secure the things

write  your opening sentence and your thesis statement here!

Introduction

Conclusion 

powerpoint only 9 slides, not too much writing just important points should be mentioned.

BI

0. Go to theinternetofthings.eu and find information about the IoT Council. Write a summary of it.

1. Compare the IoT with regular Internet.

2. Discuss the potential impact of autonomous vehicles on

our lives.

3. Why must a truly smart home have a bot?

4. Why is the IoT considered a disruptive technology?

Cloud Computing

 Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges. 

discussion-7

 Explain in your own words what type of information can be obtained by using network scanning techniques and why it is an important intelligence gathering process. 

java discussion response

 

Hello everyone,

Exceptions in Java are similar to an error message, but less severe. Java has both checked and unchecked exceptions. “An exception or exceptional event is an event that occurs during the execution of a program that  disrupts the normal flow of instructions” (mit.edu, 2005). Common  terminology regarding exceptions include terms such as “throw” and  “raised” when an exception occurs. When an exception is handled, one  might say the exception was “handled” or “caught”. Exceptions are used  because the compilation process may not find all of the errors. In Java,  a checked exception is an exception that will occur in code  outside of the Java runtime system. These exceptions must be “caught”  using “try-catch-finally” exception handling. Examples of checked  exceptions include: FileNotFound, MalformedURL, and SocketException. The  key difference between checked and unchecked exceptions in Java is that  the unchecked exceptions occur during runtime of the system. There is  no method that has to “catch” or specify the “throwing” of unchecked  exceptions, although it may occur anyway. Examples of unchecked  exceptions include: ArrayIndexOutOfBounds, NullPointerException, and IllegalArgumentException.  It seems whether a programmer sides with usage of checked or unchecked  exceptions is not very important, as they are both functionally  equivalent. It would make sense that problems may occur if a programmer  decides to use both checked and unchecked exceptions at the same time.  Personally, it makes more sense to go with the checked exceptions.  Unchecked exceptions seem slightly more problematic since the compiler  does not make it mandatory to catch or propagate exceptions. With this  in mind, it would seem that dealing with checked exceptions may be the  path of relative ease.

Mobile and Cloud Computing

The use of mobile devices in our society today has indeed become ubiquitous. In addition, CTIA asserted that over 326 million mobile devices were in use within The United States as of December 2012 – an estimated growth of more than 100 percent penetration rate with users carrying more than one device with notable continues growth. From this research, it’s evident that mobile computing has vastly accelerated in popularity over the last decade due to several factors. In consideration with this revelation, identify and name these factors, and provide a brief discussion about them.

Cloud computing represents one of the most significant paradigms shifts in information technology (IT) history, due to an extension of sharing an application-hosting provider that has been around for many years, and was common in highly regulated vertical industries like banks and health care institutions. The author’s knowledge from their research continue to assert that, the impetus behind cloud computing lies on the idea that it provides economies of scale by spreading costs across many client organizations and pooling computing resources while matching client computing needs to consumption in a flexible, real-time version. 

Identify the issues and risks that pose concern to organizations storing data in the cloud.

digital forensics

 Define several forms of metadata that can be useful to an investigation. How is it valuable to an investigator?