Access control Assignment 11

Discuss the best practices for implementing an access control system.

Length, 2 – 3 pages.

All papers are written in APA formatting, include title and reference pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

Discussion Post-DNS

  In 500 words or more, compare DNS failover and cloud failover. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

2-BasicMap

Mapping-Web

Welcome to the United States Geological Survey, or USGS for short! The USGS is responsible for providing scientific data about natural hazards, the health of our ecosystems and environment; and the impacts of climate and land-use change. Their scientists develop new methods and tools to supply timely, relevant, and useful information about the Earth and its processes. As a new hire, you will be helping them out with an exciting new project!

The USGS is interested in building a new set of tools that will allow them visualize their earthquake data. They collect a massive amount of data from all over the world each day, but they lack a meaningful way of displaying it. Their hope is that being able to visualize their data will allow them to better educate the public and other government organizations (and hopefully secure more funding..) on issues facing our planet.

Before You Begin

  1. Create a new repository for this project called leaflet-challenge. Do not add this homework to an existing repository.
  2. Clone the new repository to your computer.
  3. Inside your local git repository, create a directory for the Leaflet challenge. Use the folder names to correspond to the challenges: Leaflet-Step-1 and Leaflet-Step-2.
  4. This homeworks utilizes both html and Javascript so be sure to add all the necessary files. These will be the main files to run for analysis.
  5. Push the above changes to GitHub or GitLab.

 

Your Task

Level 1: Basic Visualization

2-BasicMap

Your first task is to visualize an earthquake data set.

  1. Get your data set
    3-Data
    The USGS provides earthquake data in a number of different formats, updated every 5 minutes. Visit the USGS GeoJSON Feed ( https://earthquake.usgs.gov/earthquakes/feed/v1.0/geojson.php )page and pick a data set to visualize. When you click on a data set, for example ‘All Earthquakes from the Past 7 Days’, you will be given a JSON representation of that data. You will be using the URL of this JSON to pull in the data for our visualization.
    4-JSON
  2. Import & Visualize the Data
    Create a map using Leaflet that plots all of the earthquakes from your data set based on their longitude and latitude.
     

Level 2: More Data 

 

The USGS wants you to plot a second data set on your map to illustrate the relationship between tectonic plates and seismic activity. You will need to pull in a second data set and visualize it along side your original set of data. Data on tectonic plates can be found at https://github.com/fraxen/tectonicplates.

In this step we are going to..

  • Plot a second data set on our map.
  • Add a number of base maps to choose from as well as separate out our two different data sets into overlays that can be turned on and off independently.
  • Add layer controls to our map.
    • Your data markers should reflect the magnitude of the earthquake in their size and color. Earthquakes with higher magnitudes should appear larger and darker in color.
    • Include popups that provide additional information about the earthquake when a marker is clicked.
    • Create a legend that will provide context for your map data.
    • Your visualization should look something like the map above.

 

Assessment

Your final product will be assessed on the following metrics:

  • Completion of assigned tasks
  • Visual appearance
  • Professionalism

Good luck!

5 computer discussions due in 24 hours

5 discussions

50 words each

  

Topic 7 Discussion & Attendance Activity: What to Expect in an IT Career

INSTRUCTIONS: 

  • Respond to the      below topic in a minimum of 50 words.  (5 points)
  • Reply to at      least 1 of your classmates. Be constructive and professional in your      responses. (5 points)

Your participation in this online activity will count toward this week attendance.

What to Expect in an IT Career

Working in the technology field, please keep in mind that you work in a support capacity. Do your best to be helpful, resolved the issue the first time, and deliver as promise. One of the most important ways to achieve customer satisfaction is to do your best by being prepared, both technically and personally.

View the below YouTube video.

  Play Video
 

In the role of technical support to users, what do you think is your strongest social skill that would help you succeed in this role? What is likely to be your greatest interpersonal weakness that might present a challenge to you in this role? What is one change you might consider making that will help you to improve on this weakness?

Topic 9 Discussion & Attendance Activity: Microsoft Word 

INSTRUCTIONS: 

  • Respond to the below topic in a      minimum of 50 words.  (5 points)
  • Reply to at least 1 of your      classmates. Be constructive and professional in your responses. (5 points)

Your participation in this online activity will count toward this week attendance.

Microsoft Word – Tips and Tricks

Many of you may have some familiarity with word processing software, and even with Word. People who use word processing software can be casual users who use commands as they find them, or power users who understand the power of the program and who learn more about each command and how it can be used. 

View the below YouTube video that share 25 Word 2016 tips and tricks.

 

Play Video

 
 

Did you discover any new tips using Microsoft Word from the above video?

https://www.youtube.com/watch?v=EYu3yyzdvck&feature=youtu.be

Topic 10 Discussion & Attendance Activity: Microsoft Excel

INSTRUCTIONS: 

  • Respond to the below topic in a      minimum of 50 words.  (5 points)
  • Reply to at least 1 of your      classmates. Be constructive and professional in your responses. (5 points)

Your participation in this online activity will count toward this week attendance.

Microsoft Excel – Tips and Tricks

Excel has more to it that meets the eye. At first glance it looks like a program to make charts, graphs, and other types of charts. One of the best features is its ability to use math formulas. This feature is helpful if you’re making any type of finance spreadsheet. With the right formulas, you can have Excel automatically add, subtract, multiply, divide, find the range, or just the sub total of any data entered in the cell(s). These formulas automatically update, so you can add data to your spreadsheet and know that it’s going to give you the right total(s) without you having to format it every time.

View the below YouTube video that share 25 Word 2016 tips and tricks. 

Play Video

How many of you have already used Excel? What did you use it for? What features did you like? What did you dislike about it?

Topic 11 Discussion & Attendance Activity: Microsoft PowerPoint

NSTRUCTIONS: 

  • Respond to the      below topic in a minimum of 50 words.  (5 points)
  • Reply to at      least 1 of your classmates. Be constructive and professional in your      responses. (5 points)

Your participation in this online activity will count toward this week attendance.

Microsoft PowerPoint 

PowerPoint is a great tool that can help communicate ideas effectively. With PowerPoint, you can create notes for the speaker and handouts for the audience, as well as presentations. 

View the below YouTube video on PowerPoint Do’s and Don’ts

  Play Video
 

Discuss the general functions, benefits, business value, and practical uses of Microsoft PowerPoint.

Topic 12 Discussion & Activity: Identity Theft

INSTRUCTIONS: 

  • Respond to the below topic in a      minimum of 50 words.  (5 points)
  • Reply to at least 1 of your      classmates. Be constructive and professional in your responses. (5 points)

Your participation in this online activity will count toward this week attendance.

Protecting Yourself from Identity Theft 

The fastest growing crime in the United States is identity theft. More than nine million people fall victim each year, with the unauthorized use of an existing credit card accounting for much of the problem. The National Crime Victimization Survey reports that household identity theft losses amount to more than $13 billion each year, and that figure does not account for the aggravation and time required to repair the accounts.

Watch the below YouTube video

Play Video

 
 

Do you know anyone who has been a victim of identity theft? What steps will you take to protect your identity?

Assignments 1) Post Assessment 2) Case study

1) Assignment 1  ( 2 Pages )

 Post-Assessment:

Mr. Fahad Naseem, and Mr. Ronald Joseph FBI Agent.

 Mr. Fahad Naseem was arrested in connection with the kidnapping and killing of journalist Daniel Pearl and admitted sending ransom e-mails using his Laptop. The laptop and handwritten versions of the e-mails were found in his possession. 

  • On the Contrary-A, Naseem later retracted his confession and the defense attorney asserted that logs from Mr. Naseem’s Internet Service Provider (ISP) indicated that Mr. Naseem’s account was not active and connected to the Internet at the time the e-mails were sent. 
  • On the Contrary-B

Naseem’s defense attorney claimed that the compromised Laptop produced in court had a different serial number from the one that was initially recorded in police records; hence, documentation relating to the computer and evidence in the case was inconsistent. 

  • On the Contrary-C

Documentation presented in court indicated that the Federal Bureau of Investigation (FBI) agent, Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002. In contrast, documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002, and the court denied the appeal, including the following explanation.

  • On the Contrary-D

The lead investigator Mr. Shaikh Naeem recovered the Laptop labeled (connection No. 66) retrieved from the accused, Mr. Fahad Naseem, on November 2, 2002, was provided to Mr. Ronald Joseph, FBI agent, who examined, conducted the forensic investigation, formulated his report, and conveyed evidence to the Consulate General of the United States of America. 

  • The report’s content asserted that the Black Soft Computer came with “Proworld” written on the exterior of the Laptop, and upon opening the case, a Dell Latitude Cpi laptop was discovered. 
  • The Laptop was identified in the report produced by this witness to be of model PPL with Serial number ZH942 located inside the Laptop as an IBM travel star hard driver [sic], confirmed to have been removed from the Laptop.
  • During examination, the label on the hard drive was identified as a system with 4.3 GB storage capacity, and serial number OKLA24302 on the outside of the laptop.  
  • After examining Exhibits, Mushernama who recovered the Laptop asserted that without a doubt whatever, the compromised Laptop is the same equipment that was seized from the accused, Mr. Fahad Naseem on November 2, 2002. 
  • On the Contrary-E

The forensic investigation report confirmed that the same Laptop was recovered on April 2, 2002 by the defense team. Availability of the Laptop at the American Consulate on April 2, 2002 is not unnatural and impossible because Marianne Pearl filed a complaint with the police on April 2, 2002, hours when the case was in the at the hands of the Investigating Agency.

Questions 1. As an Aspirant and Hopeful Digital Forensic Investigator:

1:1. Submit concluding evidence to the public and the court substantiating that Mr. Fahad Naseem is guilty of kidnapping and killing Mr. Daniel Pearl, the journalist.

1:2. Submit concluding evidence to the public and the court demonstrating that Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002, whereas documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002.

1:3. Submit concluding evidence to the public and the court attesting that Mr. Naseem’s Laptop’s availability at the American Consulate on April 2, 2002, is unnatural and unrealistic occurrences. 

Academic Integrity/Plagiarism

At a Christian liberal arts university committed to the pursuit of truth and understanding, any act of academic dishonesty is especially distressing and cannot be tolerated. In general, academic dishonesty involves the abuse and misuse of information or people to gain an undeserved academic advantage or evaluation. The common forms of academic dishonesty include:

  • Cheating – using deception in the taking of tests or the preparation of written work, using unauthorized materials, copying another person’s work with or without consent, or assisting another in such activities.
  • Lying – falsifying, fabricating, or forging information in either written, spoken, or video presentations.
  • Plagiarism—using the published writings, data, interpretations, or ideas of another without proper documentation

Plagiarism includes copying and pasting material from the internet into assignments without properly citing the source of the material.

Episodes of academic dishonesty are reported to the Vice President for Academic Affairs. The potential penalty for academic dishonesty includes a failing grade on an assignment, a failing grade for the entire course, or charges against the student with the appropriate disciplinary body.

Reference

Casey, E (2011). Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet, Elsevier.

2 ) Assignment 2 ( 2 Pages )

Many people think of the Internet as separate from the physical world. This is simply not the case–crime on the Internet is closely tied to crime in the physical world. There are a couple of reasons for this cautionary note. A crime on the Internet usually reflects a crime in the physical world, with human perpetrators. and victims and should be treated with the same gravity. To neglect the very real and direct link between people and the online activities that involve them limits one’s ability to investigate and understand crimes with an online component.

Students think about the impact of auction and check fraud in this modern era of digital shopping. This about how a combination of evidence from the virtual and physical worlds is used to apprehend a criminal.

Case Study

Case Example inspired by a case in (Casey, 2011)

A buyer on Amazon complained to police that he sent payment to a seller but received no merchandise. The seller requested that the buyer also send a cashier’s check for shipping and additional costs. Over a period of weeks, several dozen similar reports were made to the Internet Fraud Complaint Center against the same seller. To hide his identity, the seller used a Gmail account for online communications and several mail drops to receive checks. Logs obtained from Gmail revealed that the seller was accessing the Internet through a subsidiary of AT&T. When served with a subpoena, AT&T disclosed the suspect’s Google account and associated address, credit card, and telephone numbers. Investigators also obtained information from the suspect’s bank with a subpoena to determine that the cashier’s checks from the buyers had been deposited into the suspect’s bank account. A subpoena to Amazon for customer order history and complaints and supporting evidence from each of the buyers helped corroborate direct connections between the suspect and the fraudulent activities. Employees at each mail drop recognized a photograph of the suspect obtained from the Department of Motor Vehicles. A subpoena to the credit card number and a search of real estate property indicated where he conducted most of his fraud. A 3rd company revealed the suspect’s Social Security the suspect’s name turned up an alternate residence the opportunity to uncover crimes in the physical Internet.

Students respond to the following questions related to this case in your Cybertrail_YourLastName.docx document.

Question 1 – Following the Cybertrail

Comment on the interconnectedness of the digital world. To what extent does cyber-criminal have anonymity in their transactions? Be detailed in your response. 

Question 2 – Following the Cybertrail

By what means of your expertise in Digital Forensic Evidence provide a critical forensic investigation approach that will play a key role in protecting consumers in this scenario from digital fraud such as this?

Big Data Visualization tools

Several Big Data Visualization tools have been evaluated in this week’s paper. While the focus was primarily on R and Python with GUI tools, new tools are being introduced every day. Compare and contrast the use of R vs Python and identify the pros and cons of each. Provide an example of both programming languages with coding examples as well as your experience in using one or both programming languages in professional or personal work. If you have no experience with either language, please discuss how you foresee using either/both of these languages in visualizing data when analyzing big data.

Please make your initial post and two response posts substantive. A substantive post will do at least two  of the following:

Explain, define, or analyze the topic in detail

Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)