Cyber-Forensics and Computer Forensics on Space and Cyberspace

  

Final Paper: 7 pages (not including reference page), well-written, properly, Plus another page with

Cited, and 5 or more references. CRITICAL THINKING and PROPER APA7 will be graded carefully. Due by Friday 19 November 2021 EST 4:00pm

Define “space” and “cyberspace” – are they the same or different? 

In your opinion, should “space” be a CRITICAL INFRASTRUCTURE or is it just everywhere so include as part of CRITICAL INFRASTRUCTURE risk management portfolios as a vector or National Critical Functions (NCF)?

References will be not older than 4 years and cited as the following example:

PInow. (2021). Forensic Investigation. Forensic Investigation, p. 1 para 4. https://www.pinow.com/investigations/forensic-investigations

You can use the SEARCH: academic journals/agency reports.

Also, this might help, just click and follow the links.

• READ: National Critical Functions | CISA

• READ: https://www.cisa.gov/critical-infrastructure-sectors

• READ: Space ISAC – Space Information Sharing and Analysis Center (s-isac.org)

• READ: INSA_WP_Space_v3.pdf (insaonline.org)

Due by Friday 19 November 2021 EST 4:00pm

Number Sorting

  

Number Sorting

In this lab activity you are requested to an array of fifty numbers in ascending order. 

The task required:

· Obtain an Arduino Uno Board and connect it to the PC.

· From the computing programmes select Arduino program.

· The numbers are in the range of 0 to 255. 

· The result needs to be displayed on eight L.E.Ds on Ardunio board, and on the serial monitor.

· Write a hierarchal and structured programme in “C” and test its functionality using.

Write the same program using recursive functions.

You need to demonstrate the work in the lab within the time specified.

You will be assessed in the lab.

 
 

discussion

 Discuss the continuing evolution of HTML. How can you keep up with the latest developments in HTML? How do you feel about the speed at which change is occurring? Does it make you fearful that what you learn will become obsolete too quickly? Explain. What tool are you planning to use for your development this week? 

Discussion 1- Executing the Project

Search the Internet and determine the name of at-least 1 activity / task that must be carried out in the initiating process group, and one activity / task that must be carried out in the planning process group before the project manager and the  project team can begin execution of the project?

[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!] 

Text-

Title: Project Management 

ISBN: 9780134730332 

Authors: Pinto 

Publisher: Pearson 

Edition: 5TH 19

Benchmark – Attack Vectors Models

 

Security professionals need to understand that compliance, along with strong security policies, can make organizational security stronger, but not completely hacker-proof.

In 500-750 words, explain how compliance with governing standards can fail to provide security even when using the Diamond Model of Intrusion Analysis or Cyber Kill Chain model. Where does the use of the model’s tools (e.g., relating to HIPAA, DOD, etc.) still make an organization vulnerable even though the organization is compliant with industry regulations and standards?

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

This assignment benchmarks competency 3.2: Analyze various cyber threat models used to identify and protect against cybercrime threat vectors, motivations, and ideologies.

EX05 – Extrusion 2

 

EX05 – Extrusions 2

NOTE : For this assignment refer to the recorded lecture titled “CSC131_LEC05_Extrusion2” in the old videos folder.

Hand in a  .png image  created in Blender.

Your image must depict a horse modeled from the guide pictures provided

Alternately, you may use a picture of your own choosing. If you choose a different model you must hand in the associated guide pictures. You will not receive full credit for an image without guide pictures.

Use extrusion in Blender’s ‘Edit Mode’ to shape your objects. 

Use filename format CSC131_EX05_XXX.png   Where XXX represents your initials.

Alternately, you can provide a link to the video in your youtube channel.

Returns True

Returns True after converting the image to monochrome.

All plug-in functions must return True or False. This function returns True

because it modifies the image. It converts the image to either greyscale or

sepia tone, depending on the parameter sepia.

If sepia is False, then this function uses greyscale. For each pixel, it computes

the overall brightness, defined as

0.3 * red + 0.6 * green + 0.1 * blue.

It then sets all three color components of the pixel to that value. The alpha value

should remain untouched.

If sepia is True, it makes the same computations as before but sets green to

0.6 * brightness and blue to 0.4 * brightness.

Parameter image: The image buffer

Precondition: image is a 2d table of RGB objects

Parameter sepia: Whether to use sepia tone instead of greyscale

Precondition: sepia is a bool

Help 2

During this assignment, you will conduct a full risk assessment against the same corporate profile selected earlier. Based on the information obtained from previous assignments, provide a synopsis on how to manage identified risks, and describe the tools and strategies that will ensure network security.

Prerequisite: Using a vulnerability scanner obtained for the previous assignment, conduct a full scan against all servers in the domain. (This information will be used in Part 3 of the assignment.)

Use the following guidelines to create a four to five-page report.

Part 1: Prepare for Risk Management (“Establish a Framework for Managing Risk”)

List the corporate requirements (i.e., standards, laws) associated with the company. Briefly explain the impact of non-compliance.

Develop categories and a classification method for company information systems. List at least eight categories for various people, processes, hardware, software, and data applicable to the company. Describe the data/system classification scheme as well as the reasons for selecting it.

Part 2: Identify Risk (“Where is the Risk to My Information Assets”)

List a minimum of 20 assets (data, systems, people, processes, etc.) and measure their value to the company (Low, Moderate, High, Critical) in a simple table.

In one column, identify assets that can impact company compliance, customer satisfaction, competitive advantage, or business productivity (i.e., Business Impact Analysis).

Part 3: Assess Risk (“How Severe is the Risk to My Information Assets”)

Identify, measure (quantitative and qualitative), and mitigate key information technology risks. In addition, describe each of the tasks associated with risk framing, assessment, response and monitoring. Refer to risk models (e.g., NIST SP 800-39 Managing Information Security Risk).

Select the optimal risk assessment methodology based on corporate needs. Compare the advantages/disadvantages of your selected risk assessment methodology to others used in the industry.

Provide a diagram of the matrix that was used to assess risk.

Define for each asset the potential threats, the likelihood the threat will occur or be successful, and the impact loss the asset will have on the company (Risk Mitigation Economics). Note: This includes disasters, loss of power, employee resignations, system malfunctions, drop-in customers, etc.

Using the vulnerability scan, list in a table a minimum of 15 identified threats (open vulnerabilities) to the information systems, the impact of the exploited vulnerability, and remediation steps (countermeasures) to remove or reduce either impact or likelihood from threat.

Part 4: Define Risk Appetite (“How Much Risk is Acceptable to My Organization”)

Review the characteristics of a risk appetite within Chapter 6 of the course text.

Establish a Risk Appetite Statement for the company.

Define the Risk Tolerance of the company.

Part 5: Control Risk

In 300–500 words, identify and describe the Risk Control Strategy adopted by the company. Ensure the strategy is in alignment with corporate requirements (standards, laws, frameworks, security policies, etc.) and risk appetite.

You will need to define variables to

  

using loop constructs, create a PHP script which will output a calendar for a normal February (28 days). You will need to define variables to contain the start day of the month (Sunday, Monday, etc.) and the number of days in the month.
 

For each day of the month that is an even number, print the value in bold text.