Topic: The volatile IP address in the IT sector & how forensics helped them detect

Gather all final project material:

  • final paper (minimum 5 references, A 500-700 word, double spaced paper, written in APA format, showing sources)
  • power point (PPT)
  • Bibliography (An annotated bibliography of at least five sources. The annotations must be at least five sentences long)

DESCRIPTION:

In order to avoid precise identification and commit serious crimes in other nations where they cannot be punished, cybercriminals always use secure software to stay anonymous, which is proxy servers that mask their location and channel their messages via several countries. They use a mix of conventional investigative and complex digital forensics techniques in addition to these collaborations.

Also as A IT professional I see a lot of hackers attempting to intrude external data into my businesses, my interest in taking this project has struck my mind to include digital forensics that can identify and solve this problem.

Digital forensics plays a significant role in preventing cyber – crime in the areas of information networks. In fact, digital forensics is a particular branch of forensic science dealing with the examination and restoration of substances retrieved from electronic device forms, and these devices are linked to crime in most cases. In order to ensure the reliability of network equipment for computer networks, digital forensics plays a significant role. A study based by a start-up company located in Luton has been demonstrated in this field. It was successfully assessed from the case that digital forensics is very helpful in digital crime investigation (Seigfried-Spellar, K. C, 2017). Digital forensics has played a significant role in the resolution of numerous criminal cases, including murder, abuse, smuggling, and many more. Digital forensics has also been analyzed from an overall viewpoint as relevant for law enforcement and plays a significant role in resolving various crimes.

Reference

Holt, T. J., Bossler, A. M., & Seigfried-Spellar, K. C. (2017). Cybercrime and digital forensics: An introduction. Routledge.

Intro to Data Mining

You will need to ensure to use proper APA citations with any content that is not your own work.

Question 1

Suppose that you are employed as a data mining consultant for an Internet search engine company. Describe how data mining can help the company by giving specific examples of how techniques, such as clustering, classification, association rule mining, and anomaly detection can be applied.

Question 2

Identify at least two advantages and two disadvantages of using color to visually represent information.

Question 3

Consider the XOR problem where there are four training points: (1, 1, −),(1, 0, +),(0, 1, +),(0, 0, −). Transform the data into the following feature space:

Φ = (1, √ 2×1, √ 2×2, √ 2x1x2, x2 1, x2 2).

Find the maximum margin linear decision boundary in the transformed space.

Question 4

Consider the following set of candidate 3-itemsets: {1, 2, 3}, {1, 2, 6}, {1, 3, 4}, {2, 3, 4}, {2, 4, 5}, {3, 4, 6}, {4, 5, 6}

Construct a hash tree for the above candidate 3-itemsets. Assume the tree uses a hash function where all odd-numbered items are hashed to the left child of a node, while the even-numbered items are hashed to the right child. A candidate k-itemset is inserted into the tree by hashing on each successive item in the candidate and then following the appropriate branch of the tree according to the hash value. Once a leaf node is reached, the candidate is inserted based on one of the following conditions:

Condition 1: If the depth of the leaf node is equal to k (the root is assumed to be at depth 0), then the candidate is inserted regardless of the number of itemsets already stored at the node.

Condition 2: If the depth of the leaf node is less than k, then the candidate can be inserted as long as the number of itemsets stored at the node is less than maxsize. Assume maxsize = 2 for this question.

Condition 3: If the depth of the leaf node is less than k and the number of itemsets stored at the node is equal to maxsize, then the leaf node is converted into an internal node. New leaf nodes are created as children of the old leaf node. Candidate itemsets previously stored in the old leaf node are distributed to the children based on their hash values. The new candidate is also hashed to its appropriate leaf node.

How many leaf nodes are there in the candidate hash tree? How many internal nodes are there?

Consider a transaction that contains the following items: {1, 2, 3, 5, 6}. Using the hash tree constructed in part (a), which leaf nodes will be checked against the transaction? What are the candidate 3-itemsets contained in the transaction?

Question 5

Consider a group of documents that has been selected from a much larger set of diverse documents so that the selected documents are as dissimilar from one another as possible. If we consider documents that are not highly related (connected, similar) to one another as being anomalous, then all of the documents that we have selected might be classified as anomalies. Is it possible for a data set to consist only of anomalous objects or is this an abuse of the terminology?

discussion

 

Discussion

R is a language and environment for statistical computing and graphics. It is a GNU project which is similar to the S language and environment which was developed at Bell Laboratories (formerly AT&T, now Lucent Technologies) by John Chambers and colleagues. R can be considered as a different implementation of S. There are some important differences, but much code written for S runs unaltered under R.

Reply post

Why are statistical programming languages important to data scientists? What are some advantages and disadvantages the R programming language has over the other main statistical programming languages (i.e. Python, SAS, SQL)?

When replying to a classmate, offer your opinion on what they posted comparing the R programming language to the other statistical programming languages. Using at least 3 – 5 sentences, explain why you agreed or disagreed with their evaluation of the different statistical programming languages.

Writing assignment

Project Title: Creating Company E-mail and WIFI / Internet Use Policies Attached you will find a description of your final project assignment. Please complete this and upload your work by clicking the BLUE LINK ABOVE (as a WORD DOCUMENT).

unit 8

 

Directions

Part I: Complete Your Original Response to the Main Topic

The requirement of this activity for this module is for every student to solve one programming problem from the book, and post the source code in the discussion board for further analysis and discussion. In order to have more diversity of problems from the chapter, each student will select a problem number using the process described below.

Selecting the Problem Number to Use

Consider the following rules in calculating the problem number to solve:

  • Divide your student ID by 20, consider the remainder and increment it by 1. The result you obtain represents the number of the programming exercise you will solve for this online discussion.

Posting the Solution

Once you determine the problem number, complete the solution to that problem. When you are satisfied with your solution, click the Reply link below to post in this discussion forum.

  • In the first line of your post, your should add the chapter number, problem number, and page number of your problem.
  • Your posting must include the source code along with explanations of how you have solved the problem.  

Coding

PROGRAM REQUIREMENTS

In this assignment you will implement three basic graph algorithms: breadth-first search, depth-

first traversal, and topological sort. We are not providing any code template, but you must follow 

the input and output formats specified below. Read carefully what you are required to do to 

receive full credit and attempt the extra credit tasks only after you are done with the 

requirements. 

First, implement a graph data structure using adjacency lists. Your code must read graphs of 

arbitrary size from a file (as long as there is enough memory available, your code must work: do 

not assume a maximum number of vertices). The input format is as follows: one line per vertex, 

the first element is the vertex id and the following numbers are the adjacent vertices. The input 

file will always be a bunch of integers and white space. For example,

1 3 4 

3 1 4 

4 1 3

is a graph with four vertices, and three undirected edges: (1, 3), (1,4) and (3,4). 

Then, implement three algorithms: 

• Breadth-first search. Calculate the distance from vertex 1 to all other vertices using BFS. 

Then, print all the vertices sorted by distance from vertex 1. Note that if the graph is 

unconnected, some nodes may have distance ∞.

• Depth-first traversal. Calculate discovery and finish times using DFT. Then, print all the vertices sorted by discovery time.

Topological sort. Print the topological sort of the graph. 

A few comments:

• Look carefully at the sample input and output files and follow the same format. 

• When you look through vertices, visit them in increasing order.

Extra credit: 

• Use BFS to determine whether a graph is connected. The input is a graph, and the output 

is yes or no.

• Implement an algorithm to detect whether a graph has a cycle. The input is a graph, and 

the output is yes or no.

• Design and implement an algorithm that takes as its input a graph ???? = (????, ????) and a 

permutation of ????, and outputs whether the permutation of ???? is a topological sort of ????.

Your algorithm must run in Θ(|????| + |????|).

2 Separate Discussion

  

Subject: Emerging Technologies

Textbook: MSTM-5023-M2A Emerging Technologies

Two Separate Assessments. Each 300+ words with Reference

Discussion 1

Chapter 9 Exercise.

There continues to be a disparity between the advertising dollars spent on reaching TV viewers and Internet users versus the amount of time that is spent interacting with each medium. A large degree of Google’s success is attributable to taking advantage of this large gap. Research to determine (a) TV advertising dollars and Internet advertising dollars spent, and (b) the amount of time spent watching TV versus using the Internet. How has Google taken advantage of this disparity? What other major societal trends are forecasted that will continue to shift advertising dollars to new media, and why?

Your response should be at least 300 words, single-spaced. Provide references in APA format if necessary. The title page is not needed.

Discussion 2 

Chapter 15. Exercise:

An acquirer looks for a company with a good profit margin, a proven history, and a fair price. Choose an industry of interest and list five criteria for selecting candidates for acquisition.

Research and response to the above question in no less than 300 words, single spaced. Provide references in APA format. A title page is not needed.

Two Separate Assisments. Each 300+ words with Reference

Assignment on Cloud computing.

Minimum 900 words total excluding apa formatting:

1. Describe how cloud based data storage works

2. List the pros and cons of cloud based data storage

3. List the pros and cons of cloud based database

Clash of titan methodologies

  1. Select one of the three scenarios studied for assignment 7.1. 
  2. How would the situation and conclusions change if that scenario were approach from one of the two other methodological approaches than it was.

450 words with intext references and 3 main references

Situation: participating honestly in a conversation in a difficult art succeeding is the sign of a skilful creator of actors knowledge

Methodology approach: Actor’s or System’s approach