This project focused on the impact of artificial intelligence in the broad field of data analytics in relation to MIS 2502. The goals of this project were to identify how successful artificial intelligence would be in the field of data analytics and potentially give an outlook for how the future may look with AI integration in the tasks of clustering, data association, relational diagrams, decision trees, and structured & semi-structured data. The future of AI looks bright, especially for individuals in the data analytics and business field. As companies begin to develop further into automation, the costs of their goods and services will decrease, resulting in better pricing for consumers. The impact will be extraordinary, with AI being able to consistently and effectively update CRMs instantaneously, while also identifying segments of individuals to better market a product to. Overall, AI will serve as a better compass for businesses to identify trends and market segments faster than any individual could ever.
Search Results for: --------
Artificial Intelligence in Data Analytics
The aim of this project is to research a topic on data analytics not covered extensively in class and more fully understand and describe a facet of data analytics. I learned about the history and use of artificial intelligence in my research, dating back to the Turing Test in the 1950s. Overall, AI can boost the functionality of data analytics with the capacity to skim through large datasets and pick out subtle trends.
Please find my write-up at the link below.
Artificial Intelligence
- Include the goals, results, project URL (if applicable), and what you learned in a brief paragraph.
The goal of this assignment was to research one topic, connect it to the things we learned in MIS 2502, and provide a real-world example. I chose to research Artificial Intelligence and the use of AI in data analysis to find patterns and make decisions. Through this project, I learned a lot about how AI works with data analysis. I also discovered the vast amount of ways AI is used in the real world for data analysis.
Artificial Intelligence Research Assignment
- Once approved, the description is automatically displayed in a post on your e-portfolio.
MIS 2502 Data Analytics Extra Credit Assignment
Goal – Research a current topic on Data Analytics that was not covered extensively in class, then create a write-up, with the purpose of this assignment to give an outlet to display ability to understand and describe an aspect of data analytics to current and future employers.
Results – extra credit paper
I learned the connections between sports and NoSQL, and how important it is for teams to store their unstructured data to understand their players.
MIS 2402 Covid Pro Points Project
- Include the goals, results, project URL (if applicable), and what you learned in a brief paragraph.
- Once approved, the description is automatically displayed in a post on your e-portfolio.
http://misdemo.temple.edu/tug91318/MIS2402%20Pro%20points%20project.html
I learned something new in this project which was the syntax on nested JSON arrays, in class we only worked with keys and pairs but to retrieve the data from this data set required a lengthier code which I didn’t know before hand. It also reinforced my skills in $.getJSON and for loops.
PRO Points Research Assignment
Web API – Covid Data
The goal of this assignment was to create a fully functioning SPA template that utilized a covid-19 Web API. In the SPA template I created, I utilized the Covid-19 API to retrieve summary statistics showcasing the countries with the most covid-19 related cases, deaths, highest recovery rate and most new cases, updating approximately every 15 minutes. In this assignment I was able to apply my knowledge of writing conditional statements, functions, loops, and jQuery.
Link <- http://misdemo.temple.edu/tug80260/covid.html
Web API – COVID Data
The goal of this project was to use data from an API to show summary statistics. By making this program I learned more about parsing through JSON arrays and nested objects, as well as retrieving data from APIs. See the following link for my work: http://misdemo.temple.edu/tuk72906/propointsproj/
Cyber Security Tools & Techniques
Cloud Computing Security
Overview
In order to understand cloud security, first we have to understand the services under cloud computing such as: hosted services, softwares, hardwares and storage all over the Internet.
As we also learned in the class, rapid deployment, low-cost, flexibility, stability are the reasons why organizations have shifted to cloud computing.
The \’Check Point’ describes cloud computing requirements including “policies, controls, services and that protect cloud data, applications and infrastructure from threats.”
Who’s responsible of cloud security?
Personally, when I think about cloud security two parties seem responsible to me which is cloud provider and customer/user of cloud services. Again, we discussed about different type of cloud services that can be performed by provider and every single of them might have different policies or controls against cyber threats.
However, most of the time security responsibilities that provider has includes protecting the infrastructure provided to the customer when user has to manage user access and privileges within organizations. The personal access is crucial to cloud services and they should be assigned well by cloud specialist. During the class, we talked about how cloud services has the advantage over physical datacenter because you don’t need to take the risk of anyone within company to walk into your data center but risk is still out there even everything performs online. Therefore, the access and users should be designed securely to cloud services.
The ‘Check Point’ website talks about ‘7 advanced cloud security challenges’ such as :
-Increased Attacked Surface
-Lack of visibility and tracking
-ever-changing workloads
-devops, devsecops, and automation
-granular privilege and key management
-complex environments
-cloud compliance and governance
The ‘Check Point’ website also talks about ‘6 Pillars of robot cloud security:
-Granular, policy-based IAM and authentication controls across complex infrastructures
-Zero-trust cloud network security controls across logically isolated networks and micro-segments
-Enforcement of virtual server protection policies and processes such as change management and software updates:
-Safeguarding all applications (and especially cloud-native distributed apps) with a next-generation web application firewall
-Enhanced data protection
-Threat intelligence that detects and remediates known and unknown threats in real-time
What is exactly security of cloud?
Accordingly ‘Force Point’, “cloud security consists of a set of policies, controls, producers and technologies that work together to protect cloud-based systems, data and infrastructure”. In addition to protecting cloud data, decisions applied should meet compliance regulations and protect user’s privacy. Main goal is to prevent unauthorized access and to keep data and applications in the cloud securely. Force Point recommends authenticating access and filtering traffic to fight against security threats. Again, security is crucial for cloud systems because they became so popular and include important data. Therefore, cloud system should be protected against both external and internal cybersecurity threats.
Segmentation of cloud security
McAfee’s online platform addresses different aspects of cloud security such as:
-SaaS-Software as a Service: customers are responsible for securing their data and user access
-PaaS – Platform as a service: Customers are responsible for securing their data, user access, and applications.
-IaaS – Infrastructure as service: Customers are responsible for securing their data, user access, applications, operating systems and virtual network traffic.
Cloud Security Challenges
McAffe lists some challenges for security:
Most of the time, cloud services receive access from outside of the corporate network or from devices not managed by IT. Which causes the need of monitoring cloud access by IT team.
When organizations work with third-party cloud provider, they became less active on their data and controlling their premises.
Cloud Security Solutions
McAfee talks about some solutions such as:
1-API connection that lets IT team to view what stored in the cloud, who used it, when it used..
2- After you gain visibility with API, you should define data classification, loss prevention, collaboration control, and encryption on cloud data.
3. User access control can be authorized by CASB-Cloud Access Security Broker- to enforce access controls.
4. File-scanning, application whitelisting, machine learning detection and network traffic analysis can be solution against malware that attack your cloud.
5. Compliance requirement and practices should be argument with risk assessment and compliance assessments. HIPAA, PCI and Sarbanes-Oxley becomes more important when you engage your data within cloud services.
AWS Cloud Security
I also wanted to look into AWS’s approach to this poular topic cloud security since we just worked with AWS cloud systems during this semester. They have solid understanding against cyber threats and reliable reputation for security. AWS provides control and confidence to the user to run their business cloud with flexible and secure environment. Some specific functions that AWS Cloud offers to customers:
-Secure scaling with superior visibility and control where you can control the data stored and who can access it. You can manage any records that information consumes any moment. Continuous monitoring and real-time security information also helps you to secure your cloud.
- Automation and reduction risk with deeply integration. As an owner of the cloud system, you gain automation feature for your tasks on AWS by reducing human configuration errors.
AWS also has 4 pillars on their security policy such as: prevent, detect, respond and remediate.
What’s different about cloud security?
Red Hat platform believes that many people understand the benefit and advantages of cloud but they are equally deterred by the security threats. First gap between physical data center and cloud service security is the traditional environment. Cloud environments are highly connected and making easier for traffic to bypass traditional perimeter. Therefore, APIs should be fully secured and identity management should be strong.
References
https://www.checkpoint.com/cyber-hub/cloud-security/what-is-cloud-security/
https://www.forcepoint.com/cyber-edu/cloud-security
https://aws.amazon.com/security/
https://www.mcafee.com/enterprise/en-us/security-awareness/cloud.html
Linkedin Learning
Linkedin – Learning Design Thinking: Lead Change in Your Organization
During my 2020 fall break, I made use of my leisure time by taking three different courses on Linkedin. One of them is “Learning Design Thinking: Lead Change in Your Organization”.
From this course, I learned that a strong organization must have the ability to solve complex human problems using design thinking. Design thinking is a human-centered approach that is derived from welcoming unusual ideas and able to initiate those ideas through the development of prototypes. Organizations need to incorporate design thinking in their decision-making process to outperform their competitors.
CertificateOfCompletion_Learning Design Thinking Lead Change in Your Organization (2)
Linkedin – Agile Foundations
The second course I took was the Agile Foundations. Agile is an approach that can improve the quality of product deliverables through the enhancement of user communication. When building a product with a group of people, each person is required to think and move as a team. This will ensure a more efficient and accurate workflow.
CertificateOfCompletion_Agile Foundations
Linkedin – Microsoft Project 2016 Essential Training
In this course, I learned the fundamentals of Microsoft Project 2016 and relate them to the prospects of using it to develop projects in the professional world. This course explores the basics of creating and managing tasks, assigning resources to handle the tasks, viewing the tasks schedule, and managing the tasks as a whole. Microsoft Project gives the flexibility for the user to manage their projects deep down to the most refined and detailed aspects of the projects.
CertificateOfCompletion_Microsoft Project 2016 Essential Training
