-
Module8 Unit11 skills matrix
Unit 11 Skills Matrix. Read More
-
Module 8 unit3 Peer review activity quantitative
Peer review quantitative A Quantitative Methodology for Cloud Security Risk Assessment by Basu, Sengupta, and Mazumdar. Academic Peer Review Appropriateness of Research Methodology The authors employ a quantitative risk assessment methodology tailored specifically for cloud computing environments. This approach is suitable given the paper’s... Read More
-
Module8 unit3 Peer review activity qualitative
Peer review qualitative Cloud Computing: Overview and Risk Analysis” by Alali and Yeh Academic Peer Review Appropriateness of Research Methodology The research methodology employed in this paper is a quantitative empirical analysis, which is appropriate for the stated purpose of examining the risk characteristics of cloud computing companie... Read More
-
Module8 Unit12 post
Unit 12 self test quiz. Read More
-
Module 8 unit11 post
I used the Four Fs framework: Facts, Feelings, Findings, and Future from the university of Edinburgh (The University of Edinburgh, 2018) for my reflection. SWOT analysis 1- Strengths: Gained knowledge of qualitative, quantitative, and mixed-methods approaches (Creswell, 2003). Moreover, gained practical skills in research design and data colle... Read More
-
Unit9 worksheets
9.1D From chart for Area2, its evident that Brand A is least preferred, followed by Brand B, whilst the majority of respondents preferred the other brand. 9.2E It is clear from the chart that Absent in location B is higher than in location A, while we see the opposite for Sparse and Abundant where percentage value in Location A is higher th... Read More
-
Module 8 unit7 DF post
The ethical implications of Abi’s statistical analysis decisions regarding the cereal whizzz pose critical questions about the responsibilities of researchers, possible biases inherent in data interpretation and the general impact on public health. When conducting statistical analysis, researchers are ethically obliged to maintain integrity, rig... Read More
-
Module 8 unit7 2nd post
Ex8.1B Diet B n 50 Mean 3.710 SD 2.769 The average weight loss for Diet B is 3.710, the SD is 2.769 since the mean weight loss is not larger than 2SD, then the diet doesnt look to be very effective Exe8.2B Diet B n 50 Mean 3.710 SD 2.769 Median 3.745 Q1 1.953 Q3 5.404 IQR 3.451 The sample median for Diet B is M = 3.745, so the diet... Read More
-
Module 8 unit7 post
I did the analysis using R - below is the R program used R program [Workspace loaded from ~/.RData] library(readxl) Exe_8_6C <- read_excel(“C:/Users/myounes/Downloads/Exe 8.6C.xlsx”) View(Exe_8_6C) library(readxl) library(data.table) data.table 1.15.2 using 4 threads (see ?getDTthreads). Latest news: r-datatable.com Warning message:... Read More
-
Case Study about inappropriate Use of Surveys
Case study: Inappropriate Use of Surveys Cambridge Analytica scandal serves as a fundamental example of the unethical use of user data, particularly on social media platforms like Facebook. This incident involved the unauthorized harvest of personal data of millions of users to create psychographic profiles, which were later used for targeted p... Read More
-
Literature overview outline
Literature overview outline Topic of interest: Cloud security risks in cloud computing Introduction: introduce the topic of cloud security risks in cloud computing and provide an ending statement to prepare the reader for the next section. Literature overview: explore the literature related to this topic. In addition to criti... Read More
-
Research proposal overview
Research proposal overview: subject of interest: Cloud security risk in cloud computing Which of the methods described in this week’s reading would you think would suit your purpose? Inductive approach with qualitative analysis, discuss pros and cons for this approach Which data collection methods would you consider using? In... Read More
-
Ethics in Computing in the age of Generative AI
Introduction The transformative rise of generative AI since late 2022 has had profound impacts across all fields, but its influence on computer science is particularly noteworthy. This reflection explores the challenges and opportunities posed by generative AI, referencing Correa et al. (2023) and Deckard (2023), alongside other relevant litera... Read More
-
Module 8 unit1 post
Module 8 unit1 collaborative discussion I selected the “Abusive Workplace Behavior” (ACM, N.D.) because of its relevance among groups and teams. The ACM case study on abusive workplace behavior highlights significant ethical breaches by a technical team leader, Max, whose actions contravene multiple principles of the ACM Code of Ethics. Max’s v... Read More
-
Module 7 unit1 post
SysML (Systems Modeling Language) is an extension of UML (Unified Modeling Language) but tailored for systems engineering. Below are two key differences: Comparison Between UML and SysML 1- Scope and Domain Focus: UML (Unified Modeling Language) is designed primarily for software engineering, emphasizing the modeling of object-oriented systems... Read More
-
Module 3 unit8 seminar post
Part A 1- Goerlandt et al (2017) proposed several approaches for assessing the validity of Quantitative Risk Assessment (QRA) approaches. They suggested that validation could be achieved through various ways as per below: Comparing Results with Historical Data: One approach they proposed is to compare the results of the QRA with histor... Read More
-
Module 3 unit10 seminar post
Part A Vendor lock-in refers to the situation where a customer becomes reliant on a specific vendor’s products or services to the extent that switching to another vendor becomes difficult or costly (Allied Market Research, 2023). Morrow et al(2021) argue that vendor lock-in issues can be related to employee expertise on one vendor verses the oth... Read More
-
Module 3 Unit9 summary post
Module3 unit9 summary post Despite the wide of adoption of CVSS by many organizations, Spring et al (2021) argue that the current version is not adequate enough to be used as a method for risk assessment. The authors summarized their arguments highlighting that the CVSS formula is not clear or justified. In addition to that, the documentation ... Read More
-
Module 3 Unit5 GDPR case study
I chose the case about the disclosure of sensitive personal data by a hospital to a third party. This case highlights the disclosure of sensistive personal of a patient done by the hospital to a third party The aspect of GPDR that this case addresses are: requirement to keep personal data accurate, complete and up to date, requirement to take ... Read More
-
Module 3 Unit4 Seminar
I chose Bank in UK. Threat Modeling Manifesto Principles: Understand the System: Thoroughly understand the architecture, components, and dependencies of the bank’s systems. Identify Threats: Identify potential threats to the confidentiality, integrity, and availability of the bank’s assets. Mitigate Risks: Develop and execute security mea... Read More
-
Module 3 Seminar2 post
After reading Spears & Barki (2010) case, below are the answers to the questions: The authors utilized a multi-method design approach in their research. The qualitative approach was done using interviews followed by survery conducted on sample of exports. Then, the quantitative methods evaluated the theoretical model that was created or deri... Read More
-
Module 3 Unit3 summary post
Module3 unit3 summary post Industry 4.0 represents the fourth industrial revolution, marked by the incorporation of digital technologies such as IoT, AI, and big data analytics. However, the adoption of these technologies introduces new risks, notably an increased vulnerability to cyber attacks due to the growing number of connected devices (Ca... Read More
-
Module 2 unit5 case study Reviewing an Assessment Reporting Template
Reviewing an Assessment Reporting Template Answer the following questions: 1-Does this template meet the NCSC stated requirement of preparing a baseline to use as a reference point for pen tests? If not what changes/amendments would you make? 2-What are the two best lessons/examples presented in the report? 3-What two things do you think are... Read More
-
Module 2 Unit4 post
Module 2 unit4 post Security threats and vulnerabilities in network systems are becoming an issue as technology is evolving. Hence, security management has become a challenging task for organizations due to the rising complexity of information systems and the increasing presence and sophistication of attacks (Ekelhart et al. 2019). In this cont... Read More
-
Module 2 scanning activity
Module 2 scanning activity output Website: https://buymenow.org.uk/ C:\Users\myounes>tracert buymenow.org.uk Tracing route to buymenow.org.uk [68.66.247.187] over a maximum of 30 hops: 1 <1 ms <1 ms <1 ms 192.168.1.1 2 2 ms 1 ms 1 ms 100.100.64.1 3 4 ms 3 ms 3 ms 172.21.2.177 4 5 ms ... Read More
-
Module 2 Unit2 summary post
Module 2 summary post In today’s industry, enterprise digital transformation is a must-do phase for both large and small enterprises Liu(2022). In this context, a “fully digital enterprise” can be viewed as a company that has fully adopted digital technology and processes in all parts of its business. This indicates that digital technology is f... Read More
-
Unit6 Reflection post
Unit 6 Reflection post Organizations face challenges to secure their assets from potential cyber-attacks since such attacks are becoming more and more sophisticated; hence implementing network security is becoming vital in this digital connected world. In the initial post, we have seen how Vodafone Portugal was a victim of a cyber-attack in 202... Read More
-
Reflection post
Reflection post In the previous post, we have seen how Target was a victim of cyberattack, which resulted in exposing personal and credit card information of approximately 110 million of their customers, (Cyber Breach at Target, accessed 9 August 2023). Target was using a monitoring software (FireEye) to detect the intrusion and it alerted the ... Read More
-
Advanced Deep Learning with Keras
Advanced Deep Learning with Keras This post is meant to summarize some of the key concepts I have learned in the course Advanced Deep Learning with Keras Read More
-
HBAP certificate
HBAP certificate This post is meant to showcase my latest achievement of graduating from Harvard Businesss analytics program Read More
-
MBA degree
MBA degree This post is to showcase my MBA degree obtained from university of Leicester Read More