Research Project Assignment

  

You have chosen the topic of Computer Forensics for your research project. Submit your research project what you have worked on Computer Forensics.

Include the following on your research:

· Abstract

· Introduction

· Computer Forensics 

· Conclusion

Note: 500 words with intext citations and 4 references must needed.

Activity to do

 

Investigate product comparison information.
Locate a website that contains an article that presents a side-by-side comparison of 2 or more products. Evaluate the effectiveness of the product comparison by considering the questions listed below, and then write a 10 sentence paragraph of your findings.

– Which criteria are used to compare the products?
-What additional criteria could have been used?
-Describe the evaluation method used to do the product comparisons.
-Did the method(s) produce an objective or subjective result?
-Do you agree with the results? Why or why not?

Used referenced cites/where you could information from a valid website.

business management

  

DISCUSS THE NOTION THAT FIRMS SHOULD STOP DOING BUSINESS WITH CUSTOMERS WHO CONSTANTLY GENERATE LOSSES VERSUS THE NOTION THAT THE CUSTOMER IS ALWAYS RIGHT

homework 4

please follow instructions now amount of words just need full details . for question 2 i have posted the 3 chapters for this week 

network security

 

A. Short Report

Using industry reports, whitepapers, academic articles and other reliable sources, research the issue of network security threats faced by businesses in 2021-2022. Write a short report identifying and explaining the top ten network security threats. Also, justify why you chose those specific threats in your list of top ten. Include appropriate charts and diagrams.

Note:
1. Write minimum 750 words for this short report. Although there is no rigid maximum word limit, around 1000 words maximum will be appropriate.
2. Use appropriate headings and sub-headings in your report.
3. You should provide credible references according to the Faculty guidelines. Get referencing style guides and help with referencing from Charles Sturt’s Referencing webpage.

B. Hands-on Project
 

inSSIDer is a popular wireless network scanner. Download the free version of this application from https://www.metageek.com/downloads/inssider-win/ . Follow the instructions to use it as explained in MetaGeek’s website. Run the application to scan Wi-Fi network.

Now, write a report including the following information.

1. List every piece of information that the inSSIDer scanner normally produces [For example, the MAC (physical) address of the network, its SSID etc.]. Briefly explain what each one of them mean.

2. Now, state and explain the information that you obtained from your ‘run’ of the application. For every piece of information, include a screenshot from your ‘run’. What are your most important observations? Why do you consider them to be important?

 3. Explain in detail, how a network administrator could use the information generated by the inSSIDer Wi-Fi network analyser.

4. Do you think, attackers could also benefit from such Wi-Fi network analysers? Justify your response in detail.

5. Finally, search the internet for five (5) other wireless network analysers. Based on the information available about these products, which one would you recommend for a small business and why? Make assumptions about the type, settings, requirements of the business.

Note:
 There is not rigid word limit for this report. However, around 1000 words will be appropriate.
 

digitalwe4

 

Topic 1: Copyright
This week you read about copyright and some of the laws governing digital rights management.
Discussion:
Copyright protection is available for original works of authorship that are fixed in a tangible form, whether published or unpublished. The categories of works that can be protected by copyright laws include paintings, literary works, live performances, photographs, movies, and software.
Response #1:
Make an argument for or against the following statement: “Copyright is the only way for musicians, artists, and filmmakers to protect their integrity.  What’s important is not profit, but protecting creative content from unfair use. Copyright should remain an important part of our law”. Justify your response with support from the reading.

Topic 2: Customer Location Data
This week you read the article “Verizon, AT&T, T-Mobile, and Sprint Suspend Selling of Customer Location Data (web page). https://www.washingtonpost.com/news/the-switch/wp/2018/06/19/verizon-will-suspend-sales-of-customer-location-data-after-a-prison-phone-company-was-caught-misusing-it/?noredirect=on
Discussion:
Verizon, AT&T, and Sprint will no longer share its customers’ location information with several third-party companies who failed to handle the data appropriately.
Question #1:
Do you agree with phone companies sharing their customers’ information with third-party companies? Why or why not? Support your answer.

Topic 3: Filter Bubbles
This week read the article” Measuring the Filter Bubble: How Google is measuring what you click” (https://spreadprivacy.com/google-filter-bubble-study/) and watched “How Filter Bubbles Isolate You” (YouTube Video)…https://www.youtube.com/watch?v=pT-k1kDIRnw
Discussion:
If you and I performed a Google Internet search on a topic, we could get totally different results. How is this possible?  In attempts to provide us with user-specific content based on the data they collect on us, web companies may also be restricting us from information and “narrowing our world view.”
Question #1:
What are your thoughts on filter bubbles? Have you ever encountered a Filter Bubble?  Do you think companies like Facebook and Google have a civic responsibility in this area? 

 Minimum Topic Response: PLEASE RESPOND IN THREE OR MORE SENTENCES PER TOPIC.
NOTE 1: Please make sure you answer EACH item and LABEL each item (#1, #2, #3, etc) so that I can easily check that each item has been answered.
NOTE 2: Please do not attach a file to the conference–enter your reply into the text area provided.
NOTE 3: After you post your response, please review it to make sure it is formatted correctly and is easy to read

Project Part 3: Risk Mitigation Plan

 Project Part 3: Risk Mitigation Plan

Senior management at Health Network allocated funds to support a risk mitigation plan. They have requested that the risk manager and team create a plan in response to the deliverables produced within earlier phases of the project. The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop a draft of this new plan.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide

Estimated length: 4–6 pages 

assessment 1

 In this Assignment, you will use Python and create the numpy portion of the exercise with the information provided. The second half of the exercise is to run the Python Pandas code and record the findings from each step.