Gap in Literature

Healthcare cyber-attacks and their mitigation techniques in Industry 4.0 is the topic selected. Advanced threats and attacks have developed by cyber criminals unaware of healthcare professionals. I want to address the latest threats and mitigation strategies that help healthcare organizations and patients secure their information. Cybercriminals believe the healthcare industry is a soft target. Cybercriminals…

Case Study – Week 2- Strategy Applied In Project Management

Read the case “The POM+ Project*- Part 1 APPENDIX 2 Big Kola Company has been concerned that specialized fruit drinks have been eroding their cola market. The CEO mandates that “If you can’t beat them, join them.” Grape juice was the first product that was successful after an advertising blitz claiming the antitoxin benefits. Lately,…

Artificial Neural Network And Deep Learning

Chapter 5 Discussion Question 1: What is an artificial neural network and for what type of problem can it be used for? Discussion Question 2: Compare artificial and biological neural networks. What aspect of biological networks are not mimicked by artificial ones? What aspects are similar? Discussion Question 3: What are the most common ANN…

Regression Problem For Predicting The Demand Of Bike-Sharing Services In Washington D.C

  We consider a regression problem for predicting the demand of bike-sharing services in Washington D.C.1 The prediction task is to predict the demand for the bikes (column cnt) given the other features: ignore the columns instant and dteday. Use the day.csv file from the data folder. (a) Write a Python file to load day.csv.2…

STIX And TAXII

  Threat intelligence information must be distributed as quickly as possible to others. To rely on email alerts that require a human to read them and then react takes far too much time. As an alternative, Automated Indicator Sharing (AIS) can be used instead. AIS enables the exchange of cyberthreat indicators between parties through computer-to-computer…