Question

In: Computer Science

. Recommend appropriate data analytic techniques for security prevention at IMC.

. Recommend appropriate data analytic techniques for security prevention at IMC.

Solutions

Expert Solution

APPROPRIATE DATA ANALYTIC TECHNIQUES FOR THE SECURITY PREVENTION AT IMC ARE:

1.TECHNIQUES BASED ON MATHEMATICS AND STATISTICS

  • DESCRIPTIVE ANALYSIS : TAKE PAST DATA AND KEY PERFORMANCE TO DESCRIBE THE PERFORMANCE OF THE SYSTEM . DESCRIPTIVE ANALYSIS TAKES INTO ACCOUNT THE PAST DATA OR TRENDS AND SEE HOW THEY MIGHT INFLUENCE THE FUTURE DATA.ANY BREACH CAN BE IDENTIFIED BY RECOLLECTING DATA .
  • DISPERSION ANALYSIS: THERE ARE VARIABLE FACTORS ACCOUNTED IN THE PROBLEM. THEREFORE THEY DETERMINE THE VARIABILITY OF THE FACTORS UNDER STUDY .THEREBY ACQUIRING DETAILED SEARCHING IN EVERY VARIABLE POSSIBLE .
  • REGRESSION ANALYSIS : THIS MODEL DETERMINES THE RELATIONSHIP BETWEEN DEPENDENT AND INDEPENDENT VARIABLES . VARIOUS REGRESSSION MODELS CAN BE LINEAR , MULTIPLE ,LOGISTIC, RIDGE, NON LINEAR ,LIFE DATA AND MORE WHICH SOLVES ANY ISSUE UNDER SECURITY BREACH
  • FACTOR ANALYSIS : THIS DETERMINES THE RELATIONSHIP AMONG VARIABLES BASED ON SOME FACTOR. IT HELPS IN CLUSTERING AND CLASSFICATION PROCEDURES.
  • DISCRIMINANT ANALYSIS :IT DETERMINES THE DIFFERENCE BETWEEN TWO GROUPS AND HELPS DIFFERENTIATE THE GROUPS .THEREFORE NEW ITEMS ARE IDENTIFIED .

2. TECHINIQUES BASED ON ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING .

  • ARTIFICIAL NEURAL NETWORK HAS ANN THAT CAN ACCEPT NOISY DATA AND ARE HIGHLY ACCURATE WHICH ARE HELPFUL IN BOTH VUSINESS AND FORECASTING.
  • FUZZY LOGIC IS BASED ON PROBABLITY WHICH HELPS IN HANDLING THE UNCERTAINITIES IN DATA MINING TECHNIQUES.

Related Solutions

Recommend appropriate data analytic techniques for security prevention at IMC. [5 marks]
Recommend appropriate data analytic techniques for security prevention at IMC. [5 marks]
According to the EY Foundation, over which data analytic techniques should accountants gain mastery? A. Data...
According to the EY Foundation, over which data analytic techniques should accountants gain mastery? A. Data mining, artificial intelligence B. Correlation, regression C. Querying, trends, forecasting D. Cluster analysis, inferential statistics
Why is there an explosion in the usage of analytic techniques in business?
Why is there an explosion in the usage of analytic techniques in business?
Why is there an explosion in the usage of analytic techniques in business?
Why is there an explosion in the usage of analytic techniques in business?
Using appropriate literature, properly discuss a specific security threat, and recommend appropriate solution(s). The topic discussion...
Using appropriate literature, properly discuss a specific security threat, and recommend appropriate solution(s). The topic discussion should include at least the following: ▪ Explanation of the security threat. ▪ Impact of the security threat. ▪ Recommended solution ___________________________________________ I choose the topic is : ( computer viruses ) I NEED ONLY THE FITST POINT IS Explanation of the security threat + make sure include distinction between viruses and other typed of malware.
develop a methodology for parallelized data wrangling, listing the appropriate techniques and the order they should...
develop a methodology for parallelized data wrangling, listing the appropriate techniques and the order they should be conducted.
To aid in the prevention of tooth decay, it is recommend that drinking water contain 0.700...
To aid in the prevention of tooth decay, it is recommend that drinking water contain 0.700 ppm fluoride (F-). (a) How many grams of F- must be added to a cylindrical water reservior having a diameter of 4.23 x 102 m and a depth of 18.92 m? (b) How many grams of sodium fluoride contain this much fluoride? Thanks for the help!
Why do managers examine benchmarks? How can benchmarks be applied to some of the analytic techniques?
Why do managers examine benchmarks? How can benchmarks be applied to some of the analytic techniques?
Why would a security loss prevention manager choose to hire an outside firm to review security...
Why would a security loss prevention manager choose to hire an outside firm to review security operations and make recommendations for changes as well as insurance options rather than conduct the study internally?
Explain security and privacy issues in an organization and recommend on how to deal with them
Explain security and privacy issues in an organization and recommend on how to deal with them
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT