The majority of online fraud occurs through electronic communication. We receive

The majority of online fraud occurs through electronic communication. We receive emails daily that represent some type of phishing scheme or web spoofing, which can be deleted with a simple click of the delete button. But what happens when your personal information has been stolen through a third-party vendor’s technical error while you made a purchase from your local retail store, who stores your credit card and personal information within a remote database?
Research a recent news headline of a retail chain that has been breached recently and analyze the scenario. What caused the issue? What steps can be taken moving forward to resolve the issue? Use research and specific examples to support your resolution recommendations.

Install the appropriate Directory Services application on Windows Server. Ensure

Install the appropriate Directory Services application on Windows Server.
Ensure that the root domain object is labeled as “win.companyname.net” appropriate for your corporation.
Note: You will need to install DNS either during or just prior to the Directory Services installation.
As you go, take instructional notes and screenshots that will help to reproduce your process. Submit these notes as proof of completion.
Write a 250- to 350-word paper discussing the key features and components of each directory service and how those components would best be applied for your corporation. You must use at least one credible reference.
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.
Refer to “ITT-121 Directory Services Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.
Follow this source please: https://computingforgeeks.com/how-to-install-active-directory-domain-services-in-windows-server/

A file attachment that fully explains what is required, I need to use the WEKA p

A file attachment that fully explains what is required, I need to use the WEKA program and get a copy of the program file, and attach a picture of the steps and results as shown in the required attachment. The project should be simple and there are simple errors ) , so that mean you must you do the WEAK program example by paper project with the steps and the file for example data.
For more clarity, I would like to obtain a data file from the Internet or any other place for a data set and create a classified method data for it using WEKA program with an explanation of the steps and procedures with pictures

conduct a detailed survey on Deep Learning in Mobile and Wireless Networking usi

conduct a detailed survey on Deep Learning in Mobile and Wireless Networking using at least 20 of the references provided in the survey papers ( I will attached it) in addition to at least other 5 recent references from the past three years.( 8-10 pages) survey and report written in research paper format (IEEE conference paper template)
1-Give a good background on it and conduct a literature review of the relevant issues associated with it
2-Discuss different aspects of this area (use figures and diagrams)
3- Using the references, identify how the problems discussed in the references are related to the area (related work)
4-Identify how the different problems discussed in each reference were solved using traditional approaches
5- Analyze each reference with focus on the deep learning approaches, performance, architectures, datasets, advantages, disadvantages… etc (using tables)
6- Identify the commons and differences among the references one another and try to point out relevant observations (using tables and diagrams)
7- Deduce general conclusions and possible future research trends In addition to the above points students are encouraged to demonstrate and reflect their ideas, conclusions, contributions on the paper in any appropriate form.

For these tasks, you should refer to, and follow, relevant instructions in the o

For these tasks, you should refer to, and follow, relevant instructions in the official Amazon Elastic Compute Cloud User Guide (Amazon Web Services, n.d.-k), available in this week’s resources.
TASKS: Creating an Amazon Elastic Block Store (Amazon EBS) Volume and demonstrating its persistent nature.
1. Log on to AWS Educate using your AWS educate starter account, and click AWS Console button.
2. Launch a new instance using the Amazon EC2 console, in your default Region/Availability Zone.
3. Select the Amazon Linux AMI.
4. Choose the t2. medium instance type.
5. Launch the instance in the default VPC.
6. Assign the instance a public IP address (of your choice)
7. Add an Amazon EBS volume of size 1 GB to the existing root volume, following steps provided in the user guide.
8. Add a tag to the instance of Key: Name, Value: ITEC6210-YourName, and use the Security Group carried last week.
9. Launch the instance, and when prompted for a key pair, create a new public-private key pair—ITEC6210Key-YourName-wk3.
10. Go to the Amazon EBS console, find the EBS volume just created, and give it the name ebs_wk3_YourName.
11. While within the EBS console, review the functionality availability for working with snapshots and encrypting EBS volumes.
12. Terminate the instance that was created using the Amazon EC2 console.
13. Check the Amazon EBS console once again. Observe that the root volume has been deleted (as it was set by the system to “delete on terminate”). However, the EBS volume is still visible, confirming that it persists beyond the lifetime of the instance, unless EIS (Instance) stores that are ephemeral or transient in nature.
14. Delete the EBS volume.
15. Log out of AWS.
By Day 7
Submit a report in Blackboard summarizing your experiences with carrying out the EBS storage-related tasks and include screenshots of the tasks you perform.

Apply your understanding of cybersecurity threats, vulnerabilities and risks to

Apply your understanding of cybersecurity threats, vulnerabilities and risks to a case study on Smart Grids.
Instructions
Read the case presented in Security Challenges and Approaches in Internet of Things, section 6.3 “The Smart Grid Case Study. ”
Then, write a 5-7 page paper that answers the following questions:
What vulnerabilities, threats, and risks exist in the case study?
What are ways in which the Smart Grid could be better secured to overcome the vulnerabilities and threats?
What are some proactive vs. reactive items that could be put in place to help secure a Smart Grid
No passive word phrases
Apa 6 format