Digital Forensics Tools and Tech – New England

 You have been assigned to investigate whether or not an employee at a local hospital has been accessing patient records and setting information to online pharmacies. It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation. 

300 words, APA format

IT 206 Design and analysis of algorithm

Read chapter 10 sections 10.1-10.5.

Solve this problem:

Write an algorithm for the situation below for 1 soldier. Then rewrite it for 2 soldiers.

Ferrying soldiers
A detachment of n soldiers must cross a wide and deep river with no bridge in sight. They notice two 12-year-old boys playing in a rowboat by the shore. The boat is so tiny, however, that it can only hold two boys or one soldier. How can the soldiers get across the river and leave the boys in joint possession of the boat? How many times need the boat pass from shore to shore?

book details 

Title: Data Structures and Algorithms Made Easy: Data Structures and Algorithmic Puzzles

Author: Narasimha Karumanchi

Publication info: Career Monk Publications, 5THEdition, 2016

ISBNs: 819324527X. 978-8193245279

numerical computation project

 This is simple project about numerical computation of Computer Science. It is going to be not heavy work. Read the Project.pdf and do the work and fill the Word Template and Lab report files what I attached.  

Develop a plan for an imagined “online payment company” to comply with Sarbanes-Oxley law and implement the Payment Card Industry Data Security Standard (PCI DSS)

Instructions

In order to complete assignment #3 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #3). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 4

1. Should dissatisfied consumers have the right to establish gripe sties that use the trademark of the offending company in the domain name? How likely is it that consumers will be confused as to the “origin, sponsorship, or approval” of the gripe site by the offending company? Whether or not you think that confusion is likely, should a gripe site be considered to tarnish the targeted company’s trademark and thereby violate the Federal Trademark Dilution Act? Why or why not?

Chapter 5

2. It is common practice for recipients of email messages to sometimes forward those messages to others. Does such forwarding constitute copyright infringement? In your answer, be sure to specify which, if any, of the exclusive rights may have been violated by the act of forwarding and whether the doctrine of fair use applies. What remedies, if any, might a successful plaintiff be able to obtain

3. Read the following laws and standards:

Sarbanes-Oxley and

PCI DSS .

Develop a plan for an imagined “online payment company” to comply with Sarbanes-Oxley law and implement the Payment Card Industry Data Security Standard (PCI DSS)

Web Technologies, Use of Social Media in Business

Overview:

Congratulations! You have been hired as the IT manager at the local hospital; the job

you applied for in the previous unit. Part of your 60-90-day plan is preparing a presentation for the executive board.

Instructions:

Your IT director asked you to prepare a 5-6-page PowerPoint presentation where you

explain the following concepts:

1) The functionality of various web technologies: HTML, XML, XHTML, CSS, etc.

And how they could be used to improve the Hospital’s website?

2) Your hospital is currently ranked as second in your region, how can better use of

social media as part of the hospital’s web strategies improve its position?

3) Part of the low-ranking came from a breach on the hospital’s website.

a. How can we remediate this from happening again?

b. Why are we not safe and immune from online annoyances such as spam and adware?

c. How can we further secure our system from malware?

Requirements:

• This assignment is a PowerPoint presentation consisting of 5-6 slides, using APA

formatting and citations.

• Include two references.

Be sure to read the criteria by which your work will be evaluated before you write

and again after you write.

computer science

if you know about computer science and programming and python text me I need someone good can help me with my class and you should know English please 

Ethical Hacking_Week15

Securing IoT Devices: What are the Challenges?

Security practitioners suggest that key IoT security steps include:

1) Make people aware that there is a threat to security;

2) Design a technical solution to reduce security vulnerabilities;

3) Align the legal and regulatory frameworks; and

4) Develop a workforce with the skills to handle IoT security.

Final Assignment – Project Plan (Deliverables):

Address each of the FOUR IoT security steps listed above in terms of IoT devices.

Explain in detail, in a step-by-step guide, how to make people more aware of the problems associated with the use of IoT devices.

InfoTech Import in Strat Plan (ITS-831)

This post consists of 2 assignments:

Assignment 1: 

Research paper: Blockchain

Word count: 2+ pages

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

Be approximately 2-3 pages in length, not including the required cover page and reference page.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.

Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Reading resources:

Tarzey, B. (2019). Inside Blockchain and Its Various Applications. Computer Weekly, 16-20. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=f5h&AN=138681123&site=eds-live

Carson, B., Romanelli, G., Walsh, P., & Zhumaev, A. (2018). Blockchain beyond the hype: What is the strategic business value? McKinsey Quarterly, (4), 118–127. Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=buh&AN=133693412&site=eds-live

Textbook: Managing and Using Information Systems, Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta, John Wiley & Sons

———————————————–

Assignment 2: 

Reflection: Practical Connection Activity

Word count: 2+ pages

It is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Provide a reflection of at least 2 pages double spaced of how the knowledge, skills, or theories of this course have been applied or could be applied, in a practical manner to your current work environment. Share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 2 pages double spaced minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. 

You should not provide an overview of the assignments assigned in the course. The assignment asks that you reflect on how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Textbook: Managing and Using Information Systems, Keri E. Pearlson, Carol S. Saunders, Dennis F. Galletta, John Wiley & Sons

————–

Note for both the assignments: Please provide the 2 assignments in separate documents. plagiarism check required, APA format.