I need 1 Journal on the topics related to the below.
Data Engineering on relational databases
Big Data Engineering on Hadoop and cloud platforms
Data Analytics using Python and Machine learning
Please write a journal of at least 9000 words.
Sample format of the journal is attached.
Category: Computer Science homework help
Code of Ethics IT workers have many different relationships, including those
Code of Ethics
IT workers have many different relationships, including those with employers, clients, suppliers, other professionals, IT users, and the society at large, and that in each relationship, an ethical IT worker acts honestly and appropriately. IT workers must set an example and enforce policies regarding the ethical use of IT. IT workers are in a unique position because they have the skills and knowledge to abuse systems and data or to allow others to do so.
Discuss an ethical issue IT organizations face today. Have you been personally affected by an IT ethical issue? Provide examples
Resources
https://wakelet.com/wake/R4mkOBDBo1z29oW8fWl6K
IT Ethics
[edit | edit source]
The simplest definition of ethics within the world of information technology is the ethical issues that come out of the usage and development of electronic technologies. IT Ethics have a goal and that goal is to find moral solutions to the various problems that arise from online activity. The 10 Commandments of Internet Ethics
All jokes aside, this list of rules makes sense and somewhat works as a guideline for ethical internet use:
The Internet must not be used to harm others.
The interference of other Internet user’s work is prohibited.
Poking around in the personal files of another Internet user is bad.
The use of the Internet for stealing is not allowed.
The internet should not be used for deception or trickery.
The copying or pirating of unpaid software is illegal.
The use of other Internet sources without permission or compensation is wrong.
Do not take credit for other’s intellectual property.
Understand the social consequences that can occur when coding or designing.
Always use the Internet in considerate ways and show respect to your fellow human.
Computer Ethics
[edit | edit source]
Ethical problems in IT existed long before mankind learned how to conduct machine learning and build neural networks. Asimov also deduced three laws of robotics in his works, but the modern idea of interaction with AI remains approximately at the same level.
For those who suddenly do not remember Asimov’s postulates, I quote them separately:
A robot cannot harm a person or by its inaction allow a person to be harmed.
A robot must obey all orders given by a human, unless those orders are contrary to the first law.
The robot must take care of its safety to the extent that this does not contradict the first or second law.
Many AI developers consider them to be the ideal principles by which robots should operate. Their main advantage is simplicity. After all, the more complex the algorithms of actions, the easier it is to break them.
Using these postulates as an example, one can try to uncover the complexities of ethics in robotics, thereby characterizing ethics in IT.
When creating true AI, there will be another problem that is paradoxically stupid today, but quite possible in the future. After all, if a robot thinks like a person, then there will definitely be a movement for the rights of robots.
Moreover, there are already precedents. In 2017, the sensational robot Sophia received honorary citizenship of Saudi Arabia. And, although it is very far from true AI, there is a legislative precedent, and it is quite possible to use it to give other androids rights comparable to human ones.
The more specialists work on robotics, the more questions arise. And they don’t have a solution. For example:
There are several companies in Japan and the US that create sex robots. And if AI robots get rights, can a robot refuse to have sex with a human? And will it be considered rape if you do not pay attention to the refusal?
How will the creation and operation of autonomous military robots be regulated? And what danger will be borne by the changed laws of robotics, which in principle allow violence against humans?
How will the buying and selling of self-aware robots be regulated? There are many opinions here that this can turn into a new wave of slavery and the liberation movement.
Now legislators consider the legal field of robots approximately similar to the legal field of animals. But even here, there has not yet been a consensus on who will be responsible if the robot harms other people: the owner or the manufacturer.
The point is that the topic of ethics in IT is very broad and requires deep study.
Cyberethics
[edit | edit source]
Cybertechnology refers to any computing or communication technologies. This is arguably a more accurate term than computer ethics because it encompasses all technologies rather than just computers. There is a debate on whether or not cybertechnology brings in new or unique ethical issues, which would call for a new perspective or special consideration. There are two main views on this issue: traditionalist and uniqueness proponent. Traditionalists argue that nothing in this field is new in the sense that crime is still considered crime and fraud is still considered fraud, even in the cyber realm. The uniqueness proponents argue that there are new unique ethical issues that did not exist before cybertechnology. A common confusion in this thought is mixing up unique features of cybertechnology with unique ethical issues. The term unique, per Merriam-Webster, is defined as the only one or being without a like or equal [4]. The issues surrounding cybertechnology, such as privacy, property, and others are not new concerns. However, cybertechnology does have unique features that muddle the solutions for these types of issues.
Ethics for IT Professionals
[edit | edit source]
Like any other profession, there are standards of ethical guidance used to help people when facing uncertain circumstances. It’s important for individuals to understand that what is legal may not always be ethical. Not behaving in an ethical manner can disturb the trust between employees, clients, staff, and the general public.
Ethical Code
[edit | edit source]
Ethical code consists of principals and behavioral expectations established by organizations for their employees and third parties. The core values of a company are also implemented
The code of ethics also outlines core company values that workers are expected to uphold during business operations. Code of ethics is actually very similar to code of conduct. However, code of ethics focuses more on a company’s morals and values at a high-level while code of conduct focuses more on specific situations. Having an ethical code is important as it serves as a permanent reminder of the principals every employee is expected to uphold everyday.
IT Code of Ethics
[edit | edit source]
There are many resources for IT professionals to refer to when searching for ethical guidance. A few examples of these resources include:
“The Code of Ethics” in section seven of IEEE.
“The Code of Ethics and Standards of Conduct” from the Association of Information Technology Professionals (AITP)
“IT Code of Ethics” from SAN
One of the main sections that are highlighted in the code of ethics are the ethical behaviors that are expected of each individual. Employees are often expected to uphold integrity, responsibility, and professionalism during work. This includes properly handling confidential information, maintaining a safe working environment, and avoiding unlawful conduct such as accepting brides. Code of ethics also highlights ethical behaviors towards others. Workers are often expected to treat others fairly without engaging in discriminatory and harmful behavior.
Quality of Life Discuss one or more of the emerging technologies, you believe
Quality of Life
Discuss one or more of the emerging technologies, you believe have the potential for ethical abuse or conflicts that would affect one’s quality of life. Provide examples – you might consider the digital divide, video games, screen time for children, or whatever you prefer.
Resource
https://wakelet.com/wake/R4mkOBDBo1z29oW8fWl6K
Digital Intellectual Property The Internet is an ideal communication mechanis
Digital Intellectual Property
The Internet is an ideal communication mechanism because of its openness and anonymity but people must make ethical decisions about how to use this power. Intellectual property is a work of the mind, such as art, books, formulas, inventions, and processes that are distinct and created by a single person or group. Copyright law protects authored works such as art, books, film, and music. Patent law protects inventions, and trade secret law helps safeguard information that is mission critical in an organization
Discuss how freedom of expression and intellectual property rights might ethically conflict. In your reply, consider how your own freedom of expression might affect your privacy or personal intellectual property. Please provide examples when possible.
Read these resources
https://en.wikibooks.org/wiki/Information_Technology_and_Ethics
Follow the attached instructions to complete this work. Use provided resources
Follow the attached instructions to complete this work.
Use provided resources to complete the work.
Very Important: Make sure the work aligns with the attach rubric
To complete this assignment, review the prompt and grading rubric in the Project
To complete this assignment, review the prompt and grading rubric in the Project Three Milestone Guidelines and Rubric. You will also need to access the Project Three Milestone Decision Aid Template Word Document.
Contingency planning is an important part of the cybersecurity process. It is n
Contingency planning is an important part of the cybersecurity process. It is necessary to have a plan for mitigating and recovering from damage.
In your journal, you will reflect on cryptography and contingency planning. Specifically, you will discuss cryptography, keys, algorithms, business continuity, and disaster recovery.
Your journal entry should be three or more sentences per prompt and address the following questions:
What cryptographic applications are used in information system security?
What is business continuity management?
What is a disaster recovery plan (DRP)?
What role do backups play in disaster recovery?
Exp19_Word_Intro_Cap_Thinking Project Description: As a class assignment, yo
Exp19_Word_Intro_Cap_Thinking
Project Description:
As a class assignment, you are working with a research report related to decision making. You are finalizing the first draft and will submit it for your instructor’s approval. In so doing, you edit and format text, include a table of contents and a cover page, design a table, and include citations and a Works Cited page.
Steps to Perform:
Step
Instructions
Points Possible
1
Start Word. Download and open the file named Exp19_Word_Intro_Cap_Thinking.docx. Grader has automatically added your last name to the beginning of the filename.
0
2
By displaying nonprinting characters, you see such indicators as page and section breaks, which are helpful when managing document flow.
Display nonprinting characters. Note that the document includes a blank first page. Change the document theme to Retrospect and select Colors of Blue Warm. Select all text in the document and change the font to Times New Roman. Click the View tab and display the ruler.
4
3
Some phrases, such as full names of people or publications, display more attractively if they are not divided between lines, as is the case with the name of the publication referenced in this paper. By including a Nonbreaking Space, you ensure that the publication name will not be divided between lines.
Remove the word why from the second sentence in the first body paragraph on page 2. Remove the space following the word Cognitive in the last sentence of the first body paragraph on page 2 and insert a Nonbreaking Space symbol between Cognitive and Creativity.
5
4
Insert check mark bullets on the three single-line paragraphs in the first body paragraph, beginning with the irrationality of humans and ending with the nature of well-being. Reduce the indent to position bullets at the left margin and ensure that each bulleted text begins with a capital letter. Change the left and right margins to 1”.
6
5
In Outline view, you can collapse headings to any level of detail and then manage sections, perhaps dragging to rearrange them as you do in this step.
Change to Outline View. Change the Show Level setting to Level 2. Drag Stages of Prospect Theory directly below the heading Prospect Theory so that it becomes the first sublevel in the Prospect Theory section. Close Outline View. Bold the bulleted items on page 2.
5
6
Select all text in the document and adjust paragraph spacing before and after to 0 pt. Double-space the document. Add a first line indent of 0.5″ to the first body paragraph on page 2 (beginning with The study of behavioral economics). Center the title and subtitle (Cognitive Creativity and An Analysis). Change the line spacing of the first line, Cognitive Creativity, to 1.0.
5
7
Text that is formatted in a particular style adheres to the design requirements of the style. To quickly change all text based on a particular style, or to ensure that text that is typed in that style is formatted appropriately, you can modify a style. By default, style settings are applied to the open document only.
Modify document properties to include Parker Adams as the author, removing any existing author. Modify Heading 1 style to include a font of Times New Roman, 14 pt., Black, Text 1. Modify Heading 2 style to include a font of Times New Roman, Black, Text 1. Changes in style should apply to the current document only.
6
8
Tabbed text can, in some cases, be formatted and worked with more easily if it is identified as a table. In this case, arranging the tabbed text as a table enables you to apply a preset style and to include an appropriate formula in a future step.
Select the lines of tabbed text near the top of page 3 (beginning with System 1 and ending with 0.39) and convert the selection to a table, accepting all default settings. Insert a row above the first row of the new table, merge all cells, and type Systems of Decision Making. (Do not type the period.) Center text in the first row.
7
9
Insert a row below the first row. Split the cells in the row, adjusting the number of columns shown in the dialog box to 4 and ensuring that Merge cells before split is selected. Select the table and choose Distribute Columns on the Table Tools Layout tab to align all columns.
3
10
Type the following text in row 2:
System Theory Characterized by Percentage Employed Probability Factor
2
11
Insert a row at the end of the table and merge the first three cells on the new row. Type Average Probability in the merged cell on the last row and center the text. In the last cell on the last row, enter a formula to average the numbers in the column above. You do not need to select a Number format.
6
12
Apply a table style of List Table 3 – Accent 1 (row 3, column 2 under List Tables). Deselect First Column in the Table Style Options group to remove bold formatting from the first column. Bold text on the second row. Select the table and change all font to 10 pt. size. Center all text in rows 2, 3, and 4. Center the numeric value in the last cell on the last row.
5
13
Add a caption below the table with the text, Table 1: Decision-Making Strategies. (Do not type the period and be sure to include a hyphen between Decision and Making.) Change the probability factor for System 1 (in row 3) to 0.62. Update the field in the last cell on the last row to reflect the change in probability.
5
14
Select rows 2, 3, and 4, click the Table Tools Design tab and choose a Pen Color of Black, Text 1. Ensure that the line style is a single line and the line weight is ½ pt. Apply the border selection to All Borders.
2
15
A footnote provides space for additional clarity or exposition on a statement included in the document. Use a footnote if you want to provide additional detail, but do not want to clutter the document text with that information.
Click after the period that ends the last sentence in the first body paragraph under System Biases (ending in economical solutions to problems). Insert a footnote with the text, For more information on theory-induced blindness, visit http://cognitivecreativity.com/theory. (Include the period and be sure to include a hyphen between theory and induced.) Right-click the footnote and modify the style to include Times New Roman 12 pt. font.
5
16
Shade the first two lines on page 2, Cognitive Creativity and An Analysis in Blue, Accent 2, Lighter 60% (row 3, column 6). Add a ½ pt. Box border, selecting color of Black, Text 1. Insert a DRAFT 1 watermark, colored Red (second column in Standard Colors).
5
17
Click before the Cognitive Creativity heading at the top of page 2 (in the shaded area) and insert a page break. Click before the new page break indicator on the newly inserted page 2 and insert a table of contents, selecting Automatic Table 1.
Mac users, select the Classic table of contents style.
5
18
Because you plan to format the first page independently of the remaining pages, you insert a continuous section break before the first page is inserted. Breaking a document into sections enables you to format each section independently.
Click before the table of contents title and insert a continuous section break. Click before the page break indicator on the first page and insert text from the file Cover.docx. Use settings in the Page Setup dialog box to center the cover page vertically. Ensure that the settings apply to the current section only.
3.5
19
Click before the fourth blank paragraph below the words An Analysis on the Cover page. Insert Question_Mark.png. Change the picture height to 1.5” and choose Top and Bottom text wrapping. Apply an artistic effect of Paint Strokes to the picture (row 2, column 2).
5.5
20
Cover pages typically do not include such items as watermarks, headers, or footers. You ensure that the cover page in this document is clear of such items.
Add a right-aligned header. Type Parker Adams and include a space following the name. Insert a page number in the current position, selecting the Plain Number option if available. Ensure that the header does not show on the first page. The watermark may be automatically removed from the first page as well. Click before Submitted by Parker Adams at the end of the document. Insert a right tab at 5.5”. Press TAB to align the text at the right tab stop.
4
21
Change the writing style to MLA. Click before the period ending the first sentence in the paragraph under the Decision Systems heading on page 3 (ending in and decisions are made). Insert a citation, using the existing source of Daniel Conner. Edit the citation to show page 157 and to suppress Author, Year, and Title).
1.5
22
Click before the period ending the first sentence under the System Biases heading (ending in theory-induced bias). Insert a citation to a new source as follows, making sure to include a hyphen between Decision and Making in the Title:
Type: Article in a Periodical
Author: Leo James
Title: Decision-Making Strategies
Periodical Title: Journal of Behavioral Economics
Year: 2020
Month: April
Day: 21
Pages: 45-52
2
23
Insert a page break at the end of the document. Insert a bibliography, selecting Insert Bibliography so that a title is not included. Mac users, delete the title after inserting the bibliography. Click before the first source shown and press ENTER. Click before the new blank paragraph and include a centered line with the words Works Cited. (Do not include the period.) Select all text on the Works Cited page and change the font to Times New Roman 12 pt. Change the line spacing of the two bibliography sources to Double. Remove any Before or After paragraph spacing from all text on the Works Cited page.
3
24
Select the heading, Decision Systems, on page 3. Insert a comment reading This is often referred to as Decision Support Strategies. (Include the period.) Check spelling and grammar, making corrections as necessary. The word spills is correctly used so you should ignore the error. Ignore any clarity and conciseness concerns.
4.5
25
Save and close Exp19_Word_Intro_Cap_Thinking.docx. Exit Word. Submit the file as directed.
0
Total Points
100
Different types of adversaries pose different types of threats depending on the
Different types of adversaries pose different types of threats depending on their capabilities, intentions, and the assets they are targeting. For example, organized crime might target a financial institution for financial gain, while a hacktivist might target organizations with differing ideologies.
For your initial post, identify a cybersecurity incident that happened within the last two years. Briefly summarize the incident. Ensure your summary identifies the threat actors involved, at least one characteristic of the threat actor (capability, intent, target), and hypothesize why the threat actor chose to attack.
Note: Try not to post the same example as your peers.
In responding to your peers, identify potential mitigation tactics (other than those identified in the article) for the threat actors they have identified.
RESPONSE ONE
A significant cybersecurity incident from the past two years was the Log4Shell vulnerability exploitation discovered in December 2021. This vulnerability, affecting the popular open-source logging library Apache Log4j, allowed attackers to remotely execute arbitrary code on vulnerable systems, leading to widespread concern across industries. The flaw (CVE-2021-44228) impacted many companies and organizations worldwide, as Log4j is widely used in enterprise software applications and cloud services.
Summary:
Threat actors, including nation-state hackers and cybercriminals, quickly exploited the Log4Shell vulnerability to gain unauthorized access to systems, launch ransomware attacks, steal sensitive data, and deploy malware. Given the widespread use of Log4j, the vulnerability was labeled one of the most severe in recent years, leading to millions of systems being at risk.
Threat Actor:
Nation-state actors and cybercriminals
Capability: Highly skilled in identifying and exploiting zero-day vulnerabilities for espionage, data theft, or deploying ransomware.
Intent: Nation-state actors exploited the vulnerability to conduct espionage, while cybercriminals sought to deploy ransomware and steal data for financial gain.
Target: A wide range of industries, including cloud providers, enterprise applications, and government systems.
The widespread nature of the vulnerability made it an attractive target for both nation-state actors and cybercriminals. Nation-state actors likely saw it as an opportunity to access critical infrastructure and sensitive data in government and corporate networks. Cybercriminals, on the other hand, likely viewed it as a chance to profit from exploiting companies with valuable data or critical services that might pay ransom to regain control of their systems. The scale and ubiquity of the vulnerability across various sectors made it an ideal target for a diverse range of attackers.
RESPONSE TWO
In May 2021, the Colonial Pipeline, which supplies nearly half of the fuel for the East Coast of the United States, was targeted by a ransomware attack. The threat actors behind this incident were a cybercriminal group known as Darkside, believed to be based in Eastern Europe. This group operates with a high level of capability, using sophisticated ransomware to encrypt the pipeline’s data, rendering it inaccessible until a ransom was paid.
One key characteristic of Darkside is their intent, which is financially motivated. They specifically target large organizations that can afford to pay substantial ransoms, often demanding millions of dollars to decrypt the affected data. In this case, they demanded a ransom of $4.4 million, which was paid by Colonial Pipeline shortly after the attack to regain control of their systems and resume fuel distribution.
Darkside likely chose to attack Colonial Pipeline due to the critical nature of its operations. By targeting a key piece of infrastructure, they knew they could cause significant disruption, increasing the pressure on the company to pay the ransom quickly. The attack not only led to fuel shortages and panic buying across several states but also highlighted the vulnerability of essential services to cyber threats. The choice of target reflects Darkside’s strategy to maximize financial gain by attacking entities where the impact of disruption would be severe.
Please note you’ll need to stay consistent throughout the course. Once you cho
Please note you’ll need to stay consistent throughout the course. Once you choose the sector, you cannot switch unless you get approval from the Instructor. Formatting Instructions: 5-10 pages Double Spaced, 1-inch Margin, Times New Roman, Page Number Center Bottom, APA or MLA Citation Format.