Research topic

 Topic- Journal of Systems and Software 

This is a continuing assignment; you will be using this drop box until you and your faculty mentor approve your topic. 

In a 200-word document, describe your topic. Identify research in the area any models/theories developed in the area. Have you identified a cite problem/gap in this body of knowledge?

Are you considering doing a qualitative, quantitative, mixed method, project, etc., study, identify a possibly population to gather data from.

If you are a CPT student, please include the following as well:
Have you been issued CPT or are currently on CPT? If so what is your CPT code?

If you have a CPT code then:
Post your job description.Upload an official job description on company letterhead. Please copy/paste your current job responsibilities identify how your proposed topic in your discipline relates to the program goals and core courses. 

  • Once your mentor has approved your topic, you will use the below form to add all the components and submit to the school.

For the final project, you will be conducting a forensics investigation using one of the following items: A smartphone A network (ideally, a wireless network)

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

Module 2 Assignment

 

Module 2 Assignment

Due: Sunday, November 1st, 2020 by 11:00 pm EST

For this assignment, complete Chapter 1 – Introduction based on the instructions provided. 

INSTRUCTIONS:

This section requires that you complete all sections of Chapter 1 as specified in the CU Research Guide 

  •  Introduction 
    • Based on the literature sources, provide a background of the research problem to be explored. Elaborate on the impact of the problem and why your research is important to pursue. Indicate what the goal of the research will be
  • Problem statement
    • As per the CU guide
  • Relevance and significance 
    • As per the CU guide
  • Research questions
    • Add no more than 2 research questions as they relate to your research focus
  • Barriers and Issues
    • As per the CU guide

Structure  – CU Research Guide
Format – APA 

Database Assignment

 

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. 

Include an interesting meaningful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one  full sentence (no more, no less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. 

 

https://www.youtube.com/watch?v=h-9rHTLHJTY

https://www.youtube.com/watch?v=_jKylhJtPmI

https://www.youtube.com/watch?v=ciNHn38EyRc

Watch this video on the SQL Slammer worm

https://www.youtube.com/watch?v=Zbd4Vk9LO3g

Watch these videos on inference attacks

https://www.youtube.com/watch?v=Z9ZjtvcgOcs

https://www.youtube.com/watch?v=rrwUCOEJFJM

https://www.youtube.com/watch?v=dx-R_AFQsc0

World Views Make a Difference in Research

Select one “scenario” from each of the following procedures in Chapter 8: Analytic Procedures, Systems Procedures, and Actors Procedures. From a world view perspective, how are situations similar? How are they different?

450 words with in text and 3 references

IT345 week 4b discussion

 

Discussion 4 B

33 unread replies.33 replies.

Post a synopsis of how LimeWire worked, any copyright concerns, and what applications/sites/services have taken the place of LimeWire. Why have users adopted these new applications versus using applications like LimeWire?

Post your reply by Wednesday at midnight. Your response should be at least 350 words and appropriately cite your resources.

Journal Assignment

 Required Textbook: Tapscott, D., &Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin. 

Discussion:

 You installed and set up a Bitcoin Wallet last week(watch the above link). Do you plan to use your wallet to buy or sell merchandise or services? If so, what do you plan to do with your Bitcoin? If not, describe why you don’t want to use Bitcoin. Will your plans change in the future? 

Write 200 words paper.

Network Design

 

You work as a network consultant for West Consulting, a graphic design and printing company. West Consulting is growing in customer and sales volume and, therefore, is expanding its local campus in Houston, Texas, and adding a test location in China.

You are tasked with designing a network to support their growth and expansion plan and drafting a proposal. You will work on this project over the next five weeks. The first task is to confirm your understanding of the project and outline your high-level plan to approach the design.

Refer to the West Consulting Network Design Summary document, which lists the network requirements and configuration details.

Create a Customer Design Summary that includes the following: 

  • Project Summary
  • A description of the organization, the business environment, and the project purpose
  • Design Requirements
  • Desired functional network requirements, any technical constraints, and network performance or design goals
  • Existing High-Level Network Infrastructure Survey
  • Include logical topology diagrams (layer 3) and physical network diagrams of current infrastructure and routing.
  • Implementation Plan
  • Description of a high-level network upgrade plan based on Cisco’s network design lifecycle principles and an explanation of how your plan addresses West Consulting’s goals and strategies

Diagram your current network survey in Microsoft® Visio®.

Document the remainder of your Customer Design Summary as either a:

  • 2- to 3-page Microsoft® Word document
  • 10-slide Microsoft® PowerPoint® presentation with detailed speaker notes

For the final project, you will be conducting a forensics investigation using one of the following items: A smartphone A network (ideally, a wireless network)

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.