PLEC Week 8

 Answer each these questions in a paragraph with at least 3-4 sentences: Include the question and number your responses accordingly. Provide a citation for each answer.  

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools  compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

Chat application demo (using Angular and spring)

 

I want to demo chat web application with technology Angular 8 or above (frontend) and Spring (backend) with mysql databse

1. user can signup and login and chat with each other (one to one chat for example facebook)

2. web page design is not needed.

4. all chat should be store in database. if user have some chat and when it logout then after login all previous chat should be present in chat history.

3. it should be work in windows 10.

Networking

 1) Name the three essential elements of a basic structured cabling network? How are they installed and what are the components that are involved with them?   (300 words)

Need to 2 Replies discussion for same question for 150 words too.

5s week 8 assignment PL

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. With all the stories about millions and millions of bytes of personal data having been exposed, why is their still any faith at all in the Internet?

2. How has the term hacking changed meaning over the years?

3. What is the most dangerous hacker tool?

4. From the news: How were NSA’s hacker tools compromised? 

5. What was the vulnerability in the Target Breach?

6. What do you think of hactivism?

7. How did Stuxnet work? 

8. What was the Arpanet?

9. Deep brain stimulation is a treatment for Parkinson’s disease. Medical devices such as these are now becoming accessible through the web. Consider the dangers (threat surface)?

10. What is the Red Team?

include references. do not copy paste.

legal process in Digital Forensics

 For this assignment, please discuss the following:

  • How does the Fourth Amendment relate to the legal process of digital forensics?
  • How do exigent circumstances apply to the legal process?
  • Explain UFED, its purposes, and one of the primary reasons law enforcement will use this service.
  • Explain CDMA and GSM, their significance as it relates to the cellular network.

Network Assignment

 

Assignment Details

Part 1

For many thousands of years, the primary method of communication was for people to physically gather together to share ideas and discuss concerns. In today’s technology driven world, huge numbers of people gather together without ever directly seeing each other. This is done through social media. Social media is known to produce great changes on how individuals and communities communicate and perceive each other.

Complete the following in a minimum 1-page response:

  1. Briefly, define social media such as Google+®, Twitter®, Pinterest®, LinkedIn®, and Facebook® and how it differs from traditional media. In addition, how has social media impacted the workplace?
  2. Given the increased prevalence of social media, how has your personal perspective of multiculturalism and diversity been impacted?
  3. Select an organization you belong to. How do you think your perspective has impacted that organization? How do you feel that others in the organization have been impacted?

Part 2

As an information technology professional, you are faced with opposing perspectives on ethical issues in your daily work. Research opposing perspectives on ethical issues faced in the Information Technology field as it pertains to networking. An example might be the difference in perspectives of utilizing biometrics for authentication.

Take into consideration the opposing perspectives of different technologies, as it relates to ethics and complete the following in a minimum 1-page essay.

  1. Identify the opposing perspective you have chosen.
  2. Explain the ethical implications that are inherent with both sides of the issue.
  3. Given the ethical implications on both sides of the issue, evaluate the ethical implications on both sides.
  4. Provide your perspective on how you might apply the issue in a work situation.

500 Words Minimum Assignment

In this assignment, you are going to visit the Google Web Analytics Demo site. Please follow these steps:

  1. Be sure to have a Google email account this makes it much easier. Create free Google email account here. ( https://accounts.google.com/signup/v2/webcreateaccount?service=mail&continue=https%3A%2F%2Fmail.google.com%2Fmail%2F%3Fpc%3Dtopnav-about-en&flowName=GlifWebSignIn&flowEntry=SignUp )
  2. Go to the link below and read the simple instructions to access the Google Analytics Demo site at this link. You will see the link named “ACCESS DEMO ACCOUNT”      (https://support.google.com/analytics/answer/6367342?hl=en )
  3. Review the document above and go to the demo account “ACCESS DEMO ACCOUNT”:
  4. You will be asked for your Google email account information to access the demo.
  5. Once in the Google Analytics Demo, review the many areas and explore, check out the blue boxes when you first enter, they will be helpful. Now explore the many data metrics.
  6. Create a summary Word Document of your experience in the setup, how easy or hard was it to you. Take at least three (3) screenshots of the Google Analytics pages to attach to the summary.

Please submit a Word Doc with your answers, in 500 words or more, and use references in support of your answers.