Very Urgent

 

Students will assess actual security breaches and think critically about the cause, impact, continuity, and prevention of these malicious attacks.

In Target’s 2013 holiday data breach and cyber-attack, data belonging to millions of customers was disclosed. The hackers in the Target attack used legitimate credentials to initially enter the system. In 500 words or more, address social engineering and the most likely way the attackers used valid credentials to achieve their hack, and how the rather significant planning failed to protect the company. What elements of a detailed strategic operational plan were missed by Target?

This assignment requires the use of at least two additional scholarly research sources published within the last 5 years. Include at least one in-text citation from each cited source.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

Unit 4 DB: Backbone Design

Suggest one best practice recommendation for backbone design and explain why it’s a best practice. In response to your peers, discuss the details of a practice similar to yours and explore a practice different from yours. Ask questions about or expand upon the practice. 

1 Page APA Format 

Networking in business 

Research paper

Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762): 

  • This section should summarize key action steps (such as where to assemble employees if forced to evacuate the building) and list key contacts with contact information for ease of authorizing and launching the plan.
  • Introduction
  • Roles and Responsibilities
  • Incident Response
  • Plan Activation
  • Document History
  • Procedures

Your paper should meet the following requirements:

  • Be approximately seven to ten pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Digital Forensics

  

Prepare a report 1500 to 5000 words long on any of the following subject. involving Digital Forensics.  The report must have at least two references.

2. Legal Compliance

3. Affidavits

4. How to Testify

5. Case Law

6. Chain of custody

7. Digital Investigations

  1. Authentication of Evidence
  2. Chain of Custody Procedures
  3. Metadata
  4. Root Cause Analysis
  5. Using Virtual Machines for      Analysis
  6. Mobile Device Analysis (e.g.      smart phones, tablets)
  7. Embedded Systems (e.g. GPS, games      consoles, Smart TVs)
  8. Internet of Things Devices      (e.g. consideration of potential for evidence storage)

Programming R, Java, Python

 

1. Write an R program that reads the text file into a data frame. Using that data frame, print the mean, median, mode, average deviation, and standard deviation. Be sure to state which output is which, such as “The mean is: 25”.

2. Write a Java program that reads the text file. Using meaningful print statements, output the mean, median, mode, and standard deviation.

3. Write a Python program that reads the text file. Using NumPy and SciPy modules, print the mean, median, mode, and standard deviation.

As part of the mastery requirements for this Competency Assessment, complete the following boldfaced item:

Using the requirements for Steps 1–3 above, write code that adds another statistical method to output using all three languages beyond the competency statistical methods.

4. Write an R program that:

A. Reads the text file.

B. Using that data, create a two-dimensional array that is 2,500 rows by 100 columns.

C. Also create a three-dimensional array that is 2500 by 10 by 10.

D. Slice the two-dimensional array using a starting column index of 2 and an ending column index of 5. Print the results of the arrays and slice.

5. Write a Java program that:

A. Reads the text file.

B. Using that data, create a two-dimensional array that is 2,500 rows by 100 columns.

C. Slice the two-dimensional array using a starting column index of 2 and an ending column index of 5. Print the results of the arrays and slice.

6. Write a Python program that:

A. Reads the text file using NumPy.

B. Using that data, create a two-dimensional array that is 2,500 rows by 100 columns.

C. Also create a three-dimensional array that is 2500 by 10 by 10.

D. Slice the two-dimensional array using a starting index of 2, an ending index of 5, and steps by 10. Print the results of the arrays and slice.

7. Compare and contrast your experience with each language when determining the mean, mode, median, and standard deviation.

Place your screenshots and responses in a Microsoft Word document. This part of the assessment should meet any stated specifications listed above. Be sure to include the .R files with your code for the R portion.

capstone

 

  1. Discuss the broad ethics that you have garnered from reviewing the American Computing and Machinery (ACM) Ethics (Links to an external site.)  
  2. Research ethics in the field you’ve chosen, (cyber security)then discuss what you’ve found.
  3. Apply the concepts learned in your reading and through research on the Internet to discuss security issues that are unique to the chosen scenario.
  4. Support what you discuss with specific examples.
  5. Don’t forget to cite your resources. APA formatting is required.

Research Paper + Discussion

  Task 1: Research PAPER  

 This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness for virtualization.
  • Explain Microsoft (or another product) licensing for virtualized environments.
  • Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.
  • Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations. Submit your midterm research paper as a single document. Your paper should meet the following requirements:

  • Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

 

Task 2: Discussion

300 Words and at least 3 references.

 Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented?  Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization. 

Assignment

 In this assignment, you are to critically read and evaluate a scholarly article’s strengths, weaknesses, and contributions to the study field. Learning how to critique a journal article has several benefits, including preparing you for publishing in the future and keeping you current on the literature in your field of study. The practical application is developing the ability to look at research within your organization and industry with a knowledgeable, critical eye. The University of the Cumberlands (UC) Library subscribes to many journals and provides you access to appropriate collections to support this assignment. Using the UC Library, locate and review the following peer-reviewed articles: De Meulenaere, K., De Winne, S., Marescaux, E., & Vanormelingen, S. (2021). The role of firm size and knowledge intensity in the performance effects of collective turnover. Journal of Management, 47(4), 993-1023. Weller, I., Süß, J., Evanschitzky, H., & von Wangenheim, F. (2020). Transformational leadership, high-performance work system consensus, and customer satisfaction. Journal of Management, 46(8), 1469-1497. Gupta, V. K., Mortal, S. C., Silveri, S., Sun, M., & Turban, D. B. (2020). You’re fired! Gender disparities in CEO dismissal. Journal of Management, 46(4), 560-582. Marshall, D. R., Davis, W. D., Dibrell, C., & Ammeter, A. P. (2019). Learning off the job: Examining part-time entrepreneurs as innovative employees. Journal of Management, 45(8), 3091-3113. Paterson, T. A., & Huang, L. (2019). Am I expected to be ethical? A role-definition perspective of ethical leadership and unethical behavior. Journal of Management, 45(7), 2837-2860. Pak, J., & Kim, S. (2018). Team manager’s implementation, high performance work systems intensity, and performance: a multilevel investigation. Journal of Management, 44(7), 2690-2715. Following your review, choose one article from this list; critically evaluate the article’s strengths, weaknesses, and contribution to the study field using the outline below as a guide: Cover page

  • The cover page will include:
    • Articles Title and Author (s)
    • Name of Journal (s)
    • Date of publication
    • Your name

Executive Summary

  • Summarize the significant aspects of the entire article, including:
    • The overall purpose and general area of study of the article.
    • The specific problem being addressed in the study.
    • The main findings of the article.

Literature Review

  • Briefly summarize the overall themes presented in the Literature Review.
    • Was the literature review applicable to the study, current and thorough?
    • Were there gaps in the literature review?

Data Analysis

  • Identify the methodology used: qualitative, quantitative, mixed? Was the chosen methodology appropriate for the study? Why or why not?
  • Did the data analysis prove or disprove the research questions? Explain.

 Results/Conclusion

  • In this section, you will address the following:
    • Describe the article’s relevance to the field of knowledge.
    • Outline the strengths and weaknesses of the article. Be specific.
    • Based on the article, what future research do you think needs to be accomplished in this area?
    • What are your key points and takeaways after analyzing the article?

Proper APA in-text citation must be used. The review is to be word-processed double spaced, not less than two pages, and no more than five pages in length. Paper length does not include the cover page, abstract, or references page(s). 

Enterprise risk management Research 6

 please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately 4 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Mastering Blockchain

Find a peer-reviewed scholarly journal article discussing blockchain technology. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing.Once you find the article, you will read it and write a review of it.  This is considered a research article review.Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.