn about how database rules operate, read AWS IoT Rules Tutorials. https://docs.aws.amazon.com/iot/latest/developerguide/iot-rules-tutorial.html)
Prompt
To complete this activity, you will want to go into the AWS Management Console through your AWS Academy account. You can do this by logging into AWS and starting your Learner Lab. Once in the AWS Management Console, select ‘DynamoDB’ under All Services, Database.
• Once you’re in the right console, follow the tutorial to create a rule for query statements in a non-relational database. The first step involves choosing “Act.”
o If you’re having issues accessing the Creating a Rule with a DynamoDB Action (https://docs.aws.amazon.com/iot/latest/developerguide/iot-ddb-rule.html) tutorial through AWS, use this link. Take screenshots to show your work.
After you have created the rule, test the rule using DynamoDB Action.

o Take screenshots to show your work.
• Write a reflection to address the following questions:
o What is an appropriate business scenario where a key-value document-based database like DynamoDB would be used?
o What’s a best practice for isolating frequently used items?
o When should you use a DynamoDB Rule compared to other rules, such as Lambda Action and SNS?

Sample Solution