Need Assignment Help

  Go online and search for information that relates to ethical hacking  (white hat or gray hat hacking). Choose one of these areas explain why a  company might benefit from hiring someone to hack into their systems.  

  Your assignment should be 3-4 paragraphs in length.  (300-400 words)

I will expect APA formatting, citations, references

computer forensic

Discuss how email has impacted members of an organization’s expectation of privacy, communication, confidentiality and its use as evidence.  After reading the article titled “Your E-mail Trail: Where Ethics Meets Forensics”, discuss your findings 

Writing Requirements

  • The Essay must be at least 4-5 pages long.
  • Must have an introduction with a clear thesis statement, a body discussing the three main points and a conclusion
  • Conduct research to find relevant information using reliable sources to support your views.
  • (Use at least 2 academic books and 3 scholarly articles from a library database)
  • Use APA Style for in-text citations, and references
  • Turn in the Paper to SMARTHINKING.com before submitting your final paper.
  • Turn in a final paper and the paper with the SMARTHINKING.com tutor comments.

main discussion

 

Compare and contrast the different techniques for anomaly detection that were presented in Chapter 9.

Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects.

Informatics

O
From the moment you wake, you are in fact a data-generation machine. Each use of your phone, every transaction you make using a debit or credit card, even your entrance to your place of work, creates data. It begs the question: How much data do you generate each day? Many studies have been conducted on this, and the numbers are staggering: Estimates suggest that nearly 1 million bytes of data are generated every second for every person on earth.

CLOUD COM Practical Connection Assignment

 This project requires you to write at 3-5 page APA formatted research paper.  The focus is on an organization that you choose which has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage.  Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges.  The paper will be submitted during the last week of the course.    

Threat hunting– Research paper

Your team currently works as a research wing for a standard SOC (Security Operations Center).  The SOC keeps analytics on the current trends within the network.  Your team will be assigned a current issue that has been seen at the border of the network, trying to infiltrate the organizations network/systems.  Upon being assigned your item, it will be your job to go out and search OSINT (Open Source Intelligence) for more information on the attack being observed.  This could be a single port number, a series of attacks that has been identified, or an IP address to research and identify; your professor will assign this.  Your deliverable will be a 5 page APA style research report with your findings.  Discover current attacks being performed through this port, or current state of a known scanning suite.  Find sources, if possible, source code of attacks that are known to exploit this weakness and break down the code.  List known services on the affected ports that are associated and current attacks being performed on these services (list any CVE findings and briefly list and explain).  Look at SNORT rules that watch for these attacks and list that SID.

Finally, to wrap-up your research, present the current risk level associated with this threat.  Use the FAIR methodology to derive your threat assessment.  The attached FAIR PDF will walk you through your analysis.  To complete the FAIR document:

  • Step 1:  Asset at Risk will be the organization’s primary e-commerce web server.
  • Step 2:  You will provide this answer based on your research.
  • Step 3:  You will provide this answer based on your research; however, keep in mind how many times per day this is scanning the network, which will be given to your when you receive your topic.
  • Step 4:  You will provide this answer based on your research.
  • Step 5:  Assume the e-Commerce server is fully up-to-date and running the following base software:  Red Hat Linux, Apache, MariaDB, Drupal, PHP and is hardened based on base NIST recommendations for operations.
  • Step 6-7:  Calculate
  • Step 8:  Assume Moderate
  • Step 9:  Assume Moderate
  • Step 10:  Calculate and create this chart in excel with the appropriate item highlighted.  Include this chart in your paper and presentation.

The paper should be based on ” There is an uptick in port 8080 according to SANS Top 10. Why is that being targeted currently? “

Note: See the attachment

Assignment

Discussion #2: Discuss the financial benefits of chatbots. Discussion 

#4: Discuss the limitation of chatbots and how to overcome them.

#5 Discussion Examine Alexa’s skill in ordering drinks from Starbucks.

dis_dsdba13

 This week we explored the concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.