digital

Review the material on routers.

It is sometimes said that information extracted from a router or switch does not necessarily provide specific evidence of a particular crime. What is meant by that?  If true, what then is the most useful information collected from these devices in an investigation?

300 WORDS

Physical Security

 

 Topic: Research the popular Types, Pros, Cons and your company’s use of Biometric Identification devices. Remember to get permission from security. If you are not currently employed discuss what types you would recommend.  

Instructions: Please download the Assignment 4 Biometrics Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA. Once completed name your file: YourName_Assignment_4_Biometrics_Assessment.docx and submit to the appropriate assignment folder. You must have at least 3 references and 1 must be from the text. The others may be from the text or web sites. I will NOT accept any references from any other sources including journals UNLESS you provide the written proof of the reference with your submission. 

why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc.

 

Discuss in 500 words, why institutions might be reluctant to move their IT to the cloud. Consider a specific industry like education, medicine, military, etc. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

 It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested. 

Assignment1010

 What kind of user training should be conducted to deal with the issue of noise (not the electrical kind). How do you strike a balance between being overwhelmed with false positives and the danger of ignoring true incidents?  What effects would false positives have on an organization?  

PLEASE USE THE ATTACHED TEMPLATE

Simple random Sampling Discussion

What’s simple random sampling? Is it possible to sample data instances using a distribution different from the uniform distribution? If so, give an example of a probability distribution of the data instances that is different from uniform (i.e., equal probability).

All discussions should contain at least one reference (and matching in-text citation in APA format).

Security Architecture & design

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples.  include at least two references.

Minimum of 600 words

simple, no plagiarism, due by 11/08/2020 1:30 PM EST

As you consider the reputation service and the needs of customers or individual consumers, as well as, perhaps, large organizations that are security conscious like our fictitious enterprise, Digital Diskus, what will be the expectations and requirements of the customers? Will consumers’ needs be different from those of enterprises? Who owns the data that is being served from the reputation service? In addition, what kinds of protections might a customer expect from other customers when accessing reputations?

Information Governance discussion 7

Chapters 17/18 – From our weekly chapter reading, digital preservation can be defined as the long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required to be retained.  Though this assessment holds true to the authors, business organizations continue to face significant challenges in meeting their LTDP needs, especially those organizations whose primary mission is to preserve and provide access to permanent records.

Q1: Looking forward, the authors concluded that, there is going to be a great need for collaboration between both internal and external stakeholders to develop governance policies and strategies to govern and control information assets over long periods of time, among other requirements.  For this to be achievable, the chapter has identified one most important consideration that must be met.  What is that consideration?  Identify, and provide a brief narrative to support your answer.

Cybersecurity

Reflect on what you have gained from taking this course.

Write a short statement of 200 words that completes and explains the following sentence.

“One of the most important Cybersecurity learnings I am taking away from this  fundamentals of Cybersecurity course is…

SWI-Prolog coding

 

Please do the following exercises in The Art of Prolog, Second Edition, and submit a ZIP file consisting of your submission files.  There should be a separate file ending in .prolog or .pl for each section. Please make sure that your solutions run in SWI-Prolog.

Section 8.2 (p. 153-154): i, ii

Section 9.2 (p. 173): i

Section 10.1 (p. 179): i, ii

Section 11.1 (p. 195): i, ii, iii

Section 11.3 (p. 202): i, ii

Data Mining Assignment

Provide a real world example of a probability distribution based on your readings for the week. Consider the data instances that is different from uniform (i.e., equal probability).

Instructions for participation: You must post an INITIAL POST and then respond to at least ONE POST. In both postings, you MUST provide citable academic literature to defend your use case. Please do not use the same source over again, especially when most times there is absolutely no applicability from one post to the next.