Subject : COmputer forensics and investigations
Discussion question, 350 words and 2 references.
Search the peer-reviewed literature for examples like below. You may select any topic relating to technology that illustrates the potential for really messing things up. Include, in your description, an analysis of what might have caused the problems and potential solutions to them. Be sure to provide supporting evidence, with citations from the literature.
Example: Protection of patient data has become a critical part of the scope of practice of all healthcare professionals. Routine data breaches underscore the importance of training clinical employees in protecting these data. However, beyond exposure to HIPAA regulations, little is done to educate the healthcare student about the risks and vulnerabilities of the online environment as it pertains to health data” (Swede, Scovetta, & Eugene-Colin, 2018).
Cloud Computing Paper
Select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a header.
• Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?
• Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.
Requirements:
The paper must adhere to APA guidelines including Title and Reference pages. There should be at least three scholarly sources listed on the reference page. Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. The body of the paper should be 3 – 5 pages in length. The Title and Reference pages do not count towards the page count requirements.
cloud computing 4
Part 1: Hypervisors
Review case 8-3 and 8-4. Select one of the two cases from chapter 8 and complete the written exercise.
Case 8-3 Hyper-V
Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.
OR
Case 8-4 VmWare
Review case 8-3 and complete the exercise. Provide a minimum of 2 references to support your writing.
Part 2: Cloud Security
Chapter 9 lists several common security threats to cloud-based environments. Analyze 3 types of cloud security threats and describe methods to mitigate the risks. Compare and contrast the difference between these security threats in a data center/on site versus from the cloud. Provide a minimum of 3 references to support your findings.
Requirements:
Total page count should be a minimum of 3 pages.
Make sure to cite any content provided from your sources.
Minimum number of references for the assignment is 5.
Algorithm
Explain the Bresenham line Algorithm
Signature Assignment: Backup Policies
Securing company data is not as simple as backing up to another hard drive. It is important to have backup tools, processes, and policies for both business continuity and disaster recovery plans.
In the final section of your Playbook, create a 3- to 4-page outline of backup policies for when the data center is inaccessible.
Complete the following in your outline:
- List the tools used for backup purposes.
- Explain the following:
- Where employees should work from that day
- How employees can get to their data
- The communication methods about updates
- Outline step-by-step instructions to recover your databases and telecommunications.
- Provide a step-by-step guide to recover and provide any additional company assets.
- Discuss policies for backup media storage.
- Discuss policies for encryption of backup data.
Note: Numbered or bulleted steps or guidelines make the document easy to for others to follow under potentially stressful situations. Paragraphs can be used to help support the steps or guidelines.
Cite at least 2 resources to support your assignment.
Format your assignment according to APA guidelines.
DrRacket programming
DrRacket programming
Executive Program Practical Connection Assignment – Information Governance (ITS-833-M23) – Full Term
Your team will conduct a literature review in Information Governance
You can also conduct a literature review on information governance and how it is applied to an Information Technology organization.
7-8 Pages of Content
Literature Review needs to be written on the document which is attached below.
You are to review the literature on Information Governance planning and discuss problems and gaps that have been identified in the literature. You will expand on the issue and how researchers have attempted to examine that issue by collecting data – you are NOT collecting data, just reporting on how researchers did their collection.
As you read the literature, it will become apparent that there are multiple issues, pick one issue that stands out in the literature & agree on that as a Team to address that.
Cover: Include the names of those who participated in the project
Table of contents: Use a Microsoft Enabled Table of Contents feature.
Background: Describe the issue, discuss the problem, and elaborate on any previous attempts to examine that issue.
Research Questions: In your identified problem area that you are discussing, what were the research questions that were asked?
Methodology: What approach did the researcher use, qualitative, quantitative, survey, case study? Describe the population that was chosen. Data Analysis: What were some of the findings, for example, if there were any hypotheses asked, were they supported?
Conclusions: What was the conclusion of any data collections, e.g., were research questions answered, were hypotheses supported?
Discussion:
Here you can expand on the research and what the big picture means, how do the results found in the literature review help organizations in the Information Technology strategy plannin£!. What do you see as long-term impacts and what further research could be done in the field?
References: Include at least ten scholarly references in APA format.
Java – Process Synchronization
In this assignment, you will write a Java program that implements the solution to the bounded buffer problem between a producer and a consumer. The producer will produce forever and the consumer will consume forever. The producer will put data into the buffer and the consumer will remove data from the buffer. The buffer must implement a means of ensuring that the buffer never enters an under flow (take too much data out) or over flow put too much data into the buffer. Additionally the buffer must have functionality so that a critical region problem does not occur with parallel updates to the data.
Test you application by creating a java thread for the produce, the consumer and having them access a shared buffer with declared size 5.
Assignment and memo
1.Assignment
- identify and apply the different analysis and design methods for business applications;
- operate effectively within a team environment demonstrating team building and project management skills in information systems analysis and design; and
- communicate information effectively in presentations with oral, written and electronic formats using media formats widely adopted for information systems development in business and government.
Create an alternative decision matrix for the case system. Using Excel or Word, develop a decision matrix to be used to evaluate three proposed design alternatives (alternatives A, B, and C).
The idea is to create a worksheet that can be applied to any set of alternatives.
Criteria: Decision matrix has columns for criteria weights and points available, and columns that represent three proposals. Within each proposal include columns for points assigned and
the product of points assigned times criteria weight. The bottom row of the matrix contains column totals.
Your essay should be 3 pages in content and fully explore all of the following items described above. Include at least 2 outside citations (not including your text) and use proper APA formatting.
Atleast 2 In-line citations and references required.
2. Weekly Memo – Memo should be related to the discussions , assignment and should be one page(citations,references, APA not required).