Project Idea – description for Foundations of Information Assurance and Security subject

Subject: BIT557 Foundations of Information Assurance and Security

Artifact: Final Project Report 

Details: This project is an opportunity for you to apply what you have learned to a real or fictitious organization as you develop an InfoSec plan. 

The plan should include the following sections:

A. PROJECT IDEA: 15 line description for real or fictitious organization project idea.

CYBERLAWS & ETHICAL HACKING

Motivation of a Hacker

Hackers can have various motives, many of which are similar to the motives for committing traditional crimes:

  • Status/validation: Hackers seeking to make a name for themselves
  • Monetary gain: Hackers wanting to generate revenue for themselves or deny revenue to a target
  • Ideology: Hackers using malicious software to carry out activist attacks to promote a particular agenda; may include hacktivists, nationalists, or nation-state actors

Answer the following question(s):

1.What type of hacker do you think concerns corporations the most, and why?

2.What type of hacker do you think concerns the federal government the most, and why?

Please prepare an one page synopsis with adequate examples to support your answers.

It472 week 9

DQ9: The fourth function is the presentation logic: the display of information to the user and the acceptance of the user’s commands (the user interface). These four functions (data storage, data access logic, application logic, and presentation logic) are the basic building blocks of any information system.

  • Explain the process of user interface design including the user interface structure and user interface standards? Give examples.
  • Develop two use scenarios for a Web site that sells some retail products (e.g., books, music, clothes). Submit your screenshot of the layout here.

Digital forensics

 

Review the material on routers.

It is sometimes said that information extracted from a router or switch does not necessarily provide specific evidence of a particular crime. What is meant by that?  If true, what then is the most useful information collected from these devices in an investigation?

Assignment

 

Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

Computer Architecture, Computer Engineering, Computer

1- For performance evaluation, please describe the rationale of quality improvement performance evaluation.

2- Please list & describe possible parallelization approaches and analysis their advantages or disadvantages.

3- If a computer system is with turbo frequency design, can the computer system always use the turbo mode to replace the regular common mode?

4-Caches, TLBs, virtue memory may initially look very different, but they rely on the same 2 principles of locality, please answer the following questions: 

a- where can a block be placed?

b- how can a block be found? 

c- if there is a miss, how can a block be replaced? 

d- if a write is needed, how can you do that?  

Computer Science

 

Calculus Chapter 2

 Read the bottom of p.160 through the top of p. 161. Now take a road trip.  If you don’t drive, ride with a friend, or ride the bus.  Think about what you are feeling as the vehicle starts, speeds up, moves, slows down, and stops.  Considering the position of the vehicle as the function, explain what you notice in terms of the function and its first, second, and third derivatives.  How do you measure each of these, both by using the vehicle’s instruments and by what you feel acting on your body?   Note:  Be safe!  Obey speed limits and other laws of the road.  You can test these phenomena without driving fast.   Once you have posted, respond to one other post. Do not focus on length, but instead focus on clear and original thoughts.  As always, your work must be your own.