week 2 assignment: Complete the following assignment in “one MS Word document”:

week 2 assignment: Complete the following assignment in “one MS Word document”:
Chapter 3:
exercise 12 – Go to “data.gov” — a U.S. government–sponsored data portal that has a very large number of data sets on a wide variety of topics ranging from healthcare to education, climate to public safety. 
Pick a topic that you are most passionate about. Go through the topic- specific information and explanation provided on the site. 
Explore the possibilities of downloading the data, and use your favorite data visualization tool to create your own meaningful information and visualizations.
Chapter 4:
Exercise 1 – Visit “teradatauniversitynetwork.com”. Identify case studies and white papers about data mining. Describe recent developments in the field of data mining and predictive modeling.
When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.
All work must be original (not copied from any source).
Textbook:  
Analytics, Data Science, & Artificial Intelligence: Systems for Decision Support Dursun Delen 
Note: within 8hrs, with references, APA format, plagiarism check required

Cybersecurity professionals do not simply focus on securing and protecting tech

Cybersecurity professionals do not simply focus on securing and protecting technical systems. They must also protect against humans. 
In your journal, write about how humans pose a threat to cybersecurity in organizations. Also, address some strategies or techniques that organizations can incorporate to help defend against the human element of cybersecurity.
Your journal entry should be at least two paragraphs long.
Submit your assignment here. For details, see the assignment guidelines and rubric.

Introduce yourself briefly. Then select an emerging technology trend such as cl

Introduce yourself briefly. Then select an emerging technology trend such as cloud computing, industrial control systems (SCADA), internet of things, artificial intelligence, big data, growth of remote workforce, and so on. Discuss how the technology is trending in the workforce and a potential security implication of the technology.
In response to your peers, comment on how a human-related error could cause a security implication within their stated emerging technologies.
To complete this assignment, review the Discussion Rubric.
RESPONSE ONE
Hello Everyone,
     My name is Clinton, and I am pursuing a degree in cybersecurity. I am 38 years old and have been in the manufacturing my entire professional career. I have chosen to transition into the cybersecurity field for a few reasons. One reason is my age and ability to keep working in a physically demanding career. Two would be my love for technology and computers. There is a lack of talent in the cybersecurity world and an ever-growing need to fill those positions. With high salaries and job security, This career perfectly fits my wants and needs. 
     My chosen up-and-coming technology is quantum computing. The advancement of computers and technology is amazing, and we keep advancing by leaps and bounds. Unfortunately, those leaps and bounds come at a cost. Quantum computer tech is still in its infancy, but the research is making big waves. The most significant draw for Quantum computers is their ability to process large amounts of data faster than a normal computer. We know that computers calculate their information in bits, representing each bit by either a 1 or a 0. This is the binary system that all computers use to compute. Since each bit can only represent one of two numbers, the computing capabilities are limited by how fast the processor can interpret the bits. Quantum computing works on the same premise but uses qubits. These qubits are capable of storing more than a single binary number. With the ability to hold both a 1 and a 0 simultaneously, the process grows exponentially the more qubits are transferred. This gives the computer a massive upgrade in computing power. 
     This technology is great for speeding up computational projects, but please remember the presented cost. This double-edged sword will present itself as the tech becomes cheaper to maintain and operate. Take encryption, for instance. We skimmed the surface of encryption in our reading this week. Normal computers would take years to crack a good 256-bit encryption, making attempting to crack encrypted messages and files costly and no longer worth the time. What happens when the computer’s processing speeds can crack those encryptions in minutes? The battle between the red and blue teams often involved fighting each other with the same technology. As one side advances, so does the other. This brings the need to increase our efforts in all aspects of cybersecurity. If we hope to catch up to the threat actors, we must learn and utilize every tool in our tool belt. 
RESPONSE TWO
Hello everyone,
My name is Aharown Jackson, I am a Cybersecurity major, looking forward to interacting with you all.
My emerging technology that I will be discussing is Cloud Computing, or sometimes referred to as Software as a Service (SaaS).
Cloud computing has truly changed the game when it comes to how businesses today store and access software and, at times, their own data (Sabu, 2023). There are many reasons why this is true but for the sake of time I will be discussing two. The first reason is because of the flexibility in scalability. As a business grows it becomes extremely easy to scale up or scale down their computing needs via the cloud (Sabu, 2023). The second being the amount of data storage available and the availability of back ups. Their is a seemingly endless supply of data storage on the cloud computing sector and should an organization lose data for what ever reason, it gives a level of reassurance to that organization to have a third party be responsible for back ups (Sabu, 2023). 
Another reason why I see the trend of cloud computing being an emerging technology are the players in the game. We are talking about huge organizations competing here. Amazon, Google, Microsoft, IBM, Oracle (Sabu, 2023); I’m talking the big boys duking it out for market share. When such high profile companies like the ones mentioned are investing the incredible amounts of resources into these technologies, one has to pay attention.
The biggest security implication that comes to mind is the reliance on a third party to maintain the cybersecurity triad. Although these huge companies must have a sound and stout security apparatus. Their cloud computing departments, specifically data storage, now becomes a huge target. A treasure trove to the most sophisticated threat actors. We’ve seen many attacks by high level threat actors involve the years and years of passive attacks through surveillance before they strike. I wonder if someone isn’t already watching…

https://www.youtube.com/watch?v=RFv53AxxQAo Designing a usable interface can be

Designing a usable interface can be challenging. One of the best ways to learn is to review interfaces and see where they deviate from convention. This week, we learn about 2 concepts: the 8 golden rules of interface design and methods of capturing the user’s attention.
For your discussion question this week, first, provide 3 examples of systems, computer interfaces, applications, or websites that violate some of those rules. For each example, explain what rules are violated and how you would fix them.
Second, provide 3 examples of interfaces that catch the user’s attention well when alerting them to an abnormal condition or time-dependent information. Explain other options that could have been used to accomplish the same result.
Need about 3 pages with peer-reviewed sources. No introduction or conclusion needed.

 Discussion Points: Compare and Contrast Web Analytics methodology Compare

 Discussion Points:
Compare and Contrast Web Analytics methodology
Compare and Contrast Web analytic tools (at least two) used to measure metrics
Analyze Google Analytics Products 
Forum Rubric:
Rubric for Learner Posts
Points
Synthesis of concepts in a substantive manner (critical to class performance)
30
Applications of personal experience
20
Writing standards
10
Response to two or more students in a substantive manner
40

  General Instructions for your Website: During Week 1 through Week 7 of this c

 
General Instructions for your Website:
During Week 1 through Week 7 of this course, you will be building a personal website on a topic of your choice. Choose a topic about which you are both knowledgeable and enthusiastic, so that you will be able to easily write about the topic and share your knowledge of the topic through your website. During Week 1, you will create the home page of your website. Make sure that you write the content (the paragraphs of information about your topic) yourself. Do not copy content from other web pages. Your website should contain at least 4-6 paragraphs of information, arranged in a logical manner (using headings and sub-headings appropriately). During Week 2, you will add an external style sheet to your website. During Week 3 through Week 7, you will either add additional pages to your website or you will add new functionality to your home page, as directed in the instructions for each assignment.
You must write the code files by hand for all assignments in this class. A simple text editor, such as Notepad or Notepad++ will suffice (or TextEdit on the Mac). DO NOT use GUI editors, such as FrontPage, Dreamweaver, etc. You must write the code for your web pages yourself. If you are using a PC, it is strongly recommended that you download the free Notepad++ text editor because it contains extra features which assist with debugging, such as line numbering and color coding of different elements of syntax. Mac users should use the TextEdit text editor that comes with the Mac OS. However, if you are a Mac user, make sure you set TextEdit to use Plain Text by default. You can find instructions for this here.
Make sure all of your web pages comply with the HTML 5 standards and CSS standards. DO NOT use obsolete HTML elements and attributes from previous versions of HTML. By including the HTML 5 DOCTYPE declaration in your webpages, and validating all of your HTML files here, you can be sure that your code complies with HTML 5. Starting Week 2, your external style sheet (.css file) must pass validation at the W3C CSS Validation Service. Make sure you use the “Validate by File Upload” option (and NOT the “Validate by Direct Input” option), on both of these validators since this is the way your instructor will check your pages when grading your assignments.
The home page of your website must be named “LastFirstHomePage.html” where “Last” is your last name and “First” is your first name. For example, if your name is John Smith, you would name your home page file SmithJohnHomePage.html Starting with Week 2, you will also have a CSS file linked into every HTML page on your website. Name your CSS file “LastFirstStyleSheet.css” where “Last” is your last name and “First” is your first name. Your website must only have 1 CSS file and that file should be linked into all HTML pages on your website. Additional HTML pages created for your website (During Week 3 through Week 5) should be hyperlinked together through a navigation menu that appears on all pages of your website. Naming conventions for each additional page on your website will be included in each assignment description that requires a new HTML page.
Specific Instructions for Assignment 4:
For this assignment, you will add a third page to your website named “table.html” and code a table on that page. You will also add code to your CSS file to format your table.
1) Create a new HTML file in your text editor and name the file “table.html”. Just like last week, your new file should contain all of the same basic code that is in the head section of your home page. The body section will contain your new table, which you will create by following the remaining steps of this assignment. After coding all of the basic required HTML tags in your new file, save your new file and validate it using the HTML validator. Debug and fix any errors identified by the validator until your file passes validation.
2) Make sure the external CSS style sheet you created in Assignment 2 is linked into your new “table.html” file with the tag in the head section of the file. Your website should only have 1 CSS file, and that same file should be linked into all HTML pages of your website.
3) Modify your navigation menu on your home page and your “about.html” page by adding a link to this new page. Then add your navigation menu to your new “table.html” file, so that users can navigate to your other pages from this new page.
4) In your table.html file, add the following code:
Create a table using the

tag. Your table must have a row of headings and at least three rows and three columns of data. Use the

,

, and

tags appropriately. You can see examples of the code for HTML tables here.
5) In your HTML file, give your table a caption, using the

tag. You can read about adding a caption to your table here (in the section entitled, “Table Caption” about half-way down the page).
Open your CSS file in your text editor and complete the following steps:
6) In your CSS file, set the “width” property for the

element, using percentage rather than pixels. You can read about setting table width here.
7) In your CSS file, give your table a background color that is different from the background color of the body of your webpage. Use the “background-color” property. You can read about table colors here.
8) In your CSS file, set the “border-style”, “border-width”, and “border-color” properties for the

,

, and

elements using the border shorthand property (do not set each property separately). You can read about the CSS table border properties here.
9) To avoid double borders, set the “border-collapse” property to indicate that table borders should be collapsed into a single border. You can read more about collapsing table borders here.
10) Set the CSS “padding” property for your table header

and table data

cells. You can read about adding cell padding here.
11) Set the horizontal alignment of your table header

and table data

cells, using the “text-align” property. Set the vertical alignment of your table header

and table data

cells, using the “vertical-align” property. Even if you like the default settings of these properties, make sure you explicitly set each of these properties for both your table header

and table data

cells in your CSS file, to demonstrate your understanding of how to set these properties. You can read about horizontal alignment and vertical alignment here.
Hint: You can find examples of all of the HTML elements and CSS properties required for this assignment in the Week 4 module in the Content area of the classroom.
Before submitting your web site:
Validate all HTML files here, using the “Validate by File Upload” option, and fix any errors that the validator identifies before submitting your web site for grading.
Validate your CSS file at here, using the “Validate by File Upload” option, and fix any errors that the validator identifies before submitting your web site for grading.
Note: It is critical that you debug and fix ALL errors identified by these two code validators before submitting your assignments. Contact your instructor for assistance if you are having difficulty debugging and fixing your errors because it is imperative that your code files pass validation.
Submission Instructions: Create a zip file containing all files related to your web page (.html files, .css file, image files, and/or multimedia files). Make sure you maintain the necessary directory structure in your zip file so that your webpages will view correctly when unzipped. In other words, if your images are in a sub-folder on your computer, in relation to the folder containing your .html file, then you need to maintain that same directory structure in your zip file, too. Submit only the zip file for grading.
——————————————————————————————————————-
The video below will walk you through each of the steps of the assignment:
Week 4: Tables:
Rubric for Grading Assignment
Grading Assignment
Exemplary
Accomplished
Developing
Beginning
Points Available
Webpages (HTML files) validate without errors here.
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
10
Style sheet (CSS file) validates without errors here.
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
10
Website contains well-written, well-thought-out, creative, attractive, and well-organized content (uses paragraph, line break, heading tags, and horizontal rules appropriately to organize content)
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
5
Correct use of all basic elements in a webpage document (Ex: DOCTYPE, html, head, body, meta, title, link, etc.) on every HTML page
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
5
Consistent navigation menu on all pages of your website, using local hyperlinks (coded with relative paths)
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
5
CSS style sheet containing appropriate formatting for your website, linked into all HTML pages on your website
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
5
Table contains data or information appropriate for display with a table and is logically organized in the table
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
10
Correct use and correct embedding of table, table row, table header, and table data tags
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
10
Table contains appropriate caption, correctly specified with table caption tag
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
5
Table contains appropriate column and/or row headings, correctly specified with table header tags
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
5
Table, table headers, and table data cells contains appropriate border, specified with the border shorthand property in CSS, and the border-collapse property
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
5
Table header and table data cells contain an appropriate horizontal and vertical alignment, specified in CSS
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
5
CSS correctly used to specify an appropriate amount of padding around the content in your table header and table data cells
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
5
Table contains an appropriate background color, specified in CSS
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
5
Table width is specified in CSS (using percentage instead of pixels)
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
5
Correctly created zip file that contains all files for webpage (maintaining original folder structure)
Student effectively completed the assignment.
Student partially completed the assignment.
The student provided limited and meaningless substance completing the assignment.
Student failed to complete the assignment.
5
Total
100
***Note: Your website must include the required table, as specified in the instructions above, to receive any credit for this assignment. Websites submitted without a table will not receive credit.

  In order to successfully manage risk, one must understand risk itself and the

 
In order to successfully manage risk, one must understand risk itself and the assets at risk. The way one goes about managing risk will depend on what needs to be protected, and from what to protect it.
Instructions
Write a 3-4 page paper in which you:
Discuss at least three rationales for performing an information systems security risk assessment.
Explain the differences in quantitative, qualitative, and hybrid information systems risk assessment and illustrate the conditions under which each type is most applicable.
Describe the type of information that is collected to perform an effective information systems security risk assessment. Include at least three different types. Fully describe each and justify why you made your selections.
Describe at least five common tasks that should be performed in an information systems security risk assessment.
Use at least two quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. The Strayer University Library is a good source for resources.
Your assignment must follow these formatting requirements:
This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.
The specific course learning outcome associated with this assignment is:
Evaluate risk analysis methodologies to determine the optimal methodology based on needs, advantages, and disadvantages.