You have been assigned to investigate whether or not an employee at a local hospital has been accessing patient records and setting information to online pharmacies. It is your first day of the investigation. Put together a list of data sources that must be examined during the investigation.
literature review
12 sources- peer review articles 9-10 pages(cybersec-financial industry)
attached example
Cloud Computing
Topic :Cloud computing infrastructure and cloud security
In security research, there are three specific areas such as trusted computing, information-centric security, and privacy-preserving models.
Cloud Security protects the data from leakage, theft, disaster, and deletion. With the help of tokenization, VPNs, and firewalls, we can secure our data. Cloud Security is a vast topic and we can use it for more research. The number of organizations using cloud services is increasing. There are some security measures, which will help to implement the cloud security-
Accessibility
Integrity
Confidentiality
Topic: Cloud computing infrastructure and cloud security:
Abstract:
Background of the problem
Outline of the problem
Research questions minimum three
Literature review: 4 pages
Methodology – 1 page
Conclusion
use APA 7th edition only for references
For the final project, you will be conducting a forensics investigation using one of the following items: A smartphone A network (ideally, a wireless network)
For the final project, you will be conducting a forensics investigation using one of the following items:
- A smartphone
- A network (ideally, a wireless network)
You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.
You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:
Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information:
- Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
- Step-by-step description you used to gather data for analysis
- Report on the information that was obtainable from the device
- Graphics evidence that you conducted the forensics data gathering and analysis
The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.
Operational Excellence: Information Systems for Business and Beyond Study Questions.
Chapter 12 – study questions 1-11, Exercise 1 & 2
Study Questions:
- What does the term information systems ethics mean?
- What is a code of ethics? What is one advantage and one
disadvantage of a code of ethics?
- What does the term intellectual property mean? Give an
example.
- What protections are provided by a copyright? How do you
obtain one?
- What is fair use?
- What protections are provided by a patent? How do you obtain
one?
- What does a trademark protect? How do you obtain one?
- What does the term personally identifiable information mean?
- What protections are provided by HIPAA, COPPA, and FERPA?
- How would you explain the concept of NORA?
- What is GDPR and what was the motivation behind this regulation?
Exercises :
- Provide one example of how information technology has created an ethical dilemma that would not have existed before the advent of I.T.
- Find an example of a code of ethics or acceptable use policy related to information technology and highlight five points that you think are important.
Entry level networking
I have a timed packet tracer assignment that I would like to complete after 10pm this evening. I will not know the details until I open the assignment and then clock starts. My guess is that it will be building a small network with 7 or less devices and will involve some subnetting and will require to ping a device. I will need somebody that can be on the phone with me for 40 minutes to help me. I can copy and email the assignment once it is opened.
Policy, Legal, Ethics and Cmplc
Research Project Proposal
The purpose of this assignment is to pick a topic for your research project. The topic should be of graduate level not a survey. Investigate an important question.
Your Research Project will be a presentation on some aspect of the surveillance state. Do a five source annotated bibliography/reference list on the subject. There should be two annotations for each source. In the first write a paragraph of at least five sentences summarizing the thesis of the article. In the second write a paragraph of at least five sentences summarizing your reflections on the thesis of the article. You should do a deep dive into a topic. Do not do a survey. Make use of academic references such as you can find in the Danforth LIbrary research databases
Use at least five sources.
Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0.
Write in essay format not in bulleted, numbered or other list format.
Do not use attachments as a submission. Do not zip your submission.
Respond helpfully to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. Wtite to help them focus and say something that you think would help them say something that would be valuable. You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due.
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like). Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. Please do not use attachments unless requested
Microsoft Access 2019 Skill Review 5-1
I am looking for someone to complete the Microsoft Access assignment.
diss (WS&F)
1) What type of device or system did you select to conduct your forensics investigation?
2) What tool did you use for the data capture?
3) What did you learn from the experience?
Your response to the DQ must be a minimum of 400 words. You must provide references for your response (APA format). You will need to reply to two (2) other fellow student’s posts (See the syllabus). The responses must be made in the week due.
deep learning
write 1/2 page about deep learning