For the final project, you will be conducting a forensics investigation using one of the following items: A smartphone A network (ideally, a wireless network)

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

Discussion

 “A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. For this week’s discussion question, please view the Periodic Table of Visualization at the following link (http://www.visual-literacy.org/periodic_table/periodic_table.html). Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. Provide your classmates with a brief description of your choices and explain why you made your choices. Also, describe what advantages do your choices have over the others. 

Strict APA format

2 pages

At least 2 scholarly references.

Assignment1014

 current business process in a specific industry.  Note the following:

-The current business process itself.

-The industry the business process is utilized in.

After explaining the current situation, take the current learning from the course and:

  • Explain a new technology that the business should deploy.  Be specific, don’t only note the type of technology but the specific instance of technology.  (For example, a type of technology is smart automation a specific type of automation is automated light-dimming technology).
  • Note the pros and cons of the technology selected.
  • Note various factors the business should consider prior to deploying the new technology

The above submission should be three pages in length.  Remember the total length does not include the APA approved cover page or the references.  There should be at least three APA approved references to support your work. 

Chryptography and business intelligence

question 1. compare and contrast two fundamental security design principles. Analyze how these principles and how they impact an organizations security posture. minimum 300 words and Must be APA format.

Q 2. Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.should be 250-300 words.must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Q3. Survey the literature from the past six months to find one application each for DSS, BI, AND ANALYTICS. Summarize the applications on one page and submit it with the exact sources. Must be APA format.

Q4. Find information about IBM Watson’s activities in the healthcare field. write a report. Must be APA format and must one page.

Q5. Discuss the difficulties in measuring the intelligence of machines. Must be APA format and one page.

Q6. In 2017, McKinsey & Company created a five-part video titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed. 

Q7.5.Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/ watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report.

Q8. Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recogni- tion product.

All must be APA format. from question 3 to 8 must be each one page.

OR_Discussion_2

  1. Organizational performance is the fifth aspect of the model, reflect on the question, do certain leadership behaviors improve and sustain performance at the individual, group, and organizational level?  Please explain your response.
  2. There were two types of innovation addressed this week (product and process innovation), please note your own personal definition of these concepts and offer an example of both.

Please be sure to answer all of the questions above in the initial post.

Discussion 3

 

Week 3: Discussion

The United States vs. Carey, 1998

Prologue 

Carey had been under investigation for possible sale and possession of cocaine and his residence as the center of operation. Six (6) months after the last purchase, the law enforcement officers obtained a warrant to arrest him. During the arrest, officers observed in plain view, a device for smoking marijuana in his residence and labeled the unit as marijuana in defendant’s apartment.

Plan of Action

Alerted by these items discovered in Mr. Carey’s apartment, the law enforcement officers asked Mr. Carey to consent to a search of his apartment. In clean and clear language, the law enforcement officers informed him of the intention to obtain a search warrant to search his apartment if Mr. Carey refused permission. After considerable discussion with the officers, Mr. Carey verbally consented to the search and later signed a formal written consent at the Officer’s station.

The search warrant was all-inclusive; thereby, authorized officers to search the filesystems on the computers for names, telephone numbers, ledger receipts, addresses, and vital documentary evidence about the sale and distribution of controlled substances.

Discoveries

1:1. Armed with the consent, the officers returned to Mr. Carey’s apartment the same night and discovered quantities of cocaine, marijuana, hallucinogenic mushrooms; took two computers believed to demonstrate evidence of drug dealing.

1:2. During the examination of Mr. Carey’s computer, investigators found files with sexually suggestive titles and the label “.jpg” that contained child pornography. 

1:3. In the process, investigators temporarily abandoned the search for evidence about the sale and distribution of controlled substances and focused on child pornography files, and Mr. Carey was charged with one count of child pornography.

 Court Proceeding

  • In the appeal, Mr. Carey challenged child pornography count as inadmissible and unacceptable because the computer was taken as the result of a general, warrantless search out of his apartment
  • Law enforcement officers contention was the warrant authorized them to search any filesystem on the computer that might contain data and information germane to drug crimes, cocaine, marijuana, hallucinogenic mushrooms, and asserted that child pornography came into plain view during the search. 
  • The court concluded that the investigators exceeded the scope of the warrant and reversed Mr. Carey’s conviction.
  • The Law enforcement officers adopted “Plain view doctrine” that must have not been extended to embrace wide-ranging search warranties from one item to another until something incriminating emerges.

Precautious

  1. Digital forensic investigators must be extremely cautious and avoid breaching the fundamental principle of digital forensic investigation.
  2. Digital forensic investigators inadvertently abandoned the search warrant and overstepped the authorized limit of the search warrant.  
  3. Investigators engrossed in child pornography files. Notably, Mr. Carey was charged with one count of child pornography.
  4. Tactlessly, Digital forensic investigators failed to obtain a new search warrant before conducting extra search on Mr. Carey’s child pornography operation.

Answer All Questions: (1:1 – 1:3)

Question 1:1. Provide a comprehensive plan of action on Mr. Carey’s count germane to drug crimes, cocaine, marijuana, hallucinogenic mushrooms.

Question 1:2. Provide a comprehensive narrative and concluding evidence on Mr. Carey’s use of the computer to compiled names, telephone numbers, ledger receipts, addresses, and vital documentary evidence on the sale and distribution of controlled substances.

Question 1:3. Describe the immediate danger of Mr. Carey’s modus operandi germane to drug crimes, cocaine, marijuana, hallucinogenic mushrooms, and child pornography in a developing rural community?

Intro to Data mining

 

Consider the mean of a cluster of objects from a binary transaction data set. What are the minimum and maximum values of the components of the mean? What is the interpretation of components of the cluster mean? Which components most accurately characterize the objects in the cluster?

 Please ensure to cite the Author, YYYY with any content brought into the discussion.   All discussions should contain at least one reference (and matching in-text citation in APA format).

No SQL

Introduction

NoSQL databases are systems designed to run without interruption of service. Many web-based businesses require data services that are available without interruption.

For example, databases that support online purchasing need to be available 24 hours a day, 7 days a week, 365 days a year.

Requirements

You will research the different strategies used by NoSQL databases to ensure high availability, and write a short report on your findings.

Here are the specific requirements:

1. Define what is high availability, and how to measure it.

2. Write a report to explain how a NoSQL database can be highly available. You must use specific examples of existing NoSQL databases in your answer (Identify 5 NoSQL databases. For each, explain the strategies for high availability.

3. The main part of the report should be no more than 600 words.

4. In a bibliography, include the references you used to write the body of the report.

5. Include a proper cover page for the report with:

a. The Assignment number and title

b. Your name and Student ID

c. The due date