Briefly describe in 250-600 words the impact this fellowship would have on pursu
Briefly describe in 250-600 words the impact this fellowship would have on pursuing your dreams and career as a cyber security major.
Briefly describe in 250-600 words the impact this fellowship would have on pursu
Briefly describe in 250-600 words the impact this fellowship would have on pursuing your dreams and career as a cyber security major.
I want to create a chatbot for a translation engine called Bashini, an AI-led la
I want to create a chatbot for a translation engine called Bashini, an AI-led language translation system that enables people to speak in their own language while talking to speakers of other Indian languages using Reinforcement learning with poor reward signals.
Instructions from professor:
The reward signal, which defines the goal of a Reinforcement Learning (RL) agent, is a critical part of any RL problem. For many real-world RL problems, however, the rewards are often quite sparse, most of the time only indicating whether the task is completed partially or fully. Such sparse rewards provide the agent with only rare signs of progress, making the learning of the task slow and difficult. In some scenarios, the rewards might be noisy, change over time, or even be completely unavailable for extended periods of time. Some real-world RL problems also involve goals that are difficult to translate precisely into a numerical reward signal. Learning with such poor reward signals poses serious challenges to current RL methods.
I am interested in developing methods that would enable RL agents to learn effectively in environments with poor reward signals. Different types of poor reward signal scenarios pose different types of challenges for agent learning, requiring different types of solutions. Some promising solution directions that we could pursue include (but are not limited to) 1) providing additional learning signals to the agent (e.g., intrinsic rewards and auxiliary tasks), 2) transferring knowledge from other AI agents or external knowledge sources (e.g., from textbooks, manuals, and the web), 3) decomposing the problem into simpler subproblems (hierarchical RL), and 4) building reward models (model-based RL) utilizing other forms of communicating the task beyond numerical rewards (e.g., from demonstrations and human preferences/feedback).
Learning Objectives and Outcomes
You will complete the listing of reasons of pu
Learning Objectives and Outcomes
You will complete the listing of reasons of purchase of a particular suite and will write an executive summary on the process of identifying the computer forensics cases and cybercrime activity using the particular suite.
Assignment Requirements
After completing the research on the most prominent Computer Forensics Suites, this assignment requires you to prepare a summary report of your findings. Based on the research you will do the following tasks:
1. Justify why you would suggest that a particular suite be purchased by your local law enforcement agency.
2. Show how the suite helped to investigate computer forensics cases and cybercrime activity for your local law enforcement agency.
3. Create a professional report detailing the information above.
COMPETENCIES
321.1.1 : Technology Strategy
The graduate develops strategic techn
COMPETENCIES
321.1.1 : Technology Strategy
The graduate develops strategic technology plans that include vision, standards, and direction of technology in line with organizational strategy.
321.1.5 : Ethics
The graduate develops technology policies that ensure ethical actions regarding technology and data.
321.1.6 : Risk Mitigation
The graduate develops risk mitigation plans that effectively address possible security threats.
321.1.7 : Data Security
The graduate develops security precautions that protect organizational data.
321.1.8 : Communication Plans
The graduate develops communication plans that effectively convey business justification for technology initiatives.
321.1.9 : Globalization
The graduate evaluates potential technology solutions for alignment with organizational global strategy.
INTRODUCTION
You must pass Task 2 before attempting this task.
In this task, you will be required to develop technology policies that ensure ethical actions in technology and data, develop risk mitigation plans that effectively address possible security threats, and develop communication plans that effectively convey a business justification for technology initiatives.
REQUIREMENTS
Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. The similarity report that is provided when you submit your task can be used as a guide.
You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).
A. Include part D of your passing submission from Task 2 to provide context for your proposed emerging or evolving technology solution.
B. Develop a solution implementation plan that includes the following:
• a discussion of the steps required to implement the proposed emerging or evolving technology solution from part D in Task 2
• an identification of potential sources of funding
• a discussion of a timeline for implementation that includes key milestones and deadlines
• a discussion of human resources and workforce development that are needed to capitalize on the opportunity
C. Develop a communication plan that includes the following:
• a descriiption of three stakeholders, both internal and external
• a descriiption of how the stakeholders are most affected by the challenge, including their concerns and information needs, potential ways to address the issue, and the most effective communication channels for reaching them
D. Develop a change management plan that includes the following:
• a discussion of two potential ethical risks and two potential security threats to implementing the proposed solution from part D in Task 2, including strategies to mitigate these risks and threats
• a discussion of necessary changes to existing policies, procedures, or systems
• a descriiption that outlines strategies for managing resistance to change
E. Develop an evaluation plan for the proposed solution from part D in Task 2 that includes the following:
• a discussion of a timeline for the evaluation, including the frequency of data collection and reporting
• a descriiption of a plan for evaluating the effectiveness of the proposed solution, including criteria for success and methods for collecting and analyzing data
• a discussion of a plan for using the results of the evaluation to refine and improve the proposed solution
F. Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
G. Demonstrate professional communication in the content and presentation of your submission.
File Restrictions
File name may contain only letters, numbers, spaces, and these symbols: ! – _ . * ‘ ( )
File size limit: 400 MB
File types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, txt, qt, mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif, tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z
RUBRIC
A:GAP SOLUTION
NOT EVIDENT
Part D of the passing submission from Task 2 is missing or incomplete.
APPROACHING COMPETENCE
Not applicable.
COMPETENT
Part D of the passing submission from Task 2 is provided.
B:SOLUTION IMPLEMENTATION PLAN
NOT EVIDENT
A solution implementation plan is not provided.
APPROACHING COMPETENCE
A solution implementation plan is provided but does not include all of the 4 given points or is illogical.
COMPETENT
A logical solution implementation plan is provided and includes all of the 4 given points.
C:COMMUNICATION PLAN
NOT EVIDENT
A communication plan is not provided.
APPROACHING COMPETENCE
A communication plan is provided but does not include both of the given points or is illogical.
COMPETENT
A logical communication plan is provided and includes both of the given points.
D:CHANGE MANAGEMENT PLAN
NOT EVIDENT
A change management plan is not provided.
APPROACHING COMPETENCE
A change management plan is provided but does not include all of the 3 given points or is illogical.
COMPETENT
A logical change management plan is provided and includes all of the 3 given points.
E:EVALUATION PLAN
NOT EVIDENT
An evaluation plan for the proposed solution from part D in Task 2 is not provided.
APPROACHING COMPETENCE
An evaluation plan for the proposed solution from part D in Task 2 is provided, but does not include all of the 3 given points, or is illogical.
COMPETENT
A logical evaluation plan for the proposed solution from part D in Task 2 is provided and includes all of the 3 given points.
F:SOURCES
NOT EVIDENT
The submission does not include both in-text citations and a reference list for sources that are quoted, paraphrased, or summarized.
APPROACHING COMPETENCE
The submission includes in-text citations for sources that are quoted, paraphrased, or summarized and a reference list; however, the citations or reference list is incomplete or inaccurate.
COMPETENT
The submission includes in-text citations for sources that are properly quoted, paraphrased, or summarized and a reference list that accurately identifies the author, date, title, and source location as available.
G:PROFESSIONAL COMMUNICATION
NOT EVIDENT
Content is unstructured, is disjointed, or contains pervasive errors in mechanics, usage, or grammar. Vocabulary or tone is unprofessional or distracts from the topic.
APPROACHING COMPETENCE
Content is poorly organized, is difficult to follow, or contains errors in mechanics, usage, or grammar that cause confusion. Terminology is misused or ineffective.
COMPETENT
Content reflects attention to detail, is organized, and focuses on the main ideas as prescribed in the task or chosen by the candidate. Terminology is pertinent, is used correctly, and effectively conveys the intended meaning. Mechanics, usage, and grammar promote accurate interpretation and understanding.
Please edit the answers in the “Assignment 1 – Needs fixing” Document file. Use
Please edit the answers in the “Assignment 1 – Needs fixing” Document file. Use the sample answers from “Assignment 1” document and do not use any AI engines.
2.1: What are the IT ethics and describe how you would apply them to your career
2.1: What are the IT ethics and describe how you would apply them to your career as an IT professional (2.1)
2.2: Differentiate and compare the Ethics and Morals in the context of an IT professional who works as a system engineer (2.2)
2.3: Describe Intellectual property, Information privacy and explain how it can lead to copyright violations by not adhering to IT ethics (2.3, 2.4)
Assessment Criterias
2.1 Analyze the nature of information technology ethics and its application to IT
2.2 Analyze the analogy that relates ethics, morality and society
2.3 Assess how and why information technology gives rise to ethical dilemmas not present in other technologies
2.4 Evaluate the issues relating to IT ethics, justifying their conclusions
Read the activity guide in its entirety. choose one of the three dilemmas. do r
Read the activity guide in its entirety. choose one of the three dilemmas. do research for that dilemma (3: only use attached sources. 4: at least one additional source found and used. in your one pager, you may use the attached template. If you do your own format, make sure you include all the information from the template (the template is from the activity guide with all unnecessary text removed)
Utilizing the attached security plan outline, develop a proposal for implementin
Utilizing the attached security plan outline, develop a proposal for implementing IT Security Management.
Assignment Requirements
Imagine that you are a new manager responsible for the I
Assignment Requirements
Imagine that you are a new manager responsible for the IT team in a start-up company that provides hosting services for online storefronts. Shortly before you were hired, the IT systems were compromised, resulting in the services going offline for almost 24 hours before services were restored. As a result, the business suffered financial losses that it could ill afford as a start-up company.
The CEO of the company has directed you to put together a plan to mitigate future risks. The first step is to assemble a team of subject matter experts to help you create the plan. The CEO wants to review a list of the recommended team members before you proceed with the plan. You need to create a list of recommended team members in a form for submission to the CEO. In creating the recommendation, evaluate each role selected, documenting the value that the team member will bring to the process. Also, document any potential issues where team members might have conflicting priorities and you would resolve any conflicts.
Submission Instructions:
Submit your answer in a Microsoft Word document in not more than 300 words.
Font: Arial 10 point size
Line Spacing: Double
How will you implement and enforce your Enterprise Security Policy?
Describe at
How will you implement and enforce your Enterprise Security Policy?
Describe at least 4 steps you will use.