Cyber Crime Final Project

Final Project

*****

This is an individual project or max, two team project in which you will conduct research on computer/digital forensics to learn more about associated underpinnings.

*****

The research you select should cover a forensics topic discussed or presented in the course. The topic you select is entirely up to you. I have included 6 examples below.  You can select one of these (first come/first serve) or submit your own.

Post in the Discussion Forum your Forensics Project. No Duplicate Forensics Project allowed.

*****

Post your Forensics Project Name in the Discussion Forum with the names of your team-mates by Tuesday, October 6th.

*****

The deliverable is (1) a report (PowerPoint) submitted to me in Blackboard (Final Project dropbox on Week 12 & Discussion Board thread) by Nov 10, and (2) a ten minute presentation in class on deliverable including any demo in Nov 10. The report should include:

– Project Description

– Project Goal/Objectives

– Details of Work Performed

– Outcomes

– Conclusion

Grading Rubric – 25 Points towards Final Grade:

– 15    points for Complexity of Project (High = 3, Medium = 2, Low = 1)

– 5    points for Report

– 5    points for Presentation

TOPIC:

(10) Image File Tampering

Create an image file tampering using either a FaceSwap app, Photo Editing application to change the image file. Compare the hash, EXIF (Exchangeable Image File) metadata of all the files you have tampered from the original.

The project requires a brief paper and a power point document. 

Paper needs to be no more than 2 pages.

Need both assignments by 4pm Eastern. 11/17
Paying $30 for both. 

Digital Marketing Strategies 2020 and Beyond: https://www.youtube.com/watch?v=bGQG_-OG6fs

 

Watch the following videos on Digital Marketing:

Digital Marketing Strategies 2020 and Beyond: https://www.youtube.com/watch?v=bGQG_-OG6fs

Marketing Technology: https://www.youtube.com/watch?v=Q8yGCS0q0dk

After watching the videos, provide a video reflection paper that addresses the following. 

1) What are 3 key aspects of digital marketing in the future the videos highlighted as essential to know?

2) What key digital marketing technique or strategy do you believe is the most interesting and why?

3) What is the overall impact the videos suggest marketing technology has to be able to provide competitive advantage for a company?

4) What are the key fundamentals of marketing technology the video prescribes that all businesses should understand?

Paper should be 4-5 pages, double spaced, in Times New Roman, 12pt font, double spaced. Minimum of video references mentioned. Title page and references page required, but does not count towards minimum

OWASP

Learning About OWASP

Visit the OWASP website. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP. 

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. For your first written assignment, you have unlimited times to retry your assignment.

Attach your WORD doc and then hit SUBMT.

Cloud Computing and Digital Forensics

1.) In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Use at least three sources. Use the  Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. Write in essay format not in bulleted, numbered or other list format. 

2.) Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness. Write a short paper, 200-300 words.

AI week11 DB

Hello,

i need this paper by 11/05 afternoon.

Strictly No plagiarism please use your own words.

What are some of the characteristics and operations of some of the malicious software that exists today?
Your post should be at least 350 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Term paper

please  read the instructions thoroughly.

My paper topic is:

Ethical Uses of Cryptology in Computers and Information Technology 

Information Security and Risk Management

 

1.Discuss why a computer incident response team (CIRT) plan is needed, and its purpose.

2.Why are the roles and responsibilities important to be listed and kept updated for a CIRT plan.

3.Connect the dots: Discuss your understanding of the CIRT incident  handling procedures, the role policies play, and the importance of  communication escalation procedures.

4.What are some best practices for implementing a CIRT plan? Do some personal research to answer this questions.

PLEC Week 10

 Answer each these questions in a paragraph with at least 3-4 sentences: Include the question and number your responses accordingly. Provide a citation for each answer.   

 

1. Should society help workers dislocated when technology, like the Internet, elimlnates their jobs in a process called ‘ Creative Destruction‘?

2. are we working more and earning less?

3. Would you want a telecommuting job? Why or why not? 

4. Does the gig economy appeal to you? Why or why not?

5. How is an employee differentiated from a contracter under US law? 

6. Why have some municipalities put restrictions on innovations in the sharing economy and in on-demand services?

7. What has been the effect on the US economy of outsourcing (or offshoring) technical and professional jobs? 

8. How much monitoring of employee activities at work is appropriate? 

9. Should an employer be able to discipline or terminate an employee for on-line behavior in his/her own time? 

10. What is the relationship betwee BYOD (bring your own device) and shadow IT

11. What is cyberloafing?

Question

Paper Requirements:   Review the section on the definitions of maturity stages and dimension variables in the CEO Technology Best Practices Arc.  Define each of the maturity stages and performance dimensions.  What are the key concepts from each section?  2pages APA format with reference