BSWFP

Final Project Topic Name:  Data Center Security

In 100 words (1)

1.  Include a short paragraph describing your project (Data Center Security ) and how you intend to research it. 

In 200 words (2)

2. Brief abstract describing final project (Data Center Security ).

3. 500-600 words, double spaced, written in APA format, showing sources and a bibliography
Please include the following:  

 What is (Data Center Security ).

Advantages/Disadvantages

Challenges one might face

Conclusion:

References:

Web Development Help

I have a web project in HTML & CSS but It has some issues which I need some help in fixing. The project is complete so it is just a minor fix. 

server virtualization and cloud computing homework help

  

Paper based on server virtualization and cloud computing. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

• Describe the organization’s environment, and evaluate its preparedness for virtualization.

• Explain Microsoft (or another product) licensing for virtualized environments.

• Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.

• Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.

Your paper should meet the following requirements:

• Be approximately 5 pages in length (1200-1800 words), not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

At least 5 references 

executive summaries

 1 page discussion

  1. Search the internet for sample executive summaries.
  2. From your research, describe 3 items that need to be in an executive summary and your reasons why.
  3. Include in your report the ways that you would ensure that your executive summary would get buy-in from the key stakeholders of this project.

Digital Forensics

 

Mr. Fahad Naseem, and Mr. Ronald Joseph FBI Agent.

 Mr. Fahad Naseem was arrested in connection with the kidnapping and killing of journalist Daniel Pearl and admitted sending ransom e-mails using his Laptop. The laptop and handwritten versions of the e-mails were found in his possession. 

  • On the Contrary-A, Naseem later retracted his confession and the defense attorney asserted that logs from Mr. Naseem’s Internet Service Provider (ISP) indicated that Mr. Naseem’s account was not active and connected to the Internet at the time the e-mails were sent. 
  • On the Contrary-B

Naseem’s defense attorney claimed that the compromised Laptop produced in court had a different serial number from the one that was initially recorded in police records; hence, documentation relating to the computer and evidence in the case was inconsistent. 

  • On the Contrary-C

Documentation presented in court indicated that the Federal Bureau of Investigation (FBI) agent, Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002. In contrast, documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002, and the court denied the appeal, including the following explanation.

  • On the Contrary-D

The lead investigator Mr. Shaikh Naeem recovered the Laptop labeled (connection No. 66) retrieved from the accused, Mr. Fahad Naseem, on November 2, 2002, was provided to Mr. Ronald Joseph, FBI agent, who examined, conducted the forensic investigation, formulated his report, and conveyed evidence to the Consulate General of the United States of America. 

  • The report’s content asserted that the Black Soft Computer came with “Proworld” written on the exterior of the Laptop, and upon opening the case, a Dell Latitude Cpi laptop was discovered. 
  • The Laptop was identified in the report produced by this witness to be of model PPL with Serial number ZH942 located inside the Laptop as an IBM travel star hard driver [sic], confirmed to have been removed from the Laptop.
  • During examination, the label on the hard drive was identified as a system with 4.3 GB storage capacity, and serial number OKLA24302 on the outside of the laptop.  
  • After examining Exhibits, Mushernama who recovered the Laptop asserted that without a doubt whatever, the compromised Laptop is the same equipment that was seized from the accused, Mr. Fahad Naseem on November 2, 2002. 
  • On the Contrary-E

The forensic investigation report confirmed that the same Laptop was recovered on April 2, 2002 by the defense team. Availability of the Laptop at the American Consulate on April 2, 2002 is not unnatural and impossible because Marianne Pearl filed a complaint with the police on April 2, 2002, hours when the case was in the at the hands of the Investigating Agency.

Questions 1. As an Aspirant and Hopeful Digital Forensic Investigator:

1:1. Submit concluding evidence to the public and the court substantiating that Mr. Fahad Naseem is guilty of kidnapping and killing Mr. Daniel Pearl, the journalist.

1:2. Submit concluding evidence to the public and the court demonstrating that Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002, whereas documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002.

1:3. Submit concluding evidence to the public and the court attesting that Mr. Naseem’s Laptop’s availability at the American Consulate on April 2, 2002, is unnatural and unrealistic occurrences. 

security and data loss prevention

Please answers all of the following questions in APA format:

  • List and describe the top ten tips that can be utilized to improve your computer security 
  • Industrial espionage has become a fact of life in the business world. Discuss several ways in which industrial espionage can be accomplished, and ways to combat it. 
  • There are various parts of an undercover investigation, and in order for the assignment to be successful an investigator needs to develop stages. List and describe the stages an individual may use as part of an undercover operation. 
  • In 2002, the U.S. Office of Domestic Preparedness, along with Michigan State University’s School of Criminal Justice prepared a report, Critical Incident Protocol-A public and Private Partnership. The critical incident protocol they laid out has five objectives. Discuss these objectives. 
  • In a 2005 report, Assessing and Managing the Terrorism Threat, it defined an effective management approach to the issue. Outline the suggested approach.
  •  APA formatting, 
  • Have 4 to 5 references
  • Paper should be a minimum of 4 pages in length
  • Turn in paper to SMARTHINKING.com before submitting final paper
  • Turn in a final paper and the paper with the SMARTHINKING.com tutor comments.
  • Databases and APA template located in the Student Resource Center to complete the assignment.

Disaster recovery-3

Topic: Assume that you have been tasked by your employer to develop an incident response plan. Create a list of stakeholders for the IR planning committee. For each type of stakeholder, provide the reasons for inclusion and the unique aspects or vision that you believe each of these stakeholders will bring to the committee.[500 words]

RM-RESEARCH-10

 RESEARCH:

Need this research paper by Saturday USA time. (5 days from now).

4 pages full excluding references and cover page. Follow APA 7 format and citations.

TOPIC:

Your task this week is to write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Week 11: Cyber Law assignment

 Week 11: California Privacy Rights Act Assignment

 On November 3, 2020, California’s Privacy Rights Act is on the ballot. As of the time this assignment is being written, we do not know whether it will pass or not. Please write a 250 word essay on what the Act contains, and if it passed the ballot or not. Please tell why it passed or did not pass.

Minimum 250 words. Add References in APA format.