For the final project, you will be conducting a forensics investigation using one of the following items: A smartphone A network (ideally, a wireless network)

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

IT PROJECT

 Conduct Internet research and identify an established process improvement strategy. Explain the strategy and describe what you feel are its biggest strengths.(75words)

 Describe what you think are the two most important aspects of leading a successful IT project. Provide examples to justify your selections. (75words) 

ns-d-12

explain the difference between an access control list (ACL) that is used in routers to block traffic and firewalls.  What similarities do they share? 250 words

Digital Forensics

 

Instructions 

Please watch this video: https://youtu.be/ctij93rBmsM which is an hour long video on anti-forensics.

Instructions

Now that you have watched the video – please complete this assignment. 

1. What did you learn?
2. Did you learn anything that surprised you such as “I didn’t know I could use this technique to try to hide data?!”
3. Please list at least four different ways that an bad actor may try to obfuscate their tracks.
4. Once you have identified four different ways that a bad actor may try to evade scrutiny, please identify how you might be able to uncover those techniques.

Name Lengths

Introduction

Do people with long last names also tend to have long first names? In this assignment, you will analyze data to investigate this question, construct and analyze a linear regression model based on the relationship between the length of the first and last names in the dataset that you collected, and draw insights into the phenomenon within the limitations of the model. You will count the alphabet letters used to write the name of 100 individuals from this dataset   arabic_first_last_name _1_.csv

e  .

Part I: Exploratory Analysis

a) Download the arabic_first_last_name.csv file which contains Arabic first and last name columns.

b) Construct a dot plot of the last name lengths and comment on any interesting features of this plot.

c) Construct a dot plot of the first name lengths and comment on any interesting features. Describe how the distribution of first name lengths compares to that of last name lengths.

Part II: Regression Model

a) Construct a scatterplot of x and y.

b) Explain if this is the plot consistent with the theory that people with long last names tend to also have long first names?

c) What is the value of the correlation coefficient for this data set?

Part III: Reporting

a) Discuss if your first and last name are included in the context of the model.

b) Discuss the limitations of the data, the model, and the analysis.

c) Write a 100-200 words meaningful paragraph summarizing the findings from the analysis.

Once you have developed responses to the task prompts, you will organize them in a professional 3-5-page report, not including the title and reference pages, that summarizes your actions, calculations, and findings. You will upload a zipped file that includes your response and all supporting files.

Use Saudi Electronic University academic writing standards and APA style guidelines, citing at least two references in support of your work, in addition to your text and assigned readings.

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide.

Case paper: Best practices for operational excellence

 

Case Paper: Best practices for operational excellence

Continuing your work with your organization, for week 5 research best practices for operational excellence based on the course readings. In your paper for this week include the following:

– Identify and justify 2 specific recommendations you have for the organization
– Provide an outline for a change management plan to implement your 2 recommendations
– Discuss your plan for working with the people who will be involved or impacted by your recommendations
– Conclude with your thoughts on the expected benefits or outcomes after implementing your recommended changes

Write your responses to these questions in a 2-3 page APA-formatted paper (not including the cover page or references page). Use the APA template provided in the course. Use unique in-text headings for each question–do not re-state the questions as the headings. Support your responses with citations in your paper that match the references provided.

The Future of Your Personal Data - Privacy vs Monetization | Stuart Lacey | TEDxBermuda

all assignments for professor foley

1.Prepare a one to two page paper on some of the various types of data mining and statistical software and the features thereof.  Please double space your paper and cite your sources.

2.  After observing the TED Talk on Big Data, prepare a one page paper on the TED Talk

https://www.ted.com/talks/tricia_wang_the_human_insights_missing_from_big_data/reading-list?rss

3.  Prepare a one page paper on Data Mining Methods. You may research the internet for more information. Please double space your paper and cite your sources. 

4.  

After viewing the following Ted Talk on Big Data and privacy, prepare a one page paper on this Ted Talk topic “The Future of your Personal Data”.

The Future of Your Personal Data – Privacy vs Monetization | Stuart Lacey | TEDxBermuda (Links to an external site.)The Future of Your Personal Data - Privacy vs Monetization | Stuart Lacey | TEDxBermuda 

What are some steps that you can do to protect yourself online?

Please double space your paper and cite your sources.