Computer Forensics

 Assignment: Denial of Service ToolsLearning Objectives and OutcomesDifferentiate between tools that are used to create a denial of service (DoS) attack.Assignment Requirements
You have recently been hired by the DigiFirm Investigation Company. The company has clients nationwide. DigiFirm specializes in conducting computer forensics investigations as well as offering preventive services for clients to avoid digital crimes.You are now a member of a team of computer forensics experts who investigate and solve digital crimes and develop digital solutions for clients. A long-running client has just experienced a denial of service attack to its company website. This is serious because they can’t accept orders from their customers. DigiFirm needs you to find out more about what may have happened.Criminals use various tools to create a denial of service attack, including:

  • Tribe Flood Network
  • TFN2K
  • Trin00

For this assignment:

  1. Search the Internet for information about these three tools.
  2. Provide a description of each of the three tools.
  3. Describe the damage or impact of denial of service attacks.
  4. Summarize the efforts used and solutions found to combat these attacks.

Required Resources

  • Course textbook
  • Internet

Submission RequirementsFormat:Microsoft WordFont:Arial, Size 12, Double-SpaceCitation Style:Your school’s preferred style guideLength:1-2 pages
Self-Assessment Checklist

  • I researched the Tribe Flood Network, TFN2K, and Trin00 tools.
  • I described each of the three tools.
  • I described the damage or impact of denial of service attacks.
  • I summarized the efforts and solutions found to combat these attacks.

Cryptography(subject) – Two page assignment for explaining and identifying differences between symmetric and asymmetric encryption and identify which one is the best

 In the second milestone writing assignment, you will analyze asymmetric and symmetric encryption.  Evaluate the differences between the two of them and which one that you would determine is the most secure.  The writing assignment requires a minimum of two written pages to evaluate the history.  You must use a minimum of three scholarly articles to complete the assignment.  The assignment must be properly APA formatted with a separate title and reference page.  

Need to write this in view point of a software developer, what are your plans and how you are going accomplished it. Following the given guidelines

  

For this assignment, you are asked to reflect on how the technical, team and development process impacts your career interests and goals.  The paper should be double-spaced and between 4-5 pages (assuming a 12-point font), with the following sections: 

Note: Please follow the points and explain according to that( in the view point of programmer the essay should be related to technologies, programming language)

1. Introduction

Where you introduce yourself and what your career goal and interests are.  Try to be specific but naming compainies is not needed. 

—Computer science major who has interest more in developing software and familiar languages like c++programming, python, learing new framework,. 

—Goal is to develop apps like which make people life easier and time saving.

2. Technical Concepts

1. This is where you can talk about what technologies you interest you in further working with, that you need to learn more about, etc. as you look ahead to your career.  It does not have to be specific languages (though it can be), but it can also be frameworks, tools, platforms, etc.

—-Technologies : learing azure , what improvement and learning is necessary framework django

3. Teamwork

1. This is where you talk about how working in teams in terms of communication, project management, etc.

— how is communication and leadership skills

4. Software Development Concepts

This is where you talk about the activities and concepts you related to software development such as the overall process model (e.g. Iterative, Agile) or specific activities like Design or Testing.

— design process model example- waterfall model, iterative model– process to develop to app

5. Conclusion

1. Use this section to tie your reflection in the above areas together.

n Conclude overall and how excited and developing skills are helpful for future

CLOUD COMPUTING (IN)SECURITY

1. Do some Internet research to identify businesses who have suffered because of cloud security weaknesses or failures. What can companies who are contemplating cloud computing services learn from the negative experiences of these businesses?

 2. Do some Internet research on security mechanisms associated with virtualization. How can virtualization be used by cloud service providers to protect subscriber data? 

 3. Choose one of the following cloud services categories: SaaS, IaaS, PaaS. Do some Internet research that focuses the security issues associated with the selected cloud service category. Summarize the major security risks associated with the cloud service category and identify mechanisms that can be used to address these risks. 

 Read the Case Study and answer the “Discussion Points” in a clear but concise way. Be sure to reference all sources cited and use APA formatting throughout. 

Week 7 Assignment

 

The scenario:

The Prime National Properties Group is considering selling some of its educational facilities. The facilities have been tracked in an Access database. Shelly Williams, the President of the company, has asked you to prepare a report. Import the Access data in the file Facilities_Data as a table into Excel. Using the PMT function, calculate the monthly payments the company could expect. The company would charge an 8% rate over 10 years. The result should be a positive number. Mr. Williams also asked you to calculate an extra processing fee for monthly loan payments using the IF function. If a monthly loan payment is less than $6000, the company would charge a processing fee of $150; otherwise, there would be no processing fee. Filter the rows to display only those facilities where there is a $0 processing fee. Hide all of the address fields and the processing fee column. Save the Excel file as Lastname_Firstname_Educational_Facilities

For this assignment, you will need the following files:

New blank Excel workbook

Facilities_Data

Educational_Report

You will save your files as:

Lastname_Firstname_Educational_Facilities

Lastname_Firstname_Educational_Report

  1. Open the Word document Educational_Report, and then save the file as Lastname_Firstname_Educational_Report
  2. Add a cover page of your choice, and then complete the content controls on the cover page.
  3. In the report, format headings as Level 1 or Level 2, and then insert a table of contents on a new page.
  4. In the worksheet, hide all of the address fields and the processing fee column
  5. paste the Excel data into the Word document.
  6. Add an appropriate heading formatted as Level 1, and then update the table of contents.
  7. In each file, insert the your name as a field in the footer

Upload the completed assignment files in the Assignment area. 

Research paper – Enterprise Risk Management

The reading this week discusses strategy and how ERM can be integrated with an organization’s overall strategy. Prepare a research paper on some of the various issues, protocols, methods, frameworks you found and discuss how – if possible – organizations can use ERM as strategy. It is perfectly acceptable if you deem ERM cannot be used as strategy, just back up your claim with scholarly research and justifications.

Your paper should meet these requirements: 

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Assignment 5 business intelligence

Complete the following assignment in one MS word document:

Chapter 8 –discussion question #1-4 & exercise 4

Chapter 9- discussion question #1-5 & exercise 3

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

MIS Assignments

 

(1)  View the following video in Youtube: ” The Latest Innovations in Health and Fitness Technology” at

https://www.youtube.com/watch?v=NYD61z0AtJM

(2)  Read the Bloomberg.com article from Tuesday, April 28, 2020:  

“How China is attempting to prevent a second wave”  at:

https://www.bloomberg.com/news/articles/2020-04-28/how-china-is-attempting-to-prevent-a-second-wave-of-infections

Pay particular attention to the section on:  Tracking Apps.  rr

Provide discussion answers to the following questions. The answers should be presented in complete sentences and the sentences should be more than just one or two word answers. Be descriptive.    

1–  Explain what this video and article on big data are about. 

2– Indicate some of the ways that big data is being used.  Provide at least 5 different big data uses.  List as 2a, 2b, 2c, 2d, & 2e. 

3– Should there be a law that limits the use of Big Data?  Why or why not?  Provide your thoughts on this topic.