Digital Certificates and Encrypted Messages

 

You have recently been hired as a Tier 1 cybersecurity specialist working on the Network Administration Team at HU Investment Firm.

During the course of your work week, you are often called upon to present technical information to non-technical people in your Firm.

This week assignment has 2 parts, a presentation and an additional step-by-step guide for the incoming tier 1 support staff.

Digital Certificate Presentation 

  • Create a slide presentation on Digital Certificates with a minimum of 12 slides. 
    • Use screenshots or graphics when appropriate, minimum of 2
  • Define digital certificates and explain how they are used
  • Describe the reasons for using digital certificates and why they are important to HU Investment Firm
  • Demonstrate how to create certificates and apply them to messages using MS Outlook
  • Provide at least 2 references on your last slide in APA format

Instructional Guide

  • Write a help document including step-by-step instructions for the Support Team’s Knowledge Base wiki
    • Include at least 2 screenshots as references
  • Describe the process that encrypted MS Outlook message go through and explain why
  • Explain the problems that  can arise from encryption and how to troubleshoot for those problems
  • Include at least 2 external resources that technicians can use for more information  

wk3dis_531

 Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics. 

Assignment (500 WORDS MINIMUM)

  

Web Analytics – Labeling Visitors, Sessions, Pages, and Web Server Log Files vs. Java Scripting

Assignment Instructions:

· Define the importance of custom variables, attached chapter 9 (Advanced Web Metrics with Google Analytics by Brian Clifton) explains the importance of each variable, and how each is restricted to one particular scope level.

· Explain in as much detail as you can regarding the scope of each of these levels; Visitor Level, Session Level and Page Level.

· Compare and contrast web server log files vs. JavaScript tagging

· What would you recommend in terms of the variables you would set for an ecommerce site? Would this recommendation be dependent on the type of business or any other factors?

Please submit a Word Doc with your answers, in 500 words or more, and use references in support of your answers.

Module 9 Assignment – CyberLaw

Please run a Google search of the term, “United States Supreme Court Carpenter v. United States 2018.” 

Please write an essay of 500 words, summarizing the court’s decision. 

1. Please add references in APA format

2.  use Correct legal citation  

3.  accurately summarizes the effects of this Court decision 

Week 1 Disscussion 12/3/2020

 Discuss how you believe computer technology has changed your field of study of Psychology and future profession as a Psychologist. Evaluate the role that computer technology has on your own personal career. 

Paper

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences

Policy, Legal, Ethics and Cmplc

 

Your Research Project on the surveillance state consists of two parts:

1 a Powerpoint presentation consisting of at least 12 slides not including title and references.

2. 750 word research  paper with at least 3 sources. There should be no lists. Write in essay format not outline format. Include a meaningful title.

Do not double space.

You must include at least 3 quotes from your sources enclosing the copied words in quotation marks and cited in-line. 

There should be no lists – bulleted, numbered or otherwise. 

Write in essay format with coherent paragraphs not in outline format. Distribute your quotes among the paragraphs.

Do your own work. Zero points will be awarded if you copy other’s work and do not cite your source or you use word replacement software. 

The topic must be appropriate for graduate level. Find a topic that we covered in the course and dig deeper or find something that will help you in your work or in a subject area of interest related to the course topic. Use academically appropriate resources which you can find in the Danforth Library Research Databases.

Submit all documents at on time. Do not zip or otherwise compress them. Do not use .rar. Use .doc and .ppt extensions