Today’s Global Economy is very top-down driven with the government making all the decisions and regulations as it relates to doing business globally. What are some advantages and disadvantages to this approach? Is there another approach that might work better?
Timeline Assignment
Timeline AssignmentInstructions
- Do you have the two Dr. Evil E01 images downloaded to your computer? If not, please do this.
- Did you already download and install Autopsy on your workstation? If not, please do this. Also, don’t forget to watch the video on using Autopsy if you are not familiar with it. Note – the tool is very intuitive so you should not have problems with it.
- Ingest (load) the two E01 images into Autopsy by selecting File à Add Data Source. If you are not sure what is the data source– then select the Disk Image data source and you can browse to the E01 images.
- Autopsy will then process the images. This should take about 10-20 minutes.
- Now click on the Timeline button on top of the Autopsy GUI and then familiarize yourself with the environment before answering these questions for total of 50 points. This timeline functionality is extremely powerful so click everywhere. Check out the different options. Right click a file and see what options are existing. I think you will be able to immediately grasp the possibilities of how you can pivot to a very specific MINUTE. See sample screenshot.
Questions (100 points)
- What website was searched on 8-25-2004?
- What was search query used on that website on 8-25-2004. Please provide screenshots.
- What websites were visited on 8-27-2004?. Please provide screenshots.
- There was email activity on 07-27-1992. What was that email activity? Please provide screenshots.
- You want proof that Dr. Evil used Ghostware and you think it was done in August 2004. When exactly was this? Please provide screenshots.
- What software / driver is keys.text associated with? Please provide screenshots.
- Please send me a snapshot report.
Assignment
Check Attachment!!
cybersecurity
Scenario
Always Fresh allows external users, such as vendors and business partners, to access the Always Fresh Windows environment. You have noticed a marked increase in malware activity in the test environment that seems to originate from external users. After researching the likely source of new malware, you conclude that allowing external users to connect to your environment using compromised computers exposes Always Fresh to malware vulnerabilities.
After consulting with your manager, you are asked to create a policy that will ensure all external computers that connect to Always Fresh environment are malware free. You create the following policy:
“To protect the Always Fresh computing environment from the introduction of malware of any type from external sources, all external computers and devices must demonstrate that they are malware free prior to establishing a connection to any Always Fresh resource.”
Consider the following questions:
1. What does “malware free” mean?
2. How can a user demonstrate that their computer or device is malware free?
3. What are the steps necessary to establish a malware-free computer or device?
4. How should Always Fresh verify that a client computer or device is compliant?
Tasks
Create a malware protection procedure guide that includes steps for installing and running anti-malware software. Fill in the following details to develop your procedure guide:
1. Provide a list of approved anti-malware software solutions—include at least three leading antivirus and two anti-spyware products. You may include Microsoft products and third-party products. Instruct users to select one antivirus and one anti-spyware product and install them on their computer.
2. Describe the process of:
a. Ensuring anti-malware software and data is up to date. Mandate daily updates.
b. Running regular malware scans. Mandate that automatic scans occur whenever the computer is idle. If that setting is unavailable, mandate daily fast scans and biweekly complete scans.
3. Provide steps to follow any time malware is detected.
a. Immediate reaction—what to do with current work, leave the computer on or turn it off
b. Who to contact
c. What information to collect
The procedure guide may be used by company security professionals in the future. Hence, all steps listed should be clear and self-explanatory.
Required Resources
§ Internet access
§ Course textbook
Submission Requirements
§ Format: Microsoft Word (or compatible)
§ Font: Times New Roman, size 12, double-space
§ Citation Style: APA
§ Length: 2 to 4 pages
Hackers and ethics
My topic is about Hacker and Ethics
PowerShell scripting
Need assistance to Create Powershell script
main practical connection
Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course( Intro to Data Mining (ITS-632-M26) ) have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study( Intro to Data Mining (ITS-632-M26) ). Requirements:
- Provide a 500 word (or 2 pages double spaced) minimum reflection.
- Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
- Share a personal connection that identifies specific knowledge and theories from this course.
- Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
- You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
- Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).
discussion
- Evaluate the system engineering process from a design methods perspective and investigate Model-Based System Engineering (MBSE) used in your company.
- Examine the requirements for system engineering program planning in the system engineering management plan (SEMP)
Hacker
Compare and contrast two types of hackers and explain how each can benefit or hurt an organization. Discuss the attacks and defenses associated with these hackers. and Review the attack and defense suggestions 2 offered and offer a variation to their suggestion.
3 pages
1 page in APA 6th on code of ethics
1 page in APA 6th with NO PLAGIARISM with at least one scholarly (peer-reviewed) resource
Find an example of a code of ethics or acceptable use policy related to information technology and discuss three points that you think are important.