Final Project Outline Assignment

  

Final Project Outline Assignment Instructions

Overview

In order to begin the Final Project Outline, a wireless telecommunications technology must be selected that you are familiar with. 

Instructions

The objective of the Final Project Outline is to identify a 

Thesis Statement (or to investigate current problems in the field of wireless security).

It is recommended that the selected topic is familiar to you. The subject must also fall within the scope of the course. 

The topic proposal must consist of a written report which must be at a minimum of 5 pages. It must include a Statement of Technology that has been selected, as well as an outline of the project and the anticipated outcomes of the project. 

Note: Your assignment will be checked for originality via the Turnitin plagiarism tool.

1. Introduction – 1 page

2. Thesis Statement – a current problem in the field of wireless security . 2 pages

3. Statement of Technology – scope of the approach of research effort. 2 pages

4. Outline of the Project – Project Outcomes / anticipated outcomes of the project 5 pages

5. Conclusion – 1 page

6. References –

Digital Forensics – using computer architecture and networking – Locate one current news article that explains how investigators used the techniques to solve a crime.

3 paragraphs – Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).

Reference citation for your source of information.

IT345: Impact of IT Assi 1

 Required Assignment 1: Submit one to three-page summary of a journal article on a relevant topic of your choice. You are required to use IGU’s learning resources such as university’s digital library and online resources and confirm your use of these resources with your instructor. See “LRS” section above.

Assignment Week 4
1. Use Library Database in Syllabus to find an article related to Organizational Behavior:
2. Capture five major points of from the article and use APA to acknowledge this is captured or copied by (authors last name, date)
3. Write a short paragraph explaining why you think this article interest you as Introduction
4. Summary: Write your conclusion of what you have learned from the article
5. List the title and author of the article
6. Reference put the article reference in APA format 

Homework week 2

 In an essay format answer the following questions:In essay format answer the following questions:After reading the chapter by Capri (2015) on manual data collection.  Answer the following questions:

  1. What were the traditional methods of data collection in the transit system?
  2. Why are the traditional methods insufficient in satisfying the requirement of data collection?
  3. Give a synopsis of the case study and your thoughts regarding the requirements of the optimization and performance measurement requirements and the impact to expensive and labor-intensive nature.

In an APA7 formatted essay answer all questions above.  There should be headings to each of the questions above as well.  Ensure there are at least two-peer reviewed sources to support your work. The paper should be at least two pages of content (this does not include the cover page or reference page). 

Cloud Computing

What you learned about the topic (Cloud computing)

Why you selected the topic(Cloud computing)

How you will utilize the topic in the future(Cloud computing)

Assessment 2 Threat Model Report (MIS607 Assessment 2)

MIS607 Assessment 2 Threat Model Report

Course: MIS607 Cybersecurity

  

Task Summary

You are required write a 1500 words Threat modelling report in response to a case scenario by identifying the threat types and key factors involved. This assessment is intended to build your fundamental understanding of these key threats so that you will be able to respond/mitigate those factors in Assessment 3. In doing so, this assessment will formatively develop the knowledge required for you to complete Assessment 3 successfully. 

Context 

Security threat modelling, or threat modelling is a process of assessing and documenting a system’s security risks. Threat modelling is a repeatable process that helps you find and mitigate all of the threats to your products/services. It contributes to the risk management process because threats to software and infrastructure are risks to the user and environment deploying the software. As a professional, your role will require you to understand the most at-risk components and create awareness among the staff of such high-risk components and how to manage them. Having a working understanding of these concepts will enable you to uncover threats to the system before the system is committed to code.

Task Instructions

1. Carefully read the attached the case scenario to understand the concepts being discussed in the case.

2. Review your subject notes to establish the relevant area of investigation that applies to the case. Reread any relevant readings that have been recommended in the case area in modules. Plan how you will structure your ideas for the threat model report.

3. Draw a use DFDs (Data Flow Diagrams):

· Include processes, data stores, data flows

· Include trust boundaries (Add trust boundaries that intersect data flows)

· Iterate over processes, data stores, and see where they need to be broken down

· Enumerate assumptions, dependencies

· N umber everything (if manual)

· Determine the threat types that might impact your system

· STRIDE/Element: Identifying threats to the system.

· Understanding the threats (threat, property, definition)

4. The report should consist of the following structure:

A title page with subject code and n ame, assignment title, student’s n ame, student, and lecturer’s n ame.

The introduction that will also serve as your statement of purpose for the report. This means that you will tell the reader what you are going to cover in your report. You will need to inform the reader of:

a) Your area of research and its context

b) The key concepts of cybersecurity you will be addressing and why you are drawing the threat model

c) What the reader can expect to find in the body of the report

The body of the report) will need to respond to the specific requirements of the case study. It is advised that you use the case study to assist you in structuring the threat model report, drawing DFD and presenting the diagram by means of subheadings in the body of the report.

The conclusion will summarise any findings or recommendations that the report puts forward regarding the concepts covered in the report.

5. Format of the report

The report should use font Arial or Calibri 11 point, be line spaced at 1.5 for ease of reading, and have page n umbers on the bottom of each page. If diagrams or tables are used, due attention should be given to pagination to avoid loss of meaning and continuity by unnecessarily splitting information over two pages. Diagrams must carry the appropriate captioning.

6. Referencing

There are requirements for referencing this report using APA style for citing and referencing research. It is expected that you used 10 external references in the relevant subject area based on readings and further research.

7. You are strongly advised to read the rubric, which is an evaluation guide with criteria for grading the assignment. This will give you a clear picture of what a successful report looks like.

Submission Instructions

Submit Assessment 2 via the Assessment l ink in the main navigation menu in MIS607 Cybersecurity. The Learning Facilitator will provide feedback via the Grade Centre in the LMS portal.

Wk 2 Discussion

 Creating functions is the preferred method for developing reusable code. While many functions are user defined, most languages, including Python, have a wide variety of built-in functions that aid in development.   

  • Research the various built-in functions that are available in Python. Pick one that you feel can be important in your development efforts and explain the reasons you chose this function.
  • Describe how the function works, including the signature of the function, any parameters that are passed in, and values that will be returned from the function call.
  • Be sure to post a substantive response to one of your classmates’ posts and cite any resources used.

Research Proposal (Poster) & Research Literature Review (Report) – 4 pages each (Total 8 pages)

Description of Assessment Task and Purpose:

The summative assessment for this unit consists of two pieces of work:

  • a research project proposal presented in the form of a poster (50%), – 4 pages
  • a research literature review presented in the form of a report (50%). – 4 pages

Topic selected – Face recognition using ML/DL

Research Proposal (Poster) – Attached poster template for reference to follow and write 4 pages.

Research Literature Review (Report) – Write your own with some diagrams, 4 pages.

Include diagrams on both papers. 

I need plagiarism report to be attached for both papers. Strictly no plagiarism, if I found something I will dispute your work.