Discussion Post I: Introduction to Data mining
• Explain the difference between data mining and data warehousing?
Discussion Post II: Data Mining "Anomaly Detection"
• What are Anomalies/Outliers? And what are some variants of Anomaly/Outlier Detection Problems?
• What are some Challenges and Work Assumptions of Anomaly Detection?
• Explain the Nearest-Neighbor Based Approach and the different ways to Define Outliers.
• Explain the Density-based: LOF Approach.
• Provide the General Steps and Types of Anomaly Detection Schemes.
Discussion Post III: Security Architecture and Design
In the following scenario you are the CISSO of a Major E-commerce Organization. The organization has decided to migrate their entire IT infrastructure and associated processes to the cloud. Considering the ecosystem of the cloud and the ever-present threats, you've been tasked to develop a secure implementation plan which includes the ability for threat modeling and simulations.
The response should include a reference list. Using one-inch margins, Times New Roman 12 pnt font, double-space and APA style of writing and citations.