Art Creation & Reflection – Photography/Cinema

Art Creation & Reflection – Photography/Cinema

Assignment

Required Resources

Read/review the following resources for this activity:

  • Textbook: Chapter 11, 12
  • Lesson
  • Minimum of 1 scholarly source (in addition to the textbook)

Instructions

This week you will use your readings from the past week as a point of departure to create your own artistic production and a reflection paper.

Part 1: Art Creation
Select a photograph or film art piece to use as a point of inspiration. Create an art piece of photography or cinematography inspired by your selected art piece. Videos should be no longer than 5 minutes and must be in MP4 format.

Note: If your art creation requires a separate file submission, please submit in the Art Creation Submission (Recordings) area following this assignment.

Part 2: Reflection
Write a reflection about the relationship between your art production and the inspiration piece. Include the following in the reflection paper:

  • Introduction
  • Inspiration Piece
    • Include the inspiration photograph or cinematography within the document. Use a link in the case of cinematography.
    • Record the title, artist/director, year, and place of origin.
    • Briefly explain the background of the inspiration piece.
  • Your Art Piece
    • Include your original photograph within the document. If you selected cinematography, submit as a separate file in the Art Creation Submission (Recordings) area following this assignment.
    • Provide a title.
    • Explain the background of your piece.
  • Connection
    • Explain the thematic connection between the two pieces.
    • How are they similar and different?
    • Are they the same medium? How does the medium impact what the viewer experiences?
    • For photography, how do the formal elements of design compare to one another?

Original Artwork Requirements

  • Methods: photo or video
  • No computer-generated pieces

Writing Requirements (APA format)

  • Length: 1.5-2 pages (not including title page, images, or references page)
  • 1-inch margins
  • Double spaced
  • 12-point Times New Roman font
  • Title page
  • References page (minimum of 1 scholarly source)

Phone Browsers

People are using their mobile phone browsers more and more every day to find information about businesses, make product decisions and purchases, and even determine the quality of a business based on what they can find online. With the proliferation of mobile browsers, people need to be able to access your website and, at a minimum, be able to browse it smoothly to find the information they need. Taking it a step further and providing an optimal mobile user interface (UI), or specialized mobile content, can provide a great experience and enhance the reputation of an organization.

  • Discuss pros/cons of an adaptive website.
  • Discuss pros/cons of a dedicated website.
  • Identify and discuss best approaches to website development for mobile applications.

2 Pages with References. Please do not use online references. 

Text Book – Title: Mobile App Development for iOS and Android  by Authors: Jakob Iversen and Michael Eierman.

Cloud Computing

 Chapter 14 topics:

  • Define and describe the mobile web.
  • Describe the different generations of cell phones.
  • Describe how smartphones differ from ordinary cell phones.
  • Select a mobile or traditional website that interests you. Describe the site in terms of the ecosystem that makes up the site’s user experience.

 Chapter 15 topics:

  • Define corporate governance.
  • Discuss the events that led up to the need for increased corporate governance.
  • Define business strategy. List five possible business strategies.
  • Discuss the purpose of the Capability Maturity Model.

Practical connection assignment: 

• Company Overview:  The section should include the company name, the industry they are in and a general overview of the organization.
• Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.
• Solution:  Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation.  What was the result of implementing Cloud Computing?  Did they meet their objectives for fall short?
• Conclusion:  Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages.  There should be at least three scholarly sources listed on the reference page.  Each source should be cited in the body of the paper to give credit where due.  Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches.  The body of the paper should be 3 – 5 pages in length.  The Title and Reference pages do not count towards the page count requirements.

Assignment 2 Web forensics

 

Your task for this week is to write a three-page report on an open source web browser forensics tool.

Here are some sites where you can find open source tools to consider for your paper.  Some of these sites have multiple open source tools.

Be sure to explain how the tool works and list its advantages and disadvantages.

NetAnalysis

https://netanalysis.software.informer.com/1.5/

Internet Evidence Finder

https://www.forensicfocus.com/reviews/internet-evidence-finder-ief/?gclid=CjwKCAiAm-2BBhANEiwAe7eyFCMP3NSCoPk8rHLkC4_0n2Ku9NCFMjDCWDAOLHSDqlvdxaj-Ups7KhoCNpYQAvD_BwE

Magnet Forensics

https://www.fullversionforever.com/ief-internet-evidence-finder-free-download/

https://www.magnetforensics.com/free-trial/?magnet-product=Magnet%20AXIOM&option=free-trial&utm_source=Google&utm_medium=Search&utm_campaign=2021_AXIOM&gclid=CjwKCAiAm-2BBhANEiwAe7eyFGPHKMcm8N8iiH_orR6LpCSPdfDUpmlU8UvspYQcXoxO6BpRuXjj_hoCD04QAvD_BwE

H-11 Digital Forensics

               https://h11dfs.com/the-best-open-source-digital-forensic-tools/

IG Wk13

2 full pages – 550 words 

From our weekly chapter reading, digital preservation can be defined as the long-term, error-free storage of digital information, with means for retrieval and interpretation, for the entire time span the information is required to be retained.  Though this assessment holds true to the authors, business organizations continue to face significant challenges in meeting their LTDP needs, especially those organizations whose primary mission is to preserve and provide access to permanent records.

Looking at your identified industry for your paper, what considerations would have to be made in developing a long-term archival plan for a company within that industry?

 

Reading Assignments

Reading Assignments Textbook(ATTACHED):  Chapter 17 – Long-Term Digital Preservation

Park, S. H., Zhang, Y., & Keister, L. A. (2020). Governance Innovations in Emerging Markets. Academy of Management Perspectives, 34(2), 226–239. https://doi.org/10.5465/amp.2017.0177

P. C. Franks, “Government use of cloud-based long term digital preservation as a service: An exploratory study,” 2015 Digital Heritage, Granada, 2015, pp. 371-374, https://doi.org/10.1109/DigitalHeritage.2015.7419526.

Pike, E. R. (2020). Defending Data: Toward Ethical Protections and Comprehensive Data Governance. Emory Law Journal, 69(4), 687–743.

Zwarich, N., & Park, E. G. (2017). Toward E-Mail Governance: Policies and Practices in the Government of Canada. Canadian Journal of Information & Library Sciences, 41(3), 169–185 

Software management -4 Dis

 

 Write about a project that you accomplished. Explain what needed to be done, how it got done, who worked on the project, how long did it take, how much it cost, and what were the risks involved in the project.  (Review Chapter 1).

Enterprise Risk managemenT week11

 The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week. 

Culminating Assignment Concept Paper: Red Team Assessment Strategies in Cybersecurity

 

Culminating Assignment

Concept Paper:   Red Team Assessment Strategies in Cybersecurity

Directions:

1.  Read the scenario, access the resources, and review the rubric below to help you understand the assignment.  The final paper will be due in Week 7.  You should begin working on the assignment right away, and you will share your progress in Week 6.  

2.  Write a paper that follows the listed parameters, addresses the important concepts, and includes the required sections:

Parameters:  

  • Ranges from 4 – 5 double-spaced pages and use IEEE formatting style. 
  • Uses Times New Roman font (size 12), with one-inch margins on all sides.
  • Includes at least three (3) quality resources to support your ideas.  You may use the resources provided and/or others of your choosing.  They must be cited appropriately.

Important Concepts:

  • Compare and contrast red teaming versus penetration testing based on the presented case.
  • Describe the approach to red team assessment.
  • Discuss how different types of organizations are utilizing red teaming.

Required Sections:

  • Title 
  • Introduction:  Clear description of the topic, including a summary of what is already known about that topic.
  • Body:  
    • Address important concepts.  
    • What evidence do you have to support your topic?  
  • Conclusion:  Why is it important to study this topic? Why is this worth investigating further?
  • Reference Page:  IEEE style

3.  Your paper should enable a casual reader to understand this topic and its importance.  Please make sure the following outcomes are addressed within your paper:

  • Explain the common tools and tactics used in red teaming.
  • Use technology and information resources to research the evolution of red team assessment techniques.

Due:  In week 7 with the specific date posted in Blackboard.  You will be directed to complete and share parts of this assignment in Week 6.  

Scenario:  A large multinational fintech wanted to conduct a Red Team Assessment to evaluate its ability to detect and respond to a real-world cybersecurity attack.

The read team started their assessment by sending a phishing email that persuaded the victim to log in to a fake portal hosted on a server to obtain valid credentials. While a small number of users clicked on the malicious link sent in the email, none of them submitted their credentials. This could be attributed to the regular social engineering tests and security awareness training delivered to staff.

After the failed phishing campaign, the team went back to the drawing board to come up with a new plan of attack.  Reviewing the company’s Twitter account, the team discovered that they host a monthly community event at one of their buildings. The team registered for the event to deploy a purpose-built device into their internal network. The device will allow the team to gain remote access to the network using either an independent wireless connection or a 3G/4G mobile connection.

Two members of the red team attended the event. They managed to slip away from the main event to see if there were any unlocked offices or conference rooms. Once a room had been found. One team member acted as a lookout while the other plugged the device and checked that he could reach it from his mobile phone. Shortly afterward the testers left the event and joined the rest of the team in a coffee shop down the road.  Once connected to the network, the team started mapping the internal network and gathering additional information. Over the next couple of days, the team captured several password hashes, which were achieved by exploiting a weakness in Windows’ broadcast protocols. However, users appeared to be using strong complex passwords and it was not possible to crack the hashes to recover clear-text passwords. The team then decided to relay a captured hash belonging to a user and use it to log in into a workstation where they had local administrative privileges. This allowed them to extract the clear-text password of the currently logged-in users from memory.

Resources to help you complete this assignment:

Rubric:

Points: 

Assignment: Red Team Assessment Strategies in Cybersecurity

Criteria

Needs Improvement

Below 60-70 F

Fair

70-79 C

Proficient

80-89 B

Exemplary

90-100 A

1. Compare and contrast red teaming versus penetration testing based on the presented case. Met outcomes.

Weight: 25%

Did not submit or incompletely compared and contrasted red teaming versus penetration testing based on the presented case.  Did not meet outcomes.

Partially compared and contrasted red teaming versus penetration testing based on the presented case.  Partially met outcomes.

Satisfactorily compared and contrasted red teaming versus penetration testing based on the presented case.  Met outcomes.

Thoroughly compared and contrasted red teaming versus penetration testing based on the presented case. Exceeded outcomes.

2. Describe the approach to red team assessment.

Weight: 30%

Did not submit or incompletely described the approach to red team assessment.

Partially described the approach to red team assessment.

Satisfactorily described the approach to red team assessment.

Thoroughly described the approach to red team assessment.

3. Discuss how different types of organizations are utilizing red teaming.

Weight: 30%

Did not submit or incompletely discussed how different types of organizations are utilizing red teaming.

Partially discussed how different types of organizations are utilizing red teaming.

Satisfactorily discussed how different types of organizations are utilizing red teaming.

Thoroughly discussed how different types of organizations are utilizing red teaming.

5. 3 References

Weight: 5%

No references were provided.

Does not meet the required number of references; some or all references poor quality choices.

Meets the number of required references; all references high-quality choices.

Exceeds the number of required references; all references high-quality choices.

6. Clarity, writing mechanics,  formatting.

Weight: 10%

More than 6 errors present

5-6 errors present

3-4 errors present

0-2 errors present