Ethical Hacking week 5

 After responding to the weekly discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project. For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.). 

Human Computer Interaction Discussion 2 and 3

Question 1: which of the interaction types do you feel most influence interface design challenges? 

After reading Chapter 3, which of the interaction types do you feel most influence interface design challenges? You are required to write a statement that is LIMITED to 150 words. This is an opinion question; therefore, research is not required. Should you cite the work of others, please provide the source of your opinion in APA format.
 

Question 2: which of the cognitive frameworks do you feel best help users determine how to complete a task and activity?

 After reading Chapter 4, which of the cognitive frameworks do you feel best help users determine how to complete a task and activity? You are required to write a statement that is LIMITED to 150 words. This is an opinion question; therefore, research is not required. Should you cite the work of others, please provide the source of your opinion in APA format. 

discussion project management

 

Under what circumstances might you wish to crash a project?

Please discuss your rationale and expand with an example, or from your own experience.

 Required Materials and Textbook(s)
• Project Management: Achieving Competitive Advantage (5th ed.)
Jeffery K. Pinto
 

Digital Forensic Cases

 

Term Paper: Digital Forensic Cases

Overview

You have been asked to conduct research on a past forensic case to analyze how digital data was used to solve the case. Choose one of the following digital forensic cases:

  • U.S. v. Doe (1983).
  • Doe v. U.S. (1988).
  • People v. Sanchez (1994).
  • Michelle Catherine Theer (2000).
  • Scott Tyree (2002).
  • Dennis Rader (2005).
  • Corey Beantee Melton (2005).
  • James Kent (2007).
  • Brad Cooper (2008).

Use the Stayer University Library and/or the Internet to search for the case notes and reports.

Instructions

Write a 6–8 page term paper in which you analyze how digital data was used to solve your selected case. Specifically, you are to:

  1. Summarize the case, pertinent actors, evidence, and facts.
  2. Outline the specific digital evidence used in the case.
  3. Describe the procedures and tools used to acquire potential evidence.
  4. Describe the obstacles faced in the investigation.
  5. Provide links to two modern tools that could have assisted with the collection of evidence.
  6. Integrate into the assignment at least five quality professional and/or academic resources, written within the past five years.
    • Note: Wikipedia and similar websites do not qualify as quality resources.

Formatting

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. Note the following:

  • The preferred method is for your paper to be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides.
  • Include a cover page containing the assignment title, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
  • Include a source list page. Citations and references must follow SWS format. The source list page is not included in the required page length.

Learning Outcomes

The specific course learning outcome associated with this assignment is:

  • Research the role of digital forensics in solving investigations.

Incident reporting

 

Prior to or when security measures fail, it is essential to have in place several response strategies.

Create an incident response plan that can immediately protect digital assets in the event of an attack, breach, or penetration. The incident response plan should include (but is not limited to):

  1. Procedures to initially identify and document an incident
  2. Procedures that will inform tactical operational managers, internal and external stakeholders, and/or individuals affected
  3. Procedures to investigate the breach, to mitigate harm to individuals, and to protect against further breaches
  4. Enforcement mechanisms for breaches and non-adherences
  5. Procedures to assess the damage to the organization and estimate both the damage cost and the cost of the containment efforts
  6. Procedures to review response and update policies

APA style is not required, but solid academic writing is expected.

Refer to “CYB-690 Incident Response Management Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite. 

Attachments 

Discussion 9- Project Risk

Chapter 11: Project Risk Knowledge ManagementInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. What is knowledge at risk?
  2. What are the key challenges of knowledge management?
  3. What are the advantages and disadvantages of knowledge management systems?
  4. What is the impact of knowledge management in the modern world?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  

Text

Title: Managing Project Risks ISBN: 9781119489733 Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards Publisher: John Wiley & Sons Publication Date: 2019-08-13

Discussion 10- Project Risk

Chapter 12: Cultural Shaping of RiskTQM Conference Paper:  https://www.pmi.org/learning/library/ready-pm-total-quality-management-106TQM Conference Paper:  https://www.pmi.org/learning/library/risk-management-tqm-design-projects-1900TQM Conference Paper: https://www.pmi.org/learning/library/pm-tqm-inconsistent-theory-practice-3327Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Explain the concept of standard deviation and provide a calculated example – what is the difference between 3 Sigma and Six Sigma?
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!] 

Text

Title: Managing Project Risks ISBN: 9781119489733 Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards Publisher: John Wiley & Sons Publication Date: 2019-08-13

MANAGEMENT INFORMATION SYSTEMS CIS Discussion: Step 7

Referring to Step 7, assuming you have an organization, discuss the following questions.

In a new post, use the Reply button at the bottom of this page to respond to the following six questions (one paragraph minimum for each question): 

  • Define the issues your organization is facing that you believe require automation.
  • Does your organization need a new information system or can modify the existing information system(s)? Why?
  • Explain the budget components of a new COTS software for your organization.
  • Describe what it takes to gain and maintain organizational support for introducing new COTS software to your organization.
  • Find three COTS vendors that specialize in your industry and list them and their websites.
  • Describe the issues involved in customizing COTS for your organization, including the integration of different information systems in your organization.