digital project

 Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it. 

300 words

 

Each student will prepare a final project on a digital forensic topic or on a criminal investigation that involved digital forensics.. The primary deliverables for the project will be a paper and and also a presentation that will be presented by the student during the residency period.

  

Anonymous

Citizen Rights vs Security

Cloud Computing

Computer Forensics

Data Center Security

Disaster Recovery

Edward Snowden – Traitor or Hero

Encryption

Hardware and Software Security

I Love You virus

Keyloggers

Mobile Malware

Mobile Security

Pharming

Phishing

Presidential Election 2016

Quantum Computers – Impact on Encryption

Ransomware, malware, business security

Security and the Cloud

Smart Grid

SOFTWARE CRACKERS

Stuxnet Virus

Undersea Cable

United State Cyber Command

Web War I – Estonia Attack

White Hat Hacking

Wi-Fi Security: Wireless Network Encryption

Creating Exploits

Home Automation Security and Vulnerabilities

Car Hacking

Password complexity policy (Cybersecurity)

 For this week’s discussion,explain the purpose of a password complexity policy.  Give an example of a complete one that you may have used or have seen used.  Also, give an example of one that is not complete and where there may be holes that could cause issues.  Give full details of each example.  

Power Point Presentation

Create a Power Point Presentation

 PIONEERS (  Tim Berners-Lee )  tell me about this person. What did this person do to become a pioneer? Did he/she invent something? What did they invent? What is the person doing now? What has this person accomplished? Be thorough with the subject. 

 PowerPoint Criteria For the PowerPoint you must:

 1- Research your subject 

2- Find photographs 

 3-  Your Presentation should not be your entire research assignment. o USE THE 7X7 RULE  7 lines per slide (maximum) 7 words per line (maximum) o This does not mean that all of your slides need to have 7 lines with 7 words .

Use key words and/or phrases to make your point o DO NOT crowd the slides with too much text or too many pictures 

 Use the NOTES Pages underneath each slide to include some information you are going to talk about if/when presenting in front of an audience. 

 The purpose of the presentation is to give details, information or teach about a subject. o You are NOT to read the slides 

 Be sure that ALL of your slides contain both text and pictures 

There should not be any slides with pictures only  

FORMAT the pictures/images that you’ve used 

 Be sure to include a slide transition 

Use the same transition throughout the presentation 

 DO NOT make the slides change automatically 

 Insert a Footer with Your Name and your Student ID number on all slides except the title slide 

 Be sure ti include a Works Cited slide with your video link at the END of the presentation. 

Use one of your images AS a background on one slide 

 Use shapes to enhance your presentation 

  DO NOT make the slides change automatically o The Presentation

 MUST have a minimum of 15 slides.  Slide 1: Title  Slides 2 – 14: Presentation  Slide 15: Work Cited, Links, Video Link and resources 

Assignment

ASSESS YOUR CURRENT WORKFLOW

Reflect on your most recent visualization project and try to sketch or write out the approach you took. What stages of activity did you undertake and in what sequence? Did it feel efficient or chaotic? Was it interrupted by changes, uncertainty, or a sense of too much choice? Before you can seek to improve your ongoing approach it is worth unpicking what you currently do and how you do it.

Assignment Link: http://book.visualisingdata.com/chapter/chapter-2

Assignment Length (word count): At least 500 words (not including direct quotes).

References: At least three peer-reviewed, scholarly journal references.

Discussion 5

How would you explain the correlation between the amount of corruption in a country and economic development?

250 to 300 words APA format with references.

Practical connection assignment

Based on the below job duties we need to write the practical connection assignment for the Topic.

  

Job Description

·Provide leadership and guidance for QA engineers in the creation of a dedicated test environment and test data management practices for automation and performance testing of web applications.

·QA Management practices for automation and penetration testing of web applications

·Lead selection and standardization of automation tools and test environment, suggesting the best practices for automation which is to be implemented across the organization

·Lead the development of end-to-end test plans and processes to meet quality objectives and product requirements.

·Work on required documentation needed for the project adhering to existing process guidelines.

·Serve as an expert and knowledge source for the escalation of complex application design and development issues.

·Coordinate software installation/deployment activities and monitor the implementation verification process.

·Develop automated test scripts for the web interface and web services using Selenium WebDriver with Java.

·Ensure system performance by validating stability, scalability, reliability, latency, and response time of different products and applications.

·Participate in troubleshooting and triaging of issues with different teams to drive towards root cause identification and resolution.

  

Topic 1

How leadership theories can help in enhancing organizational success by influencing efforts directed at change management in information and technology management

Important note: The assignment should be of 500 words at least with proper citations and the Latest APA format. It should meet the rubric attached.

Preview the document

Project Phase 4

 

Unit 4 Project Phase 4 Downloadable InstructionsPreview the document

Congratulations, you have set up a new network in a rural area that  will be serving a small neighborhood. Your network currently consist of 6  houses but is expected to grow to include all of the 500 houses in your  area. The only other network alternative to your system is satellite  networking which is very slow and prone to outages. You will be  providing both cable TV and internet access through your network so make  sure you are providing enough speed in your network for your customers.

Download the project instructions. Type your class number:  10.___.0.0/16 in all of the underline ___ indicators, answer the  questions as you go through the steps and add the screenshots where  indicated in the instructions document

R5RS Scheme (Dr.Racket)

;; Towards a Scheme Interpreter for the Lambda Calculus — Part 1: Syntax

;; 5 points

;; , and pre-requisite for all subsequent parts of the project

;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;

;; All programming is to be carried out using the pure functional sublanguage of R5RS Scheme.

;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;

;; You might want to have a look at http://www.cs.unc.edu/~stotts/723/Lambda/overview.html

;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;

;; 1. The lambda calculus is a particularly simple programming language consisting only of

;; variable references, lambda expressions with a single formal parameter, and function

;; applications.  A BNF definition of lambda calculus expressions is

;; ::= | (lambda ( ) )  |  ( )

;; Design a data type for the lambda calculus, with constructors, selectors, and classifiers.

;; For concrete representation, use Scheme, as follows:  an identifier should be represented as

;; a quoted Scheme variable, a lambda expression (lambda (x) E) as the quoted 3-element list

;; ‘(lambda (x) [list representing E]), and an application  (E1 E2) as the quoted 2-element list

;; ‘([list representing E1]  [list representing E2])

;; 2.  In (lambda () ), we say that is a binder that

;; binds all occurrences of that variable in the body, , unless some intervening

;; binder of the same variable occurs. Thus in (lambda (x) (x (lambda (x) x))),

;; the first occurrence of x binds the second occurrence of x, but not

;; the fourth.  The third occurrence of x binds the fourth occurrence of x.

;; A variable x occurs free in an expression E if there is some occurrence of x which is not

;; bound by any binder of x in E.  A variable x occurs bound in an expression E if it is

;; not free in E.  Thus x occurs free in (lambda (y) x), bound in (lambda (x) x), and both

;; free and bound in (lambda (y) (x (lambda (x) x))).

;; As a consequence of this definition, we can say that a variable x occurs free in a

;; lambda calculus expression E iff one of the following holds:

;;   (i) E = x

;;   (ii) E = (lambda (y) E’), where x is distinct from y and x occurs free in E’

;;   (iii) E = (E’ E”) and x occurs free in E’ or x occurs free in E”

;; Observe that this is an inductive definition, exploiting the structure of lambda calculus

;; expressions.

;; Similarly, a variable x occurs bound in a lambda calculus expression E iff one of the

;; following holds:

;;   (i) E = (lambda (x) E’) and x occurs free in E’

;;   (ii) E = (lambda (y) E’), and x occurs bound in E’: here, y may be x, or distinct from x

;;   (iii) E = (E1 E2) and x occurs bound in either E1 or E2

;; Develop and prove correct a procedure free-vars that inputs a list representing a lambda calculus

;; expression E and outputs a list without repetitions (that is, a set) of the variables occurring

;; free in E.

;; Develop and prove correct a procedure bound-vars that inputs a list representing a lambda calculus

;; expression E and outputs the set of variables which occur bound in E.

;; 3.  Define a function all-ids which returns the set of all symbols — free or bound variables,

;; as well as the lambda identifiers for which there are no bound occurrences — which occur in

;; a lambda calculus expression E.