Writing assignment

In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs.

Interpersonal communication

For your essay interview/talk with someone you have a close relationship with (such as spouse, friend, sibling, student advisor, etc.) about how you communicate or are labeled. Use the Johari Window Diagram to diagram how you communicate with them. What would you both put in the four quadrants? What insights can you draw from this diagram and how does that person see you? Was this your reflected appraisal of yourself? How did things move from the Hidden quadrant to the Open quadrant, or from your Blind to Open quadrant, with that person?

cyberlaw

 

question 1) Please list and describe four types of Cyber crime. (300 words)


question 2) Please describe a case that has been in the news recently and describe what harm can be done by the unlawful intrusion into the computer of another.  (300 words)

Computer Forensics

 Assignment: Denial of Service ToolsLearning Objectives and OutcomesDifferentiate between tools that are used to create a denial of service (DoS) attack.Assignment Requirements
You have recently been hired by the DigiFirm Investigation Company. The company has clients nationwide. DigiFirm specializes in conducting computer forensics investigations as well as offering preventive services for clients to avoid digital crimes.You are now a member of a team of computer forensics experts who investigate and solve digital crimes and develop digital solutions for clients. A long-running client has just experienced a denial of service attack to its company website. This is serious because they can’t accept orders from their customers. DigiFirm needs you to find out more about what may have happened.Criminals use various tools to create a denial of service attack, including:

  • Tribe Flood Network
  • TFN2K
  • Trin00

For this assignment:

  1. Search the Internet for information about these three tools.
  2. Provide a description of each of the three tools.
  3. Describe the damage or impact of denial of service attacks.
  4. Summarize the efforts used and solutions found to combat these attacks.

Required Resources

  • Course textbook
  • Internet

Submission RequirementsFormat:Microsoft WordFont:Arial, Size 12, Double-SpaceCitation Style:Your school’s preferred style guideLength:1-2 pages
Self-Assessment Checklist

  • I researched the Tribe Flood Network, TFN2K, and Trin00 tools.
  • I described each of the three tools.
  • I described the damage or impact of denial of service attacks.
  • I summarized the efforts and solutions found to combat these attacks.

RS

or this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper should include the following sections each called out with a header.
• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.Requirements:The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements.