Digital forensics and how it could be used in a risk management program?

  

Articles:

 

Montasari, R., & Hill, R. (2019). Next-Generation Digital Forensics: Challenges and Future Paradigms. 2019  IEEE 12th International Conference on Global Security, Safety and  Sustainability (ICGS3), Global Security, Safety and Sustainability  (ICGS3), 205. https://doi.org/10.1109/ICGS3.2019.8688020

Sahinoglu, M., Stockton, S., Barclay, R. M., & Morton, S.  (2016). Metrics Based Risk Assessment and Management of Digital  Forensics. Defense Acquisition Research Journal: A Publication of the Defense Acquisition University, 23(2), 152–177. https://doi.org/10.22594/dau.16-748.23.02

The readings this week expand on investigation and of digital  forensic analysis and investigations. Organizations, especially those in  the public, health and educational areas are bound by legal and  statutory requirements to protect data and private information,  therefore digital forensics analysis will be very beneficial when  security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.

 A substantive post will do the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC  Library) that applies to the topic, along with additional information  about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial  discussion thread. Be sure to use information from your readings and  other sources from the UC Library. Use proper citations and references  in your post.

Discussion

 MIT computer science professor Harold Abelson has said, “In today’s online world, what your mother told you is true, only more so:  people really can judge you by your friends.”  Have you ever been upset or embarrassed by what your friends posted on Facebook or other social media sites?  Are you concerned that people (other friends, colleagues, employers or potential employers, etc.) are going to judge you based on what your friends are posting? 

Research Paper & Discussion

1. •• Research paper **

 Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

What is penetration testing

Testing Stages

Testing Methods

Testing, web applications and firewalls

Your paper should meet the following requirements:

Be approximately four to six pages in length, not including the required cover page and reference page.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

2. ** Discussion post **

 There is much discussion regarding Data Analytics and Data Mining.  Sometimes these terms are used synonymously but there is a difference.  What is the difference between Data Analytics vs Data Mining? Please provide an example of how each is used. Also explain how you may use data analytics and data mining in a future career. Lastly, be sure to utilize at least one scholarly source from Google Scholar. 

Please make your initial post and two response posts substantive. A substantive post will do at least two  of the following:

Ask an interesting, thoughtful question pertaining to the topic

Answer a question (in detail) posted by another student or the instructor

Provide extensive additional information on the topic

Explain, define, or analyze the topic in detail

Share an applicable personal experience

Provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)

Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources. Use proper citations and references in your post.

essay

 Choose one of the aphorisms listed above.  Who first wrote/spoke the aphorism or where does it originate?  What does the aphorism mean?  What is the author’s truth?  Why do you agree or disagree with the aphorism and how if at all has it made you rethink what you thought about the topic before researching the aphorism?  How could you apply this “wisdom” to your life?   
 

 1. “The rich stay rich by acting poor.  The poor stay poor by acting rich.”

2. “If you want a friend get a dog.”

3. “It takes 20 years to become an overnight success.”

4. “Nothing is certain but death and taxes.”

5. “This too shall pass.”

6. “Trust but verify.”

7. “Genius is one percent inspiration and 99 percent perspiration.”

8. “Failure to prepare is preparing to fail .”

9. “If you want something done right do it yourself.”

10. “There’s nothing new under the sun.”

11. “Simplicity is the ultimate sophistication.”

12. “Less is more.”

13. “Buy land.  They’re not making it anymore.”

14. “Misery loves company.”

15. “Be careful what you ask for.  You might get it.”

16. “Work smart, not hard.”

17. “To everything there is a season and a time for every purpose under heaven…”

18. “Brevity is the soul of wit.”

19. “A rose by any other name smells as sweet.”

20. “Carpe diem.”
 

 For composition exercises two and three please write:
1. (format) a 500-word composition.  Use Courier New, 12-point font and double space. 

2. (content) Your composition needs a main idea, major points and specific details.  Respond to the topic/aphorism in your first paragraph.  Present your main idea in the first paragraph.  Then use the rest of your 500-word limit to support your main idea.  You must cite from the material you’ve read to support your ideas. As Abraham Lincoln wrote, “It is a pleasure to be able to quote lines to fit any occasion.”  Use two-three quotes from the sources in your composition to “fit” your interpretation of the aphorism.

3. (focus) Stay focused on the topic.  Everything you write should have a connection to the topic and your main idea. 

4. (clarity) When you proofread check for common errors like fragments, run-on’s, commonly confused words, tense shift, subject-verb disagreement, spelling, etc.  Try to adhere to the KISS Principle.  Keep your sentences short and simple and divide your composition into paragraphs. 

positive rights table

Complete a 1- to 2-page table using the Positive Rights Table Template provided comparing your opinion of the rights listed below to a corresponding ethical theory:

  • The right to a higher education
  • The right to private phone conversations
  • The right to health care
  • The right of a presidential or government candidate to receive time on television

List 1 ethical challenge that could impact a U.S. company that wants to acquire a non-U.S.-based company.

Information system Assignment

Chapter 3 – study questions 1-8, Exercise 2, 4, & 5 (Information Systems for Business and Beyond) Submit the above homework in one document

Title Page

Chapter 3 – Complete the two essay assignments noted below: (Information Technology and Organizational Learning)

Review the strategic integration section.  Note what strategic integration is and how it ties to the implementation of technology within an organization.

Review the information technology roles and responsibilities section.  Note how IT is divided based on operations and why this is important to understand within an organization.

The above submission should be two -pages in length (one page for each question) and adhere to APA formatting standards.

**Remember the page length does not include the APA cover page or any references**

researchpaper _wk12_dsdba

 We have viewed how Blockchain has made a significant impact on businesses and industries.  Select one industry and highlight the advancements Blockchain has had on that single industry. 

 5 pages , APA format , 4 scholar references and No plagarism of any kind