Chat with us, powered by LiveChat Analyzing and Visualizing Data - Writeden

Discussion – 300 Words

Assignment – 2 pages

MidTerm – 2 pages

Practical connection – 2 pages

Assignment – 2 pages.

Assignment – Analyzing and Visualizing Data

Select any example of a visualization or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualization’s anatomy. In each case your assessment is only concerned with one design layer at a time.

For this task, take a close look at the annotation choices:

1. Start by identifying all the annotation features deployed, listing them under the headers of either project or chart annotation

2. How suitable are the choices and deployment of these annotation features? If they are not, what do you think they should have been?

3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently

4. Also, considering the range of potential annotation features, what would you do differently or additionally?

Submit a two-page document answering all of the questions above.  Be sure to show the visualization first and then thoroughly answer the above questions. Ensure that there are at least two-peer reviewed sources utilized this week to support your work.

Text Book

Title: Data Visualisation

ISBN: 9781526468925

Authors: Andy Kirk

Publisher: SAGE Publications Limited

Publication Date: 2019-10-07

Edition: 2nd ED.

,

Practical Connection Assignment – Security Architecture & Design

At UC, it is a priority that students are provided with strong education programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.  

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.  

Note:  Do not submit a paper you wrote for another class.  This paper must be written specifically for this class.

JOB – Software engineer

Text Book

Title: Securing Systems

Subtitle: *PLEASE SEE BOOKSTORE LINK BELOW TO PURCHASE REQUIRED MATERIALS

ISBN: 9781482233971 (print, rental or digtial)

Authors: Brook S. E. Schoenfield

Publisher: CRC Press

Publication Date: 2015-05-20

,

Mid-Term– Security Architecture & Design

Icanread System, Inc. is an advertising agency that specialize in selling ad spaces in their parent company’s magazine.  Icanread Systems, Inc. manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because Icanread Systems, Inc.’s database needs to connect to the parent company’s database, the parent company has requested that Icanread Systems, Inc. network be assessed and verified as secure.

Your company has designated you to be the lead architect for this project because it’s a small company and perfect for your first time.  Since you have spent the past 7 weeks in training to be a System Architect, perform your assessment. Use headers to separate the sections of information.

Submit your report in an APA-formatted paper (Title page, body and references only).  Your report should have a minimum of 600 words.  Count the words only in the body of your response, not the references.  A table of contents and abstract are not required.

A minimum of two references are required. One reference for the book is acceptable but multiple references are allowed.  There should be multiple citations within the body of the paper.  Note that an in-text citation includes author’s name, year of publication and the page number where the paraphrased material is located.

Your report must be submitted to SafeAssign.  Resulting score should not exceed 35%.

Text Book

Title: Securing Systems

Subtitle: *PLEASE SEE BOOKSTORE LINK BELOW TO PURCHASE REQUIRED MATERIALS

ISBN: 9781482233971 (print, rental or digtial)

Authors: Brook S. E. Schoenfield

Publisher: CRC Press

Publication Date: 2015-05-20

,

Assignment – Security Architecture & Design

Consider the data flow “octopus,” as shown in Figure 8.1. How can the analysis system gather data from all these sources that, presumably, are protected themselves? 

Answer the questions with an APA-formatted paper (Title page, body and references only).  Your response should have a minimum of 600 words.  Count the words only in the body of your response, not the references.  A table of contents and abstract are not required.

A minimum of two references are required. One reference for the book is acceptable but multiple references are allowed.  There should be multiple citations within the body of the paper.  Note that an in-text citation includes author’s name, year of publication and the page number where the paraphrased material is located. 

Your paper must be submitted to SafeAssign.  Resulting score should not exceed 35%.

A diagram of a data flow  Description automatically generated

Text Book

Title: Securing Systems

Subtitle: *PLEASE SEE BOOKSTORE LINK BELOW TO PURCHASE REQUIRED MATERIALS

ISBN: 9781482233971 (print, rental or digtial)

Authors: Brook S. E. Schoenfield

Publisher: CRC Press

Publication Date: 2015-05-20

image1.png

,

Discussion– Security Architecture & Design

If an attacker can retrieve the API and libraries, then use these to write an agent, and then get the attacker’s agent installed, how should Digital Diskus protect itself from such an attack? Should the business analytics system provide a method of authentication of valid agents in order to protect against a malicious one? Is the agent a worthy attack surface?

Answer the question with a short paragraph, with a minimum of 300 words. Reply to at least two other students with a substantive reply of at least 50 words.  Count the words only in the body of your response, not the references.  APA formatting but do not include a title page, abstract or table of contents. Body and references only in your post.

A minimum of two references are required.  One reference for the book is acceptable but multiple references are allowed.  There should be multiple citations within the body of the paper.  Note that an in-text citation includes author’s name, year of publication and the page number where the paraphrased material is located.

Text Book

Title: Securing Systems

Subtitle: *PLEASE SEE BOOKSTORE LINK BELOW TO PURCHASE REQUIRED MATERIALS

ISBN: 9781482233971 (print, rental or digtial)

Authors: Brook S. E. Schoenfield

Publisher: CRC Press

Publication Date: 2015-05-20