Research Paper

** RESEARCH PAPER** 

please address the following in a properly formatted research paper:

1. Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.

2. Are there other frameworks mentioned has been discussed in the article that might be more effective?

3. Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

Be approximately five to six pages in length, not including the required cover page and reference page.

Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

**DISCUSSION POST**

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Mini Paper

 My Topic is a:- a comparison of authentication mechanisms

 Research topic.  You must  include at least four primary, peer-reviewed sources in your  bibliography.  Additional sources of varying standards can also be used.   However, these four must be specifically cited.  An un-cited source  should not appear in your bibliography.

A primary source is the original material. If you are directly  quoting the words of an author, that is usually a primary source.  However, if you are quoting a paraphrase from an author (known because  the author is making a citation), then you should find the original  document they are paraphrasing and then quote or paraphrase the  original.

  • Peer-reviewed means that experts in the field have vetted the ideas,  methods, and conclusions to determine its suitability for publication.

  • Use the library databases, Google Scholar, and Wikipedia to locate  these primary sources (i.e. see what Wikipedia cites, or what papers are  listed as often cited in Google Scholar). Ensure that they are from  peer reviewed sources (such as ACM, IEEE, etc.) and not from trade  publications (such as eWeek, PC Magazine, etc.) Wikipedia is not a  primary source — you can use it, but it will not count as one of the  four peer reviewed primary sources.

  • Write a 4 to 6 page research paper on your topic.  The page count  excludes any figures, tables, pictures, title page, front-matter,  back-matter, appendices, or bibliographic references. In other words,  there should be 4 to 6 pages of double-spaced prose.

  • Proofread your assignment carefully.  Improper English grammar,  sentence structure, punctuation, or spelling will result in significant  point deductions.

Discussion 1

IT innovation has been a key component of organizational operations and strategy. For years, many business leaders did not see IT as vital to business, which resulted in missed opportunities to grow, and in some cases, sustain the business. Evaluate the role of IT solutions in an organization with which you are familiar. Explain how the business is using IT as a solution for the organization’s operations and strategy. Distinguish among hardware components, operating systems, programming languages, programs, and applications being used by the organization. Identify the solutions already in place and any areas where the business is not using IT. Describe the perceived impact the lack of IT has on the business both internally and externally.  Provide examples from any of the required resources to support your answers.

Your post must be a minimum of 250 words.

Discussion

1. Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.

2. What are the privacy issues with data mining? Do you think they are substantiated?

AmazonEcho

  

Instructions

1. Please read these two articles: 

· Using forensics against a fitbit device to solve a murder:  https://www.cbsnews.com/news/the-fitbit-alibi-21st-century-technology-used-to-help-solve-wisconsin-moms-murder/

· How Amazon Echo could be forensically analyzed! https://www.theverge.com/2017/1/6/14189384/amazon-echo-murder-evidence-surveillance-data

2. Then go around in your residence / dwelling (home, apartment, condo, etc) and be creative.

3.  Identify at least five appliances or devices that you THINK could be forensically analyzed and then identify how this might be useful in an investigation. Note – do not count your computer or mobile device. Those are obvious!

4. I expect at least one paragraph answer for each device. 

Why did I assign this? 

The goal is to have you start THINKING about how any device, that is capable of holding electronic data (and transmitting to the Internet) could be useful in a particular investigation! 

Cyber Law – assignment 2

 Using a Microsoft Word document, please define:

1. Constitutions

2. Statutes

3. Case Law

4. Administrative Regulations

5. Stare Decisis

6. Precedent

add one reference at least. 

Disuccsion

The control of processes and threads are of deep concern by developers of all operating systems capable of handling “real or emulated” simultaneous computer activity. Threads are typically created by processes (initially invoked by the user or another process). Discuss how an operating system manages these processes and threads, how they are instantiated and discarded, how the activity is controlled, along with the respective advantages and disadvantages of both process and thread. Do not discuss MS Windows OS. Instead you may choose from Linux, UNIX, ROS, z/OS, or VM.

short answer

 Week 2 Discussion 

Four code block styles can be created using PHP: standard PHP script delimiter, the script element, short PHP script delimiters, and ASP-style script delimiters. Explain the purpose of each style and the main benefits each would provide for developing a website. Be sure to respond to at least one of your classmates’ posts.