WS&F

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

Article Summary

– Write a summary on 2-3 recent peer reviewed articles (within the past 3 years) that closely relate to ‘Impact of Big Data on Businesses’

– Should be a minimum of 750 words

– There should be no plagiarism. Attach a turnitin report with 0% similarity index.

Introduction to Data Mining

  

Write a 3-4 page APA formatted paper on a business problem that requires data mining, why the problem is interesting, the general approach you plan to take, what kind of data you plan to use, and finally how you plan to get the data. You should describe your problem, approach, dataset, data analysis, evaluation, discussion, references, and so on, in sufficient details, and you need to show supporting evidence in tables and/or figures. You need to provide captions for all tables and figures.

Your paper should include an abstract and a conclusion and a reference page with 3-5 references.

bharg discussion

 In discussion 5, we looked at networks in general; however, in this discussion we’re looking at wireless networks, mostly focusing on mobile networks.  Mobile networks in a global economy can be a challenge for multiple reasons.  First, governments in other countries control the mobile networks.  Second is the technology.  Mobile networks in other countries might not be as good as the mobile networks within the US.  As a global company, how can we deal with this?  With a big push for 5G, which has speeds well over 2Gbps, how does that change the way you do business?  What are some things you need to think about when it comes to doing business globally, using a wireless mobile network? 

Python cod

  

Write a Python program that reads IP addresses from an input file (ip_input.txt), checks its format and validity, and then checks its connectivity to each IP. Use the IP input file shown as below. Submit your code and the output screen shots after a run.

8.8.8.8

2.2.2.2.2

127.5.6.7

3.3.3.305

0.120.3.5

8.8.8.1

169.234.6.8

8.8.4.4

4.4.8.8

(you may add more to test your code)

Validity check (check the format and filter the addresses that are not publicly routable):

– IP should be four dotted format (x.x.x.x)

– octets having values between 0-255.

– IP should not belong to one of these blocks: 

o 0.0.0.0/8

o 127.0.0.0/8

o 169.254.0.0/8

o (you may add more if you like)

Connectivity check:

– Use ping for testing reachability to the IP address.

The output could look like:

Ip address: 8.8.8.8

Validity: yes

Reachability: yes

Ip address: 2.2.2.2.2

Validity: no – bad format

Reachability: no

Ip address: 127.5.6.7

Validity: no – in block 127.0.0.0/8

Reachability: no

…….

…….

bharg discussion

 

here is a relationship between policy evaluation and production identification, policy evaluation and policy implement, and policy evaluation and policy formulation.  Can you explain this relationship and why they are important?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

ethics 2

 Then, write a paper in which you address the following. Use your research to support your ideas.

  • Describe codes of ethical conduct for the information technology field.
  • Explain ethical responsibilities for IT professionals.
  • Describe your personal code of ethics for the IT environment.

Additional Requirements

  • Include a title page and a references page.
  • Include an introductory paragraph and a concluding paragraph.
  • Include a minimum of three research resources.
  • Be sure to follow APA guidelines for style and formatting.
  • Your finished assessment should be approximately 3–5 pages in length, excluding the title page and references page.

Assignment -4

 

This week’s journal articles focus on transformational leadership and knowledge and knowledge sharing within an organization, please review these concepts and answer the following questions:

How do trustworthy and ethical leaders enhance knowledge sharing in organizations? How does this impact the rate of information technology implementations? How does this impact data management within organizations? 

How does servant leadership assist with transferring knowledge in an organization? 

When thinking about data analytics, how does transformational leadership assist with building good data structures?

Be sure to use the UC Library for scholarly research. Google Scholar is also a great source for research. Please be sure that journal articles are peer-reviewed and are published within the last five years.

The paper should meet the following requirements:

3-5 pages in length (not including title page or references)

APA guidelines must be followed. The paper must include a cover page, an introduction, a body with fully developed content, and a conclusion.

A minimum of five peer-reviewed journal articles.