computer forensic

Discuss how email has impacted members of an organization’s expectation of privacy, communication, confidentiality and its use as evidence.  After reading the article titled “Your E-mail Trail: Where Ethics Meets Forensics”, discuss your findings 

Writing Requirements

  • The Essay must be at least 4-5 pages long.
  • Must have an introduction with a clear thesis statement, a body discussing the three main points and a conclusion
  • Conduct research to find relevant information using reliable sources to support your views.
  • (Use at least 2 academic books and 3 scholarly articles from a library database)
  • Use APA Style for in-text citations, and references
  • Turn in the Paper to SMARTHINKING.com before submitting your final paper.
  • Turn in a final paper and the paper with the SMARTHINKING.com tutor comments.

main discussion

 

Compare and contrast the different techniques for anomaly detection that were presented in Chapter 9.

Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects.

Informatics

O
From the moment you wake, you are in fact a data-generation machine. Each use of your phone, every transaction you make using a debit or credit card, even your entrance to your place of work, creates data. It begs the question: How much data do you generate each day? Many studies have been conducted on this, and the numbers are staggering: Estimates suggest that nearly 1 million bytes of data are generated every second for every person on earth.

CLOUD COM Practical Connection Assignment

 This project requires you to write at 3-5 page APA formatted research paper.  The focus is on an organization that you choose which has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper will be submitted during the last week of the course.    

Threat hunting– Research paper

Your team currently works as a research wing for a standard SOC (Security Operations Center).  The SOC keeps analytics on the current trends within the network.  Your team will be assigned a current issue that has been seen at the border of the network, trying to infiltrate the organizations network/systems.  Upon being assigned your item, it will be your job to go out and search OSINT (Open Source Intelligence) for more information on the attack being observed.  This could be a single port number, a series of attacks that has been identified, or an IP address to research and identify; your professor will assign this.  Your deliverable will be a 5 page APA style research report with your findings.  Discover current attacks being performed through this port, or current state of a known scanning suite.  Find sources, if possible, source code of attacks that are known to exploit this weakness and break down the code.  List known services on the affected ports that are associated and current attacks being performed on these services (list any CVE findings and briefly list and explain).  Look at SNORT rules that watch for these attacks and list that SID.

Finally, to wrap-up your research, present the current risk level associated with this threat.  Use the FAIR methodology to derive your threat assessment.  The attached FAIR PDF will walk you through your analysis.  To complete the FAIR document:

  • Step 1:  Asset at Risk will be the organization’s primary e-commerce web server.
  • Step 2:  You will provide this answer based on your research.
  • Step 3:  You will provide this answer based on your research; however, keep in mind how many times per day this is scanning the network, which will be given to your when you receive your topic.
  • Step 4:  You will provide this answer based on your research.
  • Step 5:  Assume the e-Commerce server is fully up-to-date and running the following base software:  Red Hat Linux, Apache, MariaDB, Drupal, PHP and is hardened based on base NIST recommendations for operations.
  • Step 6-7:  Calculate
  • Step 8:  Assume Moderate
  • Step 9:  Assume Moderate
  • Step 10:  Calculate and create this chart in excel with the appropriate item highlighted.  Include this chart in your paper and presentation.

The paper should be based on ” There is an uptick in port 8080 according to SANS Top 10. Why is that being targeted currently? “

Note: See the attachment

Assignment

Discussion #2: Discuss the financial benefits of chatbots. Discussion 

#4: Discuss the limitation of chatbots and how to overcome them.

#5 Discussion Examine Alexa’s skill in ordering drinks from Starbucks.

dis_dsdba13

 This week we explored the concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.  

Written Assignment 3

 

  • Who uses extended support features?
  • Why is it important to keep backups of your SQL software?
  • What did you learn about SQL after watching Brent Ozar’s video?
  • How can you keep your skills aggressively current?
  • Be specific and provide examples.

Click the link above to submit your completed assignment.Requirements:

  • A minimum of 350 words. 
  • Use APA format. 
    • Times New Roman 12 pt font, double spaced with 1″ margins.

WEB Answer

 

  1. Pitch Deck
    Overview
    You have been hired to create a website. In this assignment, you will begin to gather the necessary information to complete the work and present your ideas to your client.
    Instructions
    You will need to answer the following questions:

    • What kind of domain names will you register (that is .com, .biz, .net, et cetera)? Why do you suggest this kind of domain? (Review the section in Week 1 on domain names.)
    • Will you register the site using multiple domains? Why is or isn’t this necessary?
    • Will you need to secure any portion of your site? Why? (See the section on HTTPS.)
    • Given the nature of Web trends and changes in technology, what steps, if any, do you suggest to keep your site viable for more than one year?
    • What browsers do you anticipate your visitors will be using based on information available today?
    • Does the browser have any impact on your design?
    • Based on what you’ve just learned this week about CSS, how will this help in the development of your site?
    • Requirements
      You may use any one of a variety of formats to create a pitch deck. PowerPoint is highly recommended, with extra points for creating a presentation using a video device or software that you can upload to YouTube or another easily accessible online hosting service. (If you choose this option, you must coordinate ahead of time with your instructor, to ensure that your instructor will be able to access your video.) Note: You’ve already been hired, but remember that you still need to show off how awesome you are.
      This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
      The specific course learning outcome associated with this assignment is:
    • Present information and requirements for a website design to a customer.
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.