Discussion

Based on the information in the text and the previous lectures, consider how cluster analysis can be applied.

a. Research completed research studies that have used cluster analysis.

Don't use plagiarized sources. Get Your Custom Essay on
Discussion
Just from $13/Page
Order Essay

b. Provide a brief summary that includes the type of study, its purpose, and its final conclusions.

c. Based on your research-based knowledge, provide your evaluation on the role of cluster analysis in the study’s outcome.

d. Provide an APA formatted reference and a of the study.

https://www.youtube.com/watch?v=gqA1HO5I3zE#action=share&ab_channel=RickMejia

3/1/2020 Originality Report

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b1

6

bb2c48/originalityReport/ultra?course_id=_114589_1&includeDeleted=true&attemptId=1da049f3… 1/

3

SafeAssign Originality Report
Spring 2020 – Data Science & Big Data Analy (ITS-836-… • Theory • Submitted on Sat, Feb 15, 2020, 12:32 PM

Manasa Kaveri View Report Summary

View Originality Report – Old Design

INCLUDED SOURCES

Sources

Global database (4) %3

5

Institutional database (5) %2

4

Internet (5) %5

Top sources

Attachment 

1

Theory1 x

%64Running Head: 1
THEORY 2

Name:Manasa kaveri

University of Cumberlands

Theory

https://www.researchgate.net/publication/260126665_A_Study_Of_Cyber_Security_Chal-
lenges_And_Its_Emerging_Trends_On_Latest_Technologies?
_esc=publicationCoverPdf&el=1_x_3&enrichId=rgreq-bd5b1bb72775a452b572ed1f1992fd0b-
XXX&enrichSource=Y292ZXJQYWdlOzI2MDEyNjY2NTtBUzoxMzk5MDIzNzMwNzY5OTJAMTQx-
MDM2NjczMzAyMA%3D%3D

In computing, a DoS, that is, a Denial of Service is an OS, that is, an operating system which
tends to run from a hard disk drive. This DoS also gets denoted to denote to a specific family of
operating systems and help in shielding attacks from security threats (Zhang et.al, 2015). On the
other hand, a DDos, that is, the Distributed Disk Operating System is a kind of DOS attack
whereby there are quite a number of compromised systems, which get infected often with a
Trojan causing the DOS attack. When addressing and managing threats; a Denial of Service
or Availability has 3 types which get targeted. These are: i. The application layer of the
DDoS attacks an increased number of databases or services with a high augmentation of appli-
cation calls. ii. Lastly, there is the protocol that goes after the transport or network layer
and uses flows to overwhelm the resources that get targeted (Befekadu, et.al, 2015). iii.
Volumetric or network centric attacks which tend to overload a specific targeted resource by
the consumption of available bandwidth with the packet floods. In the recent era we are,
cyber-attacks have become prone to both small and large organisations. Different reasons exist
as to why such acts are carried out. They include; to rip-off and delete information, spying,
by-pass procedures and stealing of funds. The term malware is used to describe malicious soft-
ware that is used in marauding of computer systems (Stavrou, et.al, 2015). This has led to
numerous governments enacting of laws such as The Computer Fraud and Abuse Act (CFAA) in
the United States in 1984. On the day to day basis, Data has been scrutinized in that people
have quite undervalued this aspect. Data also reduces the most elusive and the oldest ob-
stacles when looking at globalization. Data also helps in fixing supply chains before breaking.
Developing capabilities is a phenomenon which could at times takes years to perfect. Workers
who are trained on the other hand tend to make costly mistakes in their haste of doing work
while the alternative is lowering pay levels which act as inadequate incentives (Miloslavskay &
Tolstoy, 2016). DS, that is, Intrusion Detection Systems helps in analyzing network traffic
for the signatures which match cyber-attacks that are known (Zuech, et.al, 1015). It detects at-
tacks – helping to stop this attack and compare network packets to the database on cyber
threats that contain known signatures of cyber-attacks in addition to flagging any matching
packets (Kenkre, et.al, 2015). The concept of statistical anomaly detection consists the collection
of data that relates to the behaviours of diverse legitimate users of a given time period. Basical-
ly, a count of distinct types of events over a given time span. The aspect of unstructured data
tends to be more like human language. That is, it does not fit into diverse relational databases
nicely such as SQL as well as searching it basing on diverse old algorithms which range from an
aspect of difficult to exceptionally impossible. Some of these examples are: images, audio files,
videos, social media posts and text documents. According to research, data consists of extensi-
ble array of data, high velocity as well as huge volumes of data. Some of the diverse kinds of
data are: i. Unstructured Data

This type of data denotes that which does not get organized in a manner that is pre-defined or
maybe does not have any data model which is pre-defined hence it is not a good fit for any rela-
tional database that is in the mainstream. Therefore, for unstructured data, there are diverse
alternative platforms which are essential for managing and storing, it in an augmenting as well
as prevalent systems in information systems and gets used by diverse organizations in an array
of analytics applications and business intelligence. For instance: Media logs, Text, PDF and Word
ii. Semi Structured Data This type of data is one which information tends not to reside to any ra-
tional database, however, may have diverse organizational aspects which tend to make it much

1

2

3

3
3

3
3
4
4
4
5
6

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=1da049f3-69d3-4ae7-a789-66083571b05c&course_id=_114589_1&includeDeleted=true&print=true

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=1da049f3-69d3-4ae7-a789-66083571b05c&course_id=_114589_1&includeDeleted=true&print=true&download=true

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport?attemptId=1da049f3-69d3-4ae7-a789-66083571b05c&course_id=_114589_1&includeDeleted=true&force=true

3/1/2020 Originality Report

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?course_id=_114589_1&includeDeleted=true&attemptId=1da049f3… 2/3

easier in analysing. With the subsequent of this process, one could store them in a database
that is relational. That is, it could be quite hard for this kind of data; nonetheless, the semi-
structured data exists to help in easing space. An instance is the XML data. iii. Structured Data

This is a type of data whose elements tend to be addressable for efficient analysis. That is, it
gets organized into a repository which gets formatted and typically is in a database. An example
of structured data is the relational data (Subramaniyaswamy, et.al, 2015). iv. Time Stamped
Data

Typically, this kind of data gets used when gathering diverse types of behavioural data.
For instance, the actions of users on a website hence a true representation of actions over the
years. v. Machine Data

Machine data can be put simply as the digital exhaust that gets created by the infrastructure,
technologies and systems which are essential in powering businesses. When looking at diverse
organizations, diverse data structures concern all the data that could get stored in an SQL data-
base in both columns and rows. These could easily get mapped into fields that are pre-de-
signed and have relational keys. In the modern day world, these data tend to get most proceed-
ed in simplest and development ways to help in the management of information. Accord-
ing to research, Big Data will empower more small businesses in the future. On the other hand,
before small businesses require investing in expensive software and hardware at diverse insti-
tutions, they can make the use of cloud computing as well as open source software to leverage
as well as access data that is large scale (Kolk, et.al, 2018). It is not only in business that is glob-
alized with using Big Data structures. Generally, the world is progressively becoming quite data
centric and gets used in gaining insights with analysing of diverse patterns to attain solutions
which are more optimal. With the Internet of Things, home automation is rather advanced.
The hardware as well as the devices could connect to the others by a Wide Area Network or Lo-
cal Area Network. Also, automation is rather a set of software as well as hardware which usually
operate with one another to undertake a distinct task (Al-Fuqaha, et.al, 2015). Automation also
helps diverse businesses to be more effective, saves the cost of labour and is more productive.
The IoT, that is, Internet of Things denotes the inter-networking of devices which get more often
than not referred to as devices that are connected like network connectivity, electronics, sen-
sors, as well as buildings which are embedded on them as well as enhances the said devices to
change data or even collect it (Li, et.al, 2015). In addition, the above has hugely contributed to-
wards the minimization of the universe towards a global village. It is because the sharing and
collection of data that gets made easy via using the Internet of Things. The IoT explains our day
to day devices which get connected to the internet. This means that it not only the use but also
the extension and use of the IoT, that is, the internet of things in both industrial applications
and sectors (Sethi & Sarangi, 2017). Lastly, an Internet of Things ecosystem comprises of smart
devices which are web-based and which use communication hardware, sensors and processors
to act, send and collect on data (Botta, et.al, 2016). In other times, these devices usually com-
municate with devices that could be rather related hence acting on the information which they
get from each other.

References

Al-Fuqaha, A., Guizani, M., Mohammadi, M., Aledhari, M., & Ayyash, M. (2015). Internet of
things: A survey on enabling technologies, protocols, and applications. IEEE communi-
cations surveys & tutorials, 17(4), 2347-2376. Botta, A., De Donato, W., Persico, V., &
Pescapé, A. (2016). Integration of cloud computing and internet of things: a survey. Fu-
ture generation computer systems, 56, 684-70. Kenkre, P. S., Pai, A., & Colaco, L. (2015).

Real time intrusion detection and prevention system. In Proceedings of the 3rd In-
ternational Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA)
2014 (pp. 405-411). Springer, Cham. Kolk, A., Kourula, A., Pisani, N., Westermann-Behaylo,
M., & Worring, M. (2018). Embracing the Un Sustainable Development Goals? Big Data
Analysis of Changes in the Corporate Sustainability Agenda. Academy of Management Global
Proceedings, (2018), 51.Edy, J. A. (2019). Collective memory. The International Encyclopedia of
Journalism Studies, 1-5

Li, S., Da Xu, L., & Zhao, S. (2015). The internet of things: a survey. Information Systems
Frontiers, 17(2), 243-259

Miloslavskaya, N., & Tolstoy, A. (2016). Big data, fast data and data lake concepts. Pro-
cedia Computer Science, 88, 300-305

Stavrou, A., Jajodia, S., Ghosh, A., Martin, R., & Andrianakis, C. (2015). U.S. Patent No. 8,935,773.
Washington, DC: U.S. Patent and Trademark Office. Sethi, P., & Sarangi, S. R. (2017). Inter-
net of things: architectures, protocols, and applications. Journal of Electrical and Computer En-
gineering, 2017

Subramaniyaswamy, V., Vijayakumar, V., Logesh, R., & Indragandhi, V. (2015). Unstruc-
tured data analysis on big data using map reduce. Procedia Computer Science, 50, 456-465.

5

7

8

9 8

10
10 8

11
11

5
5

8

12 12

8

13 13

3/1/2020 Originality Report

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?course_id=_114589_1&includeDeleted=true&attemptId=1da049f3… 3/3

Zhang, H., Cheng, P., Shi, L., & Chen, J. (2015). Optimal denial-of-service attack sched-
uling with energy constraint. IEEE Transactions on Automatic Control, 60(11), 3023-3028.
Zuech, R., Khoshgoftaar, T. M., & Wald, R. (2015). Intrusion detection and big heteroge-
neous data: a survey. Journal of Big Data, 2(1), 3.

3 3

14

14

Word Count: Submitted on: Submission UUID: Attachment UUID:
1,626 02/15/20 03879464-3050-6e70-0f63-23a9b96d2132 ff31c1d7-016a-be11-8b75-2527d835

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy