need help in homework

After reading the required articles this week, please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Need 3 pages with introduction, body and conclusion.

Risk management project part 4

 Please see the attached requirements.

Project Part 4: Business Impact Analysis (BIA) and Business Continuity Plan (BCP)

Senior management at Health Network has decided they want a business impact analysis (BIA) that examines the company’s data center and a business continuity plan (BCP). Because of the importance of risk management to the organization, management has allocated all funds for both efforts. Your team has their full support, as well as permission to contact any of them directly for participation or inclusion in the BIA or BCP.Winter storms on the East Coast have affected the ability of Health Network employees to reach the Arlington offices in a safe and timely manner. However, no BCP plan currently exists to address corporate operations. The Arlington office is the primary location for business units, such as Finance, Legal, and Customer Support. Some of the corporate systems, such as the payroll and accounting applications, are located only in the corporate offices. Each corporate location is able to access the other two, and remote virtual private network (VPN) exist between each production data center and the corporate locations.The corporate systems are not currently being backed up and should be addressed in the new plan. The BCP should also include some details regarding how the BCP will be tested.For this part of the project:

  1. Research BIAs and BCPs.
  2. Develop a draft BIA plan for the Health Network that focuses on the data center. The BIA should identify:
    1. Critical business functions
    2. Critical resources
    3. Maximum acceptable outage (MAO) and impact
    4. Recovery point objective (RPO) and recovery time objective (RTO)
  3. Develop a draft BCP that could recover business operations while efforts are ongoing to restart pervious operations. You may use or repurpose a BCP template you find online. Include a description of how you would test the plan.

Submission Requirements

  • Format: Microsoft Word (or compatible)
  • Font: Arial, size 12, double-space
  • Citation style: Your school’s preferred style guide

Estimated length: 6–10 pages 

GO16_WD_CH03_GRADER_3G_HW – Newsletter And Research Paper 1.3

 

GO16_WD_CH03_GRADER_3G_HW – Newsletter And Research Paper 1.3

 

Project Description:

In the following project, you will format a newsletter by inserting pictures and screenshots, applying two-column formatting, and adding a border to a paragraph. You will edit and format a research paper by inserting footnotes, creating citations, and formatting a bibliography.

Week9Table.jpg

SECURITY ASSESSMENT & TESTING

BUSINESS CASE: The Blue Skies Airport management company purchased three more airports. New established Blue Skies Airport System consists of four airports in the USA. Each airport has its own data center.

LOCATIONS.

Airport 1: Washington DC                           Airport 2: Chicago, IL                       

Airport 3: Los Angeles, Ca                            Airport 4: Dallas, TX 

QUESTION 1:  What is SCADA Cybersecurity for Blue Skies Airport System?  Explain the differences between SCADA Cybersecurity vs. Traditional Security.

Resource:

https://www.citetech.com/learn/cybersecurity-for-scada-systems#:~:text=SCADA%20cybersecurity%20is%20the%20practice,natural%20gas%2C%20electricity%20and%20transportation.

https://www.energy.gov/ceser/downloads/21-steps-improve-cyber-security-scada-networks

QUESTION 2:   List the Pros and cons of the Black box, Grey box, and White box pen-testing for the data center at Airport 1 in Washington DC. And explain which one you would prefer for the given business case.

Resource: https://thecyphere.com/blog/types-penetration-testing/

QUESTION 3:   List the Pillars of Security of the Data Center of the Blue Skies Airport data center

QUESTION 4:   Complete the  Potential Threats table based on the given Blue Skies Airport case 

Week9Table.jpg

Potential Threats Table.docx Download Potential Threats Table.docx 

ECET 450

  

ECET 450: Laboratory 2

Part A: 

Purpose:

This exercise involves normalizing a small part of a DB. The steps to complete this exercise include getting the data items into 1NF, 2NF, and 3NF. The final step is to generate the ERD for the table or tables that are in the dependency diagram in 3NF.

Discussion: 

Some small business wants to keep track of office furniture, computers, printers, etc. A sample of the ITEM records is shown below:

  

ATTRIBUTE NAME

SAMPLE VALUE

SAMPLE VALUE

SAMPLE VALUE

 

ITEM_ID

D1342245

D1453356

D1365779

 

ITEM_DESCRIPTION

IQ Deskjet 683P

IQ Toner

DT Photocopier

 

ROOM_NUMBER

227

227

342

 

BLDG_CODE

SC

SC

ET

 

BLDG_NAME

Science

Science

Electronics Technology

 

BLDG_MANAGER

A. B. Jones

A. B. Jones

R. S. Smith

1. Draw the dependency diagram using the data in the table. Make sure to label the transitive and partial dependencies.

2. Using the dependency diagram developed in step 1, create a set of dependency diagrams that meet 3rd Normal Form requirements. Rename attributes to meet the naming conventions. Create new entities and attributes as necessary.

3. Draw the crow’s foot ERD with the VISIO drawing tool using the results of step 2.

Computer

 Many organizations have professionally designed letterhead printed on sheets of paper. When writing a letter such as the one in this (Microsoft Word Chapter 1), what would you need to do differently to accommodate stationery that already has your organization’s name and address printed at the top? What might you need to do differently to print the letter? 

Interactive Computer Graphics -3(2)

 

Question 1.

Using WebGL [call gl.drawElements( ) function] render points at coordinates:

-0.4, -0.3, 0,0

 0.5, -0.5, 0.0

 0.6,  0.7, 0.0

-0.3, -0.4, 0.0

Make the canvas width = 600, height = 600, border orange and the points black.

Question 2.

Using WebGL [call drawElements()function]render the rectangle using the following coordinates:

 0.45,  0.45,  0.0

-0.45,  0.45,  0.0  

-0.45, -0.45, 0.0

0.45, -0.45, 0.0

Make the canvas with = 470, height = 470, border red and the rectangle green.

CYB/ 130

Python lists are commonly used to store data types. Lists are a collection of information typically called a container. Think of a physical container that can hold all kinds of objects, not just one object of the same type. Python includes a built-in list type called a list. They can be managed by many built-in functions that help fill, iterate over, add to, and delete them.

Respond to the following in a minimum of 175 words:

  • Why is it useful to store information with different data types? When do you choose to use a list over a dictionary? Provide a code example that supports your comments.