Research paper and discussion

Part 1 : Research paper 

write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Part 2 : discussion ( 500 words including 2 responses ) 

 The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

Part 3 – discussion ( 500 words including 2 responses )

 discuss the appropriate application of Graph-Based Clustering Sparsification Techniques.  

Computer Science Business Data and Communication Presentation

Explain and provide example when it is possible that will cover chapter 6 subjects:

•Network architecture components

•Traditional network design

•Building-block network design

–Needs analysis

–Technology design

–Cost assessment

Pick Two of Network Simulation Tools from the following, and Discuss, Present them on the class:

•[WANsim] WAN simulators and emulators http://www.wan-sim.net/

•[OPNET] OPNET Modeler, http://www.opnet.com/

•[NS2] NS2 official website, http://www.isi.edu/nsnam/ns/

•[NS2-wiki] NS2 resource webpage, http://nsnam.isi.edu/nsnam/index.php/Main_Page

•[NS3] NS3 official website, http://www.nsnam.org/documents.html

•[OMNeT] OMNeT++ official website, http://www.omnetpp.org/

•[REAL] REAL 5.0 simulator overview, http://www.cs.cornell.edu/skeshav/real/overview.html

•[SSFNet] Scalable Simulation Framework (SSF), SSFNet homepage, http://www.ssfnet.org/homePage.html

•[J-Sim] J-Sim homepage http://www.j-sim.org/

•[QualNet] QualNet official site, http://www.scalable-networks.com/products/•[YANS], Yet Another Network Simulator http://yans.inria.fr/code/yans/?summary

•[GTNetS] The Ge orgia Tech Network Simulator (GTNetS) http://www.ece.gatech.edu/research/labs/MANIACS/GTNetS/

Research topic

 Topic- Journal of Systems and Software 

This is a continuing assignment; you will be using this drop box until you and your faculty mentor approve your topic. 

In a 200-word document, describe your topic. Identify research in the area any models/theories developed in the area. Have you identified a cite problem/gap in this body of knowledge?

Are you considering doing a qualitative, quantitative, mixed method, project, etc., study, identify a possibly population to gather data from.

If you are a CPT student, please include the following as well:
Have you been issued CPT or are currently on CPT? If so what is your CPT code?

If you have a CPT code then:
Post your job description.Upload an official job description on company letterhead. Please copy/paste your current job responsibilities identify how your proposed topic in your discipline relates to the program goals and core courses. 

  • Once your mentor has approved your topic, you will use the below form to add all the components and submit to the school.

For the final project, you will be conducting a forensics investigation using one of the following items: A smartphone A network (ideally, a wireless network)

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

Module 2 Assignment

 

Module 2 Assignment

Due: Sunday, November 1st, 2020 by 11:00 pm EST

For this assignment, complete Chapter 1 – Introduction based on the instructions provided. 

INSTRUCTIONS:

This section requires that you complete all sections of Chapter 1 as specified in the CU Research Guide 

  •  Introduction 
    • Based on the literature sources, provide a background of the research problem to be explored. Elaborate on the impact of the problem and why your research is important to pursue. Indicate what the goal of the research will be
  • Problem statement
    • As per the CU guide
  • Relevance and significance 
    • As per the CU guide
  • Research questions
    • Add no more than 2 research questions as they relate to your research focus
  • Barriers and Issues
    • As per the CU guide

Structure  – CU Research Guide
Format – APA 

Database Assignment

 

Write an essay discussing sqlmap, an automated tool for sql injection and database takeover in 500 words or more. Why do we need an automated tool for sql injection? 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. 

Include an interesting meaningful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.  Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be one  full sentence (no more, no less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas. Each quote must be cited in-line and at the end. 

 

https://www.youtube.com/watch?v=h-9rHTLHJTY

https://www.youtube.com/watch?v=_jKylhJtPmI

https://www.youtube.com/watch?v=ciNHn38EyRc

Watch this video on the SQL Slammer worm

https://www.youtube.com/watch?v=Zbd4Vk9LO3g

Watch these videos on inference attacks

https://www.youtube.com/watch?v=Z9ZjtvcgOcs

https://www.youtube.com/watch?v=rrwUCOEJFJM

https://www.youtube.com/watch?v=dx-R_AFQsc0