Research paper and discussion

Part 1 : Research paper 

write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Part 2 : discussion ( 500 words including 2 responses ) 

 The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

Part 3 – discussion ( 500 words including 2 responses )

 discuss the appropriate application of Graph-Based Clustering Sparsification Techniques.  

FTK Imager to create a triage, or “custom content,” image

 

Using a Virtual Machine as your suspect device, you will use FTK Imager to create a triage, or “custom content,” image. Remember, your instructor will provide links for any evidence that you might need.

This is done so that you can get a look at some important artifacts without having to image and process an entire drive. It is useful because it can allow you to focus on devices that will give you the most evidence up front and put aside devices that may not be relevant to the case.

Instructions:

Your deliverable for this assignment will be a screen capture of FTK running your custom content image and a short report. Save the custom content image for use later in the course. To create your screen capture, follow these steps:

  1. If you have not already done so, download the latest version of FTK Imager.
  2. Create a USB drive with FTK Imager installed. This is a simple process of downloading FTK Imager and installing it on a connected USB drive (SEE TRIAGE USB CREATION INSTRUCTIONS IN LESSON 2.1). Or use FTK Imager Lite, which does not require installation.
  3. You should be running the provided suspect disk image .vhd file, which you can download from the class resources folder.
  4. Connect your FTK USB drive to the VMWare machine. This will also be your destination drive for the image you will create, so make sure it is big enough (32 to 64 GB).
  5. The first step in creating a triage image is to capture RAM! Be sure to do that first. Save the memdump.mem file to your USB.
  6. Use the VMWare virtual disk as your target, and create a “custom content image” using FTK.

Please write a forensic report which describes the steps you took to complete this assignment. Include the screen capture you took as proof. This does not have to be a narrative report, just a screencap and brief description of the relevant activity to document what you did.    

ET WK 7 Research paper

For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

Address the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately 5 (full)pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion 2 Info Tech in a global economy.

 Question: Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence.  Why or why not? 

  • Ask an interesting, thoughtful question pertaining to the topic.
  • No Plagiarism
  • References 
  • 400 words
  • APA Format