INFS 4950 Project

Develop your own Comprehensive Web Application

  • Synthesize the conceptual information covered in previous modules to propose your own comprehensive web-based application that you will develop
  • Design a consistent look for your web application 
  • Create an intuitive navigation structure for your web application
  • Develop your proposed web application using the ASP.NET Core MVC tools and coding techniques covered in previous modules
  • Incorporate at least one user story within your application for adding, updating, and deleting data in a database table

Research paper on privacy and security

Identify a problem in area (a) or (b). Submit the problem title and one paragraph description of the problem for “Research Paper assignment Part 1”; once your submitted problem is approved, submit maximum two page write-up on how you think the related issues could be addressed.

Research Problems: 

Area (a): Inclusive Privacy Solution

Masking sure that a privacy solution does not ignore concerns of a group of people

Please look for example papers in WIPS (WIPS – Workshop on Inclusive Privacy and Security)

Area (b): Usable Privacy Solution

A privacy solution that people uses with comfort

Example: Privacy notice? Not a usable solution (we mostly never read them because the way they are written is hard to comprehend)

Password is primarily a security tool, but also a privacy tool.

Is password usable? Not much. Creating and remembering strong password is difficult. 

Please look for example papers in SOUPS (SOUPS – Symposium On Usable Privacy and Security). 

Quiz

1. Define motivation.

2.  Name four external contingent rewards that an employer might use to have a positive effect on a worker’s performance. 

3.  Define intrinsic and extrinsic motivation.

4. Describe a company personnel policy from your personal experience that you believe has had a negativeaffect your performance at work or on the performance of someone you know.

5. What are the four chemicals, according to Simon Sinek, that affect motivation and what do these chemicals do?

digital forensics

  

Go to the 

website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.

 

Using WORD, in your OWN WORDS, write an ORIGINAL brief  of 300 words or more:

· Summarize the case

· Give your opinion of the decision.

· Describe how the case deals with the material in this chapter

Chapter 4 of the Graves text, Legislated Privacy Concerns.

Primary topics:

  • Privacy 
  • Legislated      acts

https://www.youtube.com/watch?v=ZNEPaGFApX4 

Assignment

total 1000 words

 Security assessment vs Security audit, explain briefly the differences and similarity if any ?  500 words

500 words for below

 Faced with the need to deliver risk ratings for your organization, you will have to substitute the organization’s risk preferences for your own. For, indeed, it is the organization’s risk tolerance that the assessment is trying to achieve, not each assessor’s personal risk preferences. 

  • What is the risk posture for each particular system as it contributes to the overall risk posture of the organization?
  • How does each attack surface – its protections if any, in the presence (or absence) of active threat agents and their capabilities, methods, and goals through each situation—add up to a system’s particular risk posture?
  • In addition, how do all the systems’ risks sum up to an organization’s computer security risk posture?

Discussion Board Forum

  

After reading the related articles, explain whether you believe the 7-layer model is a complete and perfect representation of the way in which networks must be constructed. If you believe the model is a complete representation, support your position. If you believe the model could be improved upon, as suggested in the assigned reading, describe the new model and support your position. You may even have a different model in mind than either the 7-layer or 10-layer models presented. If so, describe your new model and support your position. 

The title of your thread must reflect your opinion. If you agree that the model is complete and perfect “as is,” title your thread “Keep the 7-Layer OSI Model.” If you believe the model could be improved upon, title your thread “Change the 7-Layer OSI Model.” In either case, support your position with 2 references. One reference may be the Bible. If you choose to support the 10-layer model in the assigned reading, your other reference may be the assigned article. Feel free to include as many references as needed. Note that, due to the nature of this topic, your references do not need to come from peer-reviewed journals. Much valuable information can be obtained from other sources, such as cisco.com, technet.com, etc.

Your thread must be at least 300 words and contain 2 references.

complete the following questions in an MS Word

  

.complete the following questions in an MS Word Document in APA format. Double space your work and place in 12 point font using Times New Roman. You must include both a separate cover and reference page.
 

1. (counts double) The following information is listed for the configuration of a router: Internet Port:
MAC Address – 00:21:3D:AE:2C:A6
IP Address – 70.115.23.137
DHCP – DHCP Client
IP Subnet Mask – 255.255.240.0
Domain Name Server – 209.18.47.61, 209.18.47.62
LAN Port:
MAC Address – 00:21:3D:AE:2C:A5
IP Address – 192.168.1.1
DHCP – OFF
IP Subnet Mask – 255.255.255.0
 

a. The two MAC addresses are different. What is a MAC address, and why are the two different even though this is a single router?
 

b. The two IP addresses are different. What is an IP address, and why are the two different even though this is a single router?
 

c. Since DHCP is disabled on the router, it is not assigning addresses on the LAN. If setting a static IP address for a device on the LAN, what range of addresses could be utilized?
 

d. After choosing an unused address from the range given in d for the IP address for a device on the LAN, what would the IP subnet mask and gateway be set to? Explain why these settings would be used.
 

2. List at least four services that are part of the internet and differentiate what each facilitates. You should include the World Wide Web as one of your four services.
 

3. For the network that you have chosen to characterize, list the MAC Address, IP Address, IP Subnet Mask, Gateway Information, and DHCP and DNS Information for each network connection (all NICs in each computer as well as all network device connections). Based on this information, explain the flow of information in and configuration of this network.

Security research

 Use the attached document to complete the following assignment. 

  1. Find three research articles in your chapter 2.
  2. Identify the problem being solved/addressed.
  3. Write the research questions, sources of data, and analysis.

Pay particular attention to the problem being solved.