Assignment 1

 Overview:In Chapter 2 we talked about how computer crime affects forensics and you learned about the following categories:

  1. Identify theft
  2. Hacking systems for data
  3. Cyberstalking / harassment
  4. Internet fraud
  5. Non-access computer crimes
  6. Cyberterrorism

InstructionsFor this week’s assignment, please do some external research and identify at least three actual events for each category. Detail what happened and be sure to cite your sources. The intent here is to help you understand how the world is truly internetworked and why digital forensics is an important role in our environment. 

To write java program of prime numbers

you will generate a NON THREADED, SEQUENTIAL program.  This sequential program will take some input (you can grab this input from the user, or from a command line argument) that it will store in an integer.  (Therefore, there needs to be checks in place to make sure that the number being given can be stored adequately in an integer.  You do not need to use BigInteger or long for this, regular integersis fine.  This is more about design than about function).

Now that you have this number, you want to compute all the prime numbers that exist between 2 and that number (inclusive).

If a number is not prime, you will store that number and a List of its factors in a Map

If a number is prime you will store it in a List.  So, at the conclusion, we have a Map of non primes that contain factors of numbers and a list of primes.

You will time the runtime of your application so that we know how long it will take to build these two structures.  To time your application, simply generate a starting time as soon as you retrieve the number you want to use as the base of your iteration and then stop the timer when you are finished generating your structures.  Report back what the difference is. You can use System.currentTimeMillis(); to do this.

Write a program GuessGame

  

Write a program GuessGame.java that plays the game “guess the number” as follows: Your program chooses the number to be guessed by selecting an integer at random in the range 1–1000. The program then displays the following in a label:
 

I have a number between 1 and 1000 can you guess my number?
 

Please enter your first guess.
A JTextField should be used to input the guess. As each guess is input, the background color should change to either red or blue. Red indicates that the user is getting “warmer,” and blue indicates that the user is getting “colder.” A JLabel should display either “Too High” or “Too Low” to help the user zero in on the correct answer. When the user gets the correct answer, “Correct!” should be displayed, and the JTextField used for input should be changed to be uneditable. A JButton should be provided to allow the user to play the game again. When the JButton is clicked, a new random number should be generated and the input JTextField changed to be editable

Summary of Article

 

summarize the reading in your own words. Your summary should be 2-3 paragraphs in length and uploaded as a WORD DOCUMENT. Click the link above to submit your work. There is an EXAMPLE attached to show you the format requirements.

What is most important is that you use YOUR OWN WORDS to summarize the news article. It is essential that you do not copy text directly from the Internet. Plagiarism is unacceptable. You can easily avoid this by rephrasing the contents and summarizing it using your own words.

 http://topics.nytimes.com/top/reference/timestopics/subjects/c/computer_security/index.html 

Cyber Tactics

All posts must be a minimum of 250 words. APA reference. 100% original work. no plagiarism.

Many security experts argue that their primary concern isn’t hardware or software. It’s peopleware. Successful attacks often rely on some form of social engineering either to obtain access information or for the attack itself. Phishing, in particular, has become a growing concern. Research a phishing technique, including an actual case example if possible, and provide a brief summary discussing:

(a) the ruse employed
(b) the target (bank account access, identify theft, etc.)
(c) how successful it was
(d) whether the perpetrators were ever identified and prosecuted
(e) what countermeasures might have blocked the attack

Mid-Term

Your midterm project was to provide a security assessment for [X], an online software company that specializes in selling ad spaces in their parent company’s magazine.  [X] manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because [X] ‘s database needs to connect to the parent company’s database, the parent company has requested that [X] system be assessed and verified as secure.

Now that you have provided your security assessment, the next step is to provide [X] with your Security Portfolio. Using this week’s Reading on the NIST framework that includes the 5-step process for creating a balanced portfolio of security products, your assignment will be to create a Security Portfolio with the following sections:

(Note: [X] can be any company and any line of business)

1. Cover Page (i.e. APA title page)  

2. Background (provide a synopsis of your midterm security assessment on Vestige)  

3. For each security need identified (or needs to be identified) from your Midterm Assignment, Find the products that will deliver the needed capabilities for the right price and tell why you chose that product.

This assignment should be about security needs only.  Do NOT discuss how the client can achieve more business (That is not your job).

Answer the questions with an APA-formatted paper (Title page, body, and references only).  Your response should have a minimum of 600 words.  Count the words only in the body of your response, not the references.  A table of contents and abstracts are not required.

A minimum of two references is required. One reference for the book is acceptable but multiple references are allowed.  There should be multiple citations within the body of the paper.  Note that an in-text citation includes the author’s name, year of publication, and the page number where the paraphrased material is located.

Your paper must be submitted to SafeAssign.  The resulting score should not exceed 35%.

NOTE: Please find related content in Chapter 12 from textbook Securing Systems: Applied Security Architecture and Threat Models.

NOTE: I have attached the Mid Term project for reference.

Research paper

  

In this assignment, you are to critically read and evaluate a scholarly article’s strengths, weaknesses, and contributions to the study field. Learning how to critique a journal article has several benefits, including preparing you for publishing in the future and keeping you current on the literature in your field of study. The practical application is developing the ability to look at research within your organization and industry with a knowledgeable, critical eye.

The University of the Cumberlands (UC) Library subscribes to many journals and provides you access to appropriate collections to support this assignment. Using the UC Library, locate and review the following peer-reviewed articles:

  • Dysvik,      A & Kuvaas, B. (2013). Intrinsic and extrinsic motivation as      predictors of work effort: The moderating role of achievement goals. British      Journal of Social Psychology, 52(3), 412–430.      https://doi.org/10.1111/j.2044-8309.2011.02090.x.
  • Aydogmus,      Metin Camgoz, S., Ergeneli, A., & Tayfur Ekmekci, O. (2018).      Perceptions of transformational leadership and job satisfaction: The roles      of personality traits and psychological empowerment. Journal of      Management & Organization, 24(1), 81–107. https://doi.org/10.1017/jmo.2016.59
  • Fitzsimmons,      Callan, V. J., & Paulsen, N. (2014). Gender disparity in the C-suite:      Do male and female CEOs differ in how they reached the top? The      Leadership Quarterly, 25(2), 245–266. https://doi.org/10.1016/j.leaqua.2013.08.005 
  • Flocco,      Canterino, F., & Cagliano, R. (2021). Leading innovation through      employees’ participation: Plural leadership in employee-driven innovation      practices. Leadership (London, England), 17(5),      499–518. https://doi.org/10.1177/1742715020987928
  • Kuenzi,      Mayer, D. M., & Greenbaum, R. L. (2020). Creating an ethical      organizational environment: The relationship between ethical leadership,      ethical organizational climate, and unethical behavior. Personnel      Psychology, 73(1), 43–71. https://doi.org/10.1111/peps.12356
  • de      Reuver, Van de Voorde, K., & Kilroy, S. (2021). When do bundles of      high performance work systems reduce employee absenteeism? The moderating      role of workload. International Journal of Human Resource      Management, 32(13), 2889–2909. https://doi.org/10.1080/09585192.2019.1616594

Following your review, choose one article from this list; critically evaluate the article’s strengths, weaknesses, and contribution to the study field using the outline below as a guide:

Cover page

· The cover page will include:

o Articles Title and Author (s)

o Name of Journal (s)

o Date of publication

o Your name

Executive Summary

  • Summarize the significant aspects of the entire article,      including:

·  

o The overall purpose and general area of study of the article.

o The specific problem being addressed in the study.

o The main findings of the article.

Literature Review

  • Briefly summarize the overall themes presented in the      Literature Review.

·  

o Was the literature review applicable to the study, current and thorough?

o Were there gaps in the literature review?

Data Analysis

·  

o Identify the methodology used: qualitative, quantitative, mixed? Was the chosen methodology appropriate for the study? Why or why not?

o Did the data analysis prove or disprove the research questions? Explain.

Results/Conclusion

· In this section, you will address the following:

o Describe the article’s relevance to the field of knowledge.

o Outline the strengths and weaknesses of the article. Be specific.

o Based on the article, what future research do you think needs to be accomplished in this area?

o What are your key points and takeaways after analyzing the article?

Proper APA in-text citation must be used. The review is to be word-processed double spaced, not less than two pages, and no more than five pages in length. Paper length does not include the cover page, abstract, or references page(s)

analyzing and visualizing data

 Select any example of a visualization or infographic, maybe your own
work or that of others. The task is to undertake a deep, detailed
‘forensic’ like assessment of the design choices made across each of
the five layers of the chosen visualization’s anatomy. In each case
your assessment is only concerned with one design layer at a time.
For this task, take a close look at the annotation choices:

1. Start by identifying all the annotation features deployed, listing
them under the headers of either project or chart annotation
2. How suitable are the choices and deployment of these annotation
features? If they are not, what do you think they should have been?
3. Go through the set of ‘Influencing factors’ from the latter section of
the book’s chapter to help shape your assessment and to possibly
inform how you might tackle this design layer differently
4. Also, considering the range of potential annotation features, what
would you do differently or additionally?

Submit a two-page document answering all of the questions above. Be
sure to show the visualization first and then thoroughly answer the
above questions. Ensure that there are at least two-peer reviewed
sources utilized this week to support your work.

Turn in word document, including SQL

  

(Turn in word document, including SQL commands and Screen shots from mySQL)

Write SQL queries for the books database  that perform each ofthe following tasks:

a) Select all authors from the Authors table with the columns in the order lastName,

firstName and authorID.

b) Select a specific author and list all books for that author. Include the title, year and

ISBN number. Order the information alphabetically by title.

c) Add a new author to the Authors table.

d) Add a new title for an author (remember that the book must have an entry in the

AuthorISBN table).

Some suggestions on installing Apache and setting up database file in mySQL are attached.

Linux Implementation Proposal: Migration Proposal Presentation

.Instructions

Faster Computing has contacted Go2Linux and requested a brief proposal presentation for migrating its systems from Windows to Linux.

The company is specifically interested in seeing the following information:

(10.1.1: Identify the problem to be solved.)

  • Based on your current understanding of Faster Computing’s business, what are some potential benefits of Linux?
  • The company is aware that many different Linux derivatives exist. Be very specific and choose only one version (e.g., Ubuntu, Mint, Zorin, Redhat, CentOS, Kali). Which would Go2Linux recommend, and why? Give specific reasons for your choice (e.g., security features, support, updates, user interface).

(10.1.2: Gather project requirements to meet stakeholder needs.)

  • What steps will be required to migrate the systems from Windows to Linux?
  • Are there graphical interfaces available for the Linux workstations that would provide similar functionality to Windows? Some users are concerned about working with a command-line interface.

(10.1.3: Define the specifications of required technologies.)

  • What tools are available on Linux for the servers to provide file sharing, Linux services, and printing? (e.g., Apache/Nginx, Samba, CUPS, SSH/SCP). Ensure you identify what the functions/services are used for (e.g., Samba is used for file sharing).

(1.1.3: Present ideas in a clear, logical order appropriate to the task.)

The deliverable for this phase of the project is a three- to five-slide PowerPoint narrated presentation.

  • An introductory slide
  • A summary slide
  • Voice narration on every slide

For each slide, you will embed your own audio recording as if you were presenting the content to the Faster Computing team. Faster Computing has not yet committed to the project, so this should be presented as a proposal. The presentation should be visually appealing; the inclusion of at least one image that supports the content and adds value to the proposal is required.

(1.3.3: Integrate appropriate credible sources to illustrate and validate ideas.)

You must cite at least two quality sources.

You used at least 2 references and your references were cited properly following an accepted style. Ask your instructor for clarification.

Use the Migration Proposal Presentation template to get started.

(2.3.1: State conclusions or solutions clearly and precisely.)

You should present your proposal as if you are selling to the company. Revisit all of these important reasons in the summary slide.

How Will My Work Be Evaluated?

As you progress in your IT career, you may find yourself making presentations to customers, client audiences, and professional peers. By creating an effective presentation, you are showing how you use your technical knowledge and convey your ideas to others in a professional setting, an important workplace skill. 

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.1.3: Present ideas in a clear, logical order appropriate to the task. 
  • 1.3.3: Integrate appropriate credible sources to illustrate and validate ideas. 
  • 2.3.1: State conclusions or solutions clearly and precisely. 
  • 10.1.1: Identify the problem to be solved. 
  • 10.1.2: Gather project requirements to meet stakeholder needs. 
  • 10.1.3: Define the specifications of the required technologies.