Question deleted
advance operating system exam
I need help with an exam. I can give around $50-80 if you can help me in the exam. I will be sharing all my notes and syllabus for you to be prepared.
Please read the syllabus and let me know if you can help?
Discuss 500 words or more discuss why Security as a Service is a good investment.
Discuss 500 words or more discuss why Security as a Service is a good investment.
Python-Assignment 1
Assignment 1
Download the program: parse-exp-value-001.py
The last part of rule 3)
has not been implemented. The project is to implement this rule.
I have not put a limit on file uploads, so you can submit a work in progress (WIP) and upload an improved version later, up till the due date.
Cyber Crime Final Project
Final Project
*****
This is an individual project or max, two team project in which you will conduct research on computer/digital forensics to learn more about associated underpinnings.
*****
The research you select should cover a forensics topic discussed or presented in the course. The topic you select is entirely up to you. I have included 6 examples below. You can select one of these (first come/first serve) or submit your own.
Post in the Discussion Forum your Forensics Project. No Duplicate Forensics Project allowed.
*****
Post your Forensics Project Name in the Discussion Forum with the names of your team-mates by Tuesday, October 6th.
*****
The deliverable is (1) a report (PowerPoint) submitted to me in Blackboard (Final Project dropbox on Week 12 & Discussion Board thread) by Nov 10, and (2) a ten minute presentation in class on deliverable including any demo in Nov 10. The report should include:
– Project Description
– Project Goal/Objectives
– Details of Work Performed
– Outcomes
– Conclusion
Grading Rubric – 25 Points towards Final Grade:
– 15 points for Complexity of Project (High = 3, Medium = 2, Low = 1)
– 5 points for Report
– 5 points for Presentation
TOPIC:
(10) Image File Tampering
Create an image file tampering using either a FaceSwap app, Photo Editing application to change the image file. Compare the hash, EXIF (Exchangeable Image File) metadata of all the files you have tampered from the original.
The project requires a brief paper and a power point document.
Paper needs to be no more than 2 pages.
Need both assignments by 4pm Eastern. 11/17
Paying $30 for both.
IT345 8
Pick a topic below and post your reply by Wednesday at midnight. Your response should be at least 400 words and appropriately cites your resources.
Topics:
- Do you believe we are too dependent on computers? Why or why not?
- In what ways are we safer due to new technologies?
- What are some recent examples of technology that has been created that is used to “save lives”?
Exam helo
C++ object oriented programming exam on 11/4/2020 at 2 pm EST
Access control Assignment 13
Discuss how and why companies use cryptography.
Length, 2 – 3 pages.
All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.
All paper are checked for plagiarism using SafeAssign, you can review your score.
Essay on Indigenous Literature
you can find the documents below please write an essay on the poem I am home again and also on the uses of indigenous literature please follow every instruction.
Word Count: 500 words Style and Format: The paper should be formatted according to MLA style guide (https://owl.purdue.edu/owl/research_and_citation/mla_style/mla_formatting_and_style_guide/m la_sample_paper.html ). Please type it in Times New Roman 12 font. Description Focusing on the poem “I am Home Again”, write an essay that highlights how Indigenous poetry play an important role in the construction of an aesthetic identity and culture for the Indigenous communities of Canada in the 21st century. Refer to the essay “The Uses of Indigenous Literature” to illustrate/ elaborate on the social function of Indigenous literature. Add a Works Cited page at the end of your essay and include both the poem and the essay in this list. Writing Hint In the introduction clearly identity the topos (of the poem). You should also have a clear thesis statement in the introduction that addresses the following question: Home does the poem “I’m Home Again” create an aesthetic identity for the Indigenous communities of Canada? This would be the working thesis which should be revised once the first draft has been prepared. The body paragraphs should highlight the specific devices (imagery/refrain/personification/symbolism/metaphor/analogy) addressed in the thesis. Ensure that your topic sentences are clear and specific and each paragraph is developed around the specific topic sentence. Dedicate one body paragraph to discuss how the poem can be read in light of the points discussed in the essay “The Uses of Indigenous Literature”. Your body paragraphs should use quotations from the poem. Try not to use quotations in the introduction or the conclusion.
Digital Forensics
Chief Executive Officer & Disgruntled Employee
Personnel within an organization re-organized his computer workstation to match the organization chief executive officer (CEO’s) internet protocol (IP) address, and fully utilized CEO IP address to send belligerent email messages, making messages to appear as if the CEO is the author of offensive messages.
In the process, the organization information technology security (ITS) team was notified and started monitoring all incoming and outgoing network traffic in an attempt to catch the perpetrator or the CEO, in action.
Without a shred of doubt, the CEO was the person of interest. Tactlessly, word of the investigation leaked out within the organization and the perpetrator withdraw from repeating offensive messages.
Thank goodness, information gathered from a router early in the investigation showed that the CEO’s IP address is provisionally associated with the Media Access Control (MAC) address of another computer workstation within the organization.
The discovered MAC address used to locate the antisocial computer workstation belongs to a one of the disgruntled active employees who is a member of software development department within the organization.
Persistent investigation reveals that the disgruntled employee’s computer workstation is involved in this unlawful and criminal operation.
Question-1
Absolutely, there was no external malefactor; then, which component of the social engineering attack (SEA) is involved in Chief Executive Officer & Disgruntled Employee operation?
Monitoring all incoming and outgoing network traffic to catch the perpetrator was not a smooth sailing operation without active involvement of information technology security (ITS) team.
Question-2
Do you agree that the digital forensic investigator must seek assistance from the organization ITS team to fully exonerate the CEO?
Question-3
Do you the hopeful digital forensic investigators accept that that digital forensic investigators must go through bi-annual training on TCP/IP and the Open System Interconnection (OSI) reference model to battle uncertainty in the crime scene?
If Yes, provide a comprehensive narrative to support your assertion.