Please following the requirement which is in the PDF file(cs261 assignment instruction), and give the same output as the PDF file shows.
History of Cryptography
In the initial milestone writing assignment, you will evaluate the history of cryptography from its origins. Analyze how cryptography was used and describe how it grew within history. The writing assignment requires a minimum of two written pages to evaluate the history. You must use a minimum of three scholarly articles to complete the assignment. The assignment must be properly APA formatted with a separate title and reference page
Data mining
Discuss the major issues in classification model overfitting. Give some examples to illustrate your points.
Wireless Network……
First Section
In a 350- to 500-word essay, address the 4 questions.
Case study: A publicly traded home builder has hired you to install a new wireless network. The company currently has a wireless network that is a few years old. The problem with the current wireless network is that it was built using proprietary standards instead of 802.11. This current wireless network does not have an upgrade path to 802.11.
On the new wireless network, the corporate office wants a system that allows construction workers to enter progress reports into the system in order to stay up-to-date with all the different community building sites. Each community has a model home that will need Wi-Fi to connect back to the corporate office in order to enter these reports. The construction workers will be using iPads to enter the information. The company currently has 32 sites across the country that will need Wi-Fi.
In each of these sites, there will be two sales employees that will need to have Wireless IP Phones so that customers can get in touch with them easily. The sales employees will also have laptops, as well as two sales kiosks that allow customers to browse the different options to choose from for their new home build. The kiosks will connect to the Internet, and when the customer chooses their options, the information will be entered into a database. Once the customer chooses the options they want, the sales person will pull up the report on their laptops to print for the construction workers.
Directions: Looking at the current wireless network and what the home builder would like to accomplish with the new network, explain to the company why the current wireless network will have to be replaced before you can begin the project. The Chief Information Officer (CIO) has asked you to come up with a plan to implement this new wireless network. Include in your report:
1. A brief description of the problem with the current wireless network
2. The benefits of global/industry standards vs. proprietary standards
3. What types of problems exist with mixed standards
4. A plan to correct the problems with the current wireless network
__________________________________________________________________________________
Second section….
1. PROJECT SCOPE –
Project scope
2. FEASIBILITY STUDY –
Objectives of the Network:
1. Secure Service – What is the main objective of this network?
2. Integration and Updates –What needs to be done to get the current network up-to-date?
3. Versatile Information Process –What does the network need to be able to do? For example, applications, devices, computers, laptops, etc.
4. Collaboration – How will the network be used to collaborate with other offices? Other users in a different location?
5. Scalability – How will the network be able to adapt to change?
Intended Users –What type of mobility requirements, client device requirements, and signal coverage requirements are needed?
Design Assumptions – State the assumptions for unknown factors that could affect the project.
Equipment Needs and Proposed Budget
Final Research Paper – ERM
Risk management is one of the most important components in empowering an organization to achieve its ultimate vision. With proper risk management culture and knowledge, team members will be “speaking” the same language, and they will leverage common analytical abilities to identify and mitigate potential risks as well as exploit opportunities in a timely fashion. In order to consolidate efforts, the existence of an integrated framework is crucial. This is why an ERM is necessary to the fulfillment of any organization’s goals and objectives.
In your final research project for the course, your task is to write a 7-10 page paper discussing the following concepts:
- Introduction
- Why should an organization Implement an ERM application?
- What are some key challenges and solutions to Implementing an ERM?
- What is Important for an effective ERM?
- Discuss at least one real organization that has been effective with implementing an ERM framework or /application.
- Conclusion, final thoughts for future research
- Recommendation
Your paper should meet the following requirements:
- Be approximately seven to ten pages in length, not including the required cover page and reference page.
- Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
- Support your answers with the readings from the course, the course textbook, and at least ten scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find supplemental resources.
- Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
BSWFP
Final Project Topic Name: Data Center Security
In 100 words (1)
1. Include a short paragraph describing your project (Data Center Security ) and how you intend to research it.
In 200 words (2)
2. Brief abstract describing final project (Data Center Security ).
3. 500-600 words, double spaced, written in APA format, showing sources and a bibliography
Please include the following:
What is (Data Center Security ).
Advantages/Disadvantages
Challenges one might face
Conclusion:
References:
Final Project
This is an individual project
Select a company below.
1. using the attached template, prepare a Disaster Recovery Plan. Instructions are on the first page of the Disaster Recovery template.
2. prepare a diagram of your disaster recovery solution.
List of Companies:
- Time Warner
- Aetna
- American Express
- Nike
- Macys
- Toys R Us
- Computershare
- DirectTV
- UPS
- Johnson & Johnson
- Fidelity Investments
Post your disaster recovery plan and diagram of your disaster recovery solution in PDF’s in the Discussion Board.
Grading – 25 Points broken down as follows:
– 20 Points – Contents of Disaster Recovery Plan
– 5 Points – Disaster Recovery Solution Diagram
Digital Forensics
Digital forensics involves processing data from many different types of devices, ranging from desktops to laptops, tablets to smartphones, servers to cloud storage, and even devices embedded in automobiles and aircraft. In this project, you will focus on the architecture and imaging of desktop and laptop computers. You will be working in a virtual machine (VM) to image and verify the contents of the following:
- a USB stick
- the random access memory (RAM) and swap space of a live computer
- a networked computer hard drive
There are seven steps in this project. In the first step, you will review a technical manual containing information about where data of forensic value is typically found inside digital devices. The next two steps will guide you through the process of imaging a USB stick with both Linux and Windows tools. The next step will pose several questions that frequently come up in cases similar to this scenario. In the next step, you will be back to collecting forensic evidence; this time you will be imaging the RAM (memory) and swap space of a live, running computer. In the next step, you will image a computer’s hard drive over the network. In the final step, you will compile all lab notes and reports into one comprehensive report. The final assignment in this project is a forensic imaging lab report that can be presented in a court of law.
Before you can begin imaging the USB drive provided by your supervisor, you need to review your technical manual in order to prepare a memo to give to your company’s legal team. Are you ready to get started?
S1
Before you have a chance to begin the imaging process, your supervisor calls to tell you that the organization’s legal team has been asking questions about types, sources, and collection of digital information. Team members have also asked about file formats. Your supervisor asks you to prepare a brief explanatory memo. You use the department’s technical manual to compose your memo on finding valuable forensic information and storing digital evidence. You also review image verification using hashing, an important component of digital forensics.
For the first step in this project, prepare a memo (one to two pages in length following this format) in plain language that summarizes where valuable digital forensic information resides in the device, as well as collection and storage options. The devices to be addressed are USB sticks, RAM and swap space, and operating system hard disks. You will need to research and cite reference sources for each answer contained your memo (e.g., NIST) For each electronic media device described, include a short description of the following:
- identify the digital media device examined
- types of data that can be found there
- reasons why the data has potential value to an investigation in general, and for this case in particular
- list the possible digital evidence storage formats (raw, E01 (ewf), and AFF) and describe the advantages and disadvantages of each format, and
- how digital forensic images are collected (local and remote, memory and disk) and verified.
Your memo will be included in the final forensic imaging lab report.
In the first step in this project, you reviewed technical information and imaging procedures and briefed your legal team on digital forensic basics. Now, it’s time to move forward with the investigation.
The USB stick may contain intellectual property that you can use to prove the suspect’s guilt, or at least establish intent. Security personnel recovered the stick from the suspect’s desk drawer the night before. You take possession of the stick, recording the physical exchange on the chain-of-custody document prepared by the security officers.
Your team’s policy is, when practical, to use multiple tools when conducting digital forensic investigations, so you decide to image the USB stick using both Linux and Windows tools.
To get started, review the lab instructions in the box below, as well as methods of acquisition. Then go to the virtual lab to set up your evidence drive and proceed to enable write protection, sterilize the target media, perform a static acquisition of Linux data, and verify the USB stick on the sterilized media using Linux tools in preparation for the report and notes requested by your supervisor.
Windows Tools
After imaging the USB drive with Linux in the previous step, your next step is to image the USB drive again, this time using Windows tools. Review the lab instructions in the box below, and then go to the virtual lab. When you complete the activity, review your lab notes and report for accuracy and completeness; they will be included in your final forensic imaging lab report in the final step.
n previous steps, you imaged the USB drive using Linux and Windows tools. In this step, you will create a legal memorandum that responds to pointed questions from your organization’s legal team. The legal team has been involved in cybercrime cases before, but team members want to make sure they are prepared for possible legal challenges. They have requested very specific information about imaging procedures based upon your review of reference sources in the field.
Research sources on digital forensics imaging and mounting procedures before writing your response. Then review Set Up Your Evidence Drive, Hash Functions, Imaging Programs, and Image Verification With Hashing as needed.
Questions from the legal team:
1. Assuming that this is a criminal case that will be heard in a court of law, which hashing algorithm will you use and why?
2. What if the hash of your original does not match your forensic copy? What kinds of issues could that create? What could cause this situation?
3. What if your OS automatically mounts your flash drive prior to creating your forensic duplicate? What kinds of problems could that create?
4. How will you be able to prove that your OS did not automatically mount your flash drive and change its contents prior to the creation of the forensic copy?
The legal team would like you to respond in the form of a brief memo (one to two pages following this format) written in plain, simple English. The memo will be included as an attachment to your final forensic imaging lab report in the final step, so review it carefully for accuracy and completeness.
You are hoping that you will be able to access the suspect’s local computer next.
n the previous step, you addressed the concerns of your company’s legal team. While you were doing so, the suspect’s afternoon training session started, so now you can move to the next stage of your investigation.
Your organization’s IT department backs up the hard drives of HQ computers on a regular basis, so you are interested only in the suspect’s RAM (referred to as volatile data storage) and swap space. The RAM and swap space may reveal programs used to hide or transmit intellectual property, in addition to the intellectual property itself (past or current). You have a four-hour window to acquire the RAM and swap space of his live computer. When you arrive at the suspect’s office, the computer is running, but locked. Fortunately, the company IT department has provided you with the administrator password, so you log on to the system. Review the lab instructions in the box below, and then go to the virtual lab. Follow the steps required to acquire and analyze the RAM and swap space and perform imaging of a live computer.
In the previous step, you acquired and analyzed the RAM and swap space from the suspect’s live, local computer. In this step, you perform a similar analysis on his networked, off-site computer. Take a minute to consider forensic evidence in networks.
Your supervisor confirms that the suspect’s remote office is closed for the weekend, so you are free to image his computer via the network to store the digital evidence. The remote computer is locked, but the company IT department has provided an administrator password for your investigation. Using your forensic workstation at headquarters, you log on to the remote system.
If the image were going to pass unencrypted over an untrusted network (such as the internet), you’d would want to conduct the transfer over SSH, but since you’re on the company network and connecting to the remote office via a VPN, you can use the dd command to transfer a copy of the remote hard drive to your local workstation using the netcat tool.
Review the lab instructions in the box below, and then go to the virtual lab. Follow the steps required to image the computer over the network.
Provide any information related to the issue that you are experiencing and attach any screenshot that you may be able to produce related to the issue.
Review your lab notes and report carefully for accuracy and completeness; they will be included in your final forensic imaging lab report.
Phew! You have conducted an exhaustive investigation of all the suspect’s computer devices in this possible “insider cyber-crime.” In the process, you have written up lab notes and four reports, as well as providing responses to questions from your legal team. The last step in the investigative process is to combine the information that you’ve gathered into a single forensic report that can be presented in a court of law.
Step 7
Now that you’ve completed the necessary acquisition and imaging tasks, you’re ready to compile all your reports and lab notes into a single forensic imaging lab report that you will submit to your supervisor. Your supervisor reminds you that your report may be presented in a court case, so it needs to meet legal requirements. The report should include the following sections:
1. One- to two-page memo addressing the types, sources, collection of digital information, as well as file formats
2. Imaging of a USB drive using Linux tools (lab notes, report)
3. Imaging of a USB drive using Windows tools (lab notes, report)
4. One- to two-page memo responding to questions about imaging procedures
5. RAM and swap acquisition—live, local computer (lab notes, report)
6. Forensic imaging over a network (lab notes, report)
Submit your forensic imaging lab report to your supervisor (instructor) for evaluation
Assignment
(1). EDITORIAL EXTRACTION
Select any visualisation/infographic and looking at any individual chart included. Try to extract and write down in language terms what this chart shows across the angle, the framing, and (where relevant) the focus?
Does it feel that the definition you have arrived at is consistent with the aims/claims of the chart as it is published? In other words does the chart show and include what you think it is actually supposed to be doing or is there a disconnect?
Assignment Link: http://book.visualisingdata.com/chapter/chapter5
Managerial Economics D-1
using the link below write the discussion 350 words
Read the attached opinion piece where the author indicates that the Great Recession of 2009 was not caused by the Free Market, but was instead caused by US Government policies.
Locate two JOURNAL articles that discuss this topic further. You need to focus on the Abstract, Introduction, Results, and Conclusion. For our purposes, you are not expected to fully understand the Data and Methodology.
2) 2 replies each 150 words