discussion 3

News stories and public pressure drive government regulations. They also drive many industries to more self-regulation. The hope is to demonstrate to the government and the public that these industries are aware of the problem and are taking action. An industry prefers to self-regulate for two key reasons: Cost and flexibility. There’s a perception that regulations increase cost because they can be restrictive and require lots of compliance evidence to be collected. Additionally, regulations can require specific solutions to a problem. Retaining the flexibility to select from an array of solutions and apply new technology is one reason given to avoid regulations. The counterargument is that, without laws, industries won’t fully address problems.

Answer the following question(s):

  1. In general, do you believe private industry should be more heavily regulated or less regulated? Provide rationale for your answer.

Address the same question in regard to consumer privacy on social media platforms such as Facebook.

Home work

 

Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

Use your own words and do not copy  the work of another student.

Attach your WORD document here.(300 Words)

Discussion post

In earlier discussion, we looked at networks in general; however, in this discussion we’re looking at wireless networks, mostly focusing on mobile networks.  Mobile networks in a global economy can be a challenge for multiple reasons. First, governments in other countries control the mobile networks.  Second is the technology.  Mobile networks in other countries might not be as good as the mobile networks within the US.  As a global company, how can we deal with this?  With a big push for 5G, which has speeds well over 2Gbps, how does that change the way you do business?  What are some things you need to think about when it comes to doing business globally, using a wireless mobile network?

Use Python Package : urllib3

Python Package : urllib3

1) You will prepare a short illustration of how the package works (this must be general, and not related to your project). It does not have to cover the whole package, but can be only a part of it.

  1. You will use the package in the context of your project and show the value that it brings.
  2. (3)  All outputs for the retakework will make use of XLWings.You can either use XLWings to(3.1) build (and format) an Excel file to output information or (3.2) code an Excel function or procedure.

Assignment

  

Please explain in details what is Distributed System and Distributed File System.  

Please describe in details what is the virtualization concept.

Describe with text and diagram what are the Peer-to-Peer network, LAN, and WAN. Also these important terms: OSI model, DNS, TCP/IP. 

In your opinion what is/are the most security threats that organizations will have to be prepared for 2020-2021 ?

Explain the pros and cons of using VPNs

In your opinion, what is the most secure operating system in use today? Justify your answer

Explain what a strong system access password is and why we believe it is strong.

Please list your reference/s

Discussion: Physical Security in DR/BCP Scenarios

 

Your task: You have been asked to give a  presentation at Business Round Table Event. Attendees are owners of  small businesses and corporate managers whose employees are now working  from home due to the global pandemic. The need for physical security to  protect equipment and other assets has risen in priority for these  business owners and managers as they realize that they have a gap in  their business continuity planning and response which needs to be  addressed.

Background: During the global pandemic, many  companies throughout the region, both small businesses and larger  corporate entities, successfully transitioned to “work from home”  allowing them to continue operating despite the issuance of “work from  home” and “stay at home” orders from governmental entities. Storefronts  and offices for non-essential businesses and services were shuttered or  reduced to minimal staffing. Concerns about the potential for thefts,  break-ins, and other forms of unauthorized entry have been raised in  many organizations who were not prepared for extended periods in which  their facilities would be unoccupied / unattended.

For this presentation, identify and discuss five or more technologies  and countermeasures which can be implemented to address the problem of  providing physical security in an unoccupied/unattended facility (you  should not propose any measures that rely upon guards or other personnel  who would need to be physically present). Your presentation should  address both preventive and detective controls for physical security,  e.g. perimeter fencing, gates, bollards, lighting, CCTV, audio scanning,  alarm systems, key-card controlled entry, etc.

 Format: This week, the format for your deliverable  (posting) will be “Talking Points.” Talking points are presented in  outline format and contain the content that you would put on slides in a  slide deck. Your outline should include 5 to 7 major points (“slide  titles”) followed by 3 to 5 supporting points for each. Remember to put  enough information into the talking points that your peer reviewers can  understand what you intend to cover in each section of your briefing.  Remember to introduce the topic at the beginning, present your analysis,  and then close your briefing with an appropriate summary. Include a  list of sources (3 or more) which attendees could refer to if they wish  to fact check your work. 

Discussion 300 words

 

Phishing Attacks are considered one of the Bigeest cybersecurity issuese.

Phishing accounts for 90% of all breaches that organizations face, they’ve grown 65% over the last year, and they account for over $12 billion in business losses.

What needs to be included as part of an organizations Phishing Policy?