Q Critically analyse and report on Cyber Attacks Classification in IoT-based-Healthcare Infrastructure. Home, - Discuss predictive data analysis in cyber security Question 1: Review and write a summary to critically analyse and report (minimum 300 words to maximum 750 words) on "Cyber Attacks Classification in IoT-based-Healthcare Infrastructure from the paper A. Djenna, D. Saidouni, "Cyber Attacks Classification in IoT-Based-Healthcare Infrastructure," 2nd Cyber Security in Networking Conference, 1 Oct 2018. Answer: Cyber attack classification is the application layer attacks, network layer attacks and the perception layer attacks. The application layer attacks are sub classified into the session medjacking attacks. There are further classified as the active and the passive attacks. Persistent XSS attacks are also type of the session hijacking attack. Question 2: Write a thorough description of the importance of descriptive and predictive data analysis in cyber security. Give relevant examples and cite your sources. Answer: The performance of the organization that how many attacks happened in the organization and cause of the most of the attacks in the organization can be figured out with the use of the descriptive analysis techniques such as the mean, box plat and mode [3]. The likelihood of occurrence of the attack in the future which has already occurred in the past can be determined with the help of the predictive analysis. The predictive analysis can be done by the algorithms of the machine leaning like naïve bayes, linear regression and many more such techniques [4]. Related: Comment on the role of malware in cyber-attacks Use of machine learning in cyber security Demonstrate the use of CRUNCH tool Discuss Session Hijacking attacks and countermeasures Discuss predictive data analysis in cyber security Advise a Preventative system against data breach
Related :- Q What are the tax consequences what are the tax consequences - what are the tax consequences for the partnership and each partner Q Explain the Income Tax Assessment Act explain the income tax assessment act - in what circumstances are individuals and companies treated as residents of Australia? Q Discuss Session Hijacking attacks and countermeasures discuss session hijacking attacks, Session Fixation attacks, and Cross Site Scripting attack and counter measures - MN623 Cyber Security and Analytics Q Demonstrate the use of CRUNCH tool demonstrate the use of crunch tool - build a predictive model which takes in the above 4 parameters and predicts whether golf will be played on any given day. Q Use of machine learning in cyber security use of machine learning in cyber security - What were some spam filtering techniques used before the introduction of ML techniques for spam detection. Q Comment on the role of malware in cyber-attacks comment on the role of malware in cyber-attacks - Cyber Security and Analytics - Define and evaluate the classification techniques for malware analysis. Q What are the key features of the objection what are the key features of the objection - what are the key features of the objection and appeal process against the commissioner's decision Q What will be the likely outcome against Bill what will be the likely outcome against bill - Business And Corporate Law - determine if these companies are ideal to invest in on behalf of their clients. Q Calculate the taxable value of fringe benefit calculate the taxable value of fringe benefit - calculate the taxable value of the fringe benefit using the statutory formula Q Discuss statutory provisions and common law discuss statutory provisions and common law - discuss amounts would be as an allowable deduction against assessable income