What is an Advanced Persistent Threat (APT)? What is the goal of an APT? How can a business protect itself from an APT? What tools can be used to detect an APT? Provide links to sources or sites that explain these tools in more detail.
QUALITATIVE
QUALITATIVE Journal Submit Article Reviews Here
You will review both quantitative and qualitative research. The topic is up to you as long as you choose a peer-reviewed, academic research piece. I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there. There are no hard word counts or page requirements as long as you cover the basic guidelines. You must submit original work, however, and a paper that returns as a large percentage of copy/paste to other sources will not be accepted. (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.) Please use APA formatting and include the following information:
- Introduction/Background: Provide context for the research article. What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
- Methodology: Describe how the data was gathered and analyzed. What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
- Study Findings and Results: What were the major findings from the study? Were there any limitations?
- Conclusions: Evaluate the article in terms of significance, research methods, readability and the implications of the results. Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.)
- References
It 445
Search in the internet for some of the biggest decisions that business owners have to make. The following link is an example you can use and are not limited to: https://smallbusiness.chron.com/major-problems-associated-sole-proprietorship-31005.html. Example decisions include financial, structural, strategic, manpower, and operational decisions. Then, relate and explain your example decision to Simon’s process (intelligence, design, and choice).
cryptography
In the second milestone writing assignment, you will analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure. At first glance, the key wrapping approach to encrypting symmetric keys for key management applications seems unnecessarily elaborate. The alternative would be a simple encryption using AES or an authenticated encryption using one of the block cipher modes of operation that provides authenticated encryption. Discuss the relative merits of using one of these approaches compared to key wrapping.The writing assignment requires a minimum of 800 words.You must use a minimum of three scholarly articles to complete the assignment. The assignment must be properly APA formatted with a separate title and reference page.
changes to dissertation
Purpose of study
change questions
List the data resources
revise all changes to be done
3 Pages, due within 6 hrs
3 Pages, excluding picture, screenshots etc.
due within 6 hrs
Scrum Board
Assignment Content
- Projects that conform to the Agile methodology often use something called a scrum board. You can think of a scrum board as a digital whiteboard containing yellow “stickies,” each listing a task, posted beneath categories such as “to do,” “in process,” in testing,” etc. Using a scrum board in this way allows all project members to see where important tasks are in the overall project process quickly and easily.
For this Learning Team assignment, you will collaborate with your team members to create an Agile scrum board based on the Global Treps project from the Wk 2 Team assignment (see below).
Note that in an industry situation, you would most likely use a specialized software tool to manage your scrum board such as Jira, Rally, Asana, or Basecamp. However, in this course, you will be using a tool that you may already be familiar with—Microsoft Excel—to create your scrum board and other deliverables. It is the organization and assignment of tasks that is important about a scrum board, not the specific software tool you use to create and manage it.
To complete this Learning Team assignment:
Reread the Global Treps Scenario that you read in the Wk 2 Team – Apply assignment.
Review the Learning Team Scrum Board Example spreadsheet. (Note: Click the Board tab that appears at the bottom of the spreadsheet to see the scrum board example.)
Create a scrum board in Microsoft Excel format, similar to the linked example, to align with the project scoping document your team created in Wk 2. Ensure that your finished scrum board incorporates a project budget.
Submit the team assignment.
Complete Draft of the Literature Review Section
Assignment Content
- In class, we learned how to write the introduction and conclusion of the Literature Review section, which includes:
- Introduction (6 sentences on p. 10a)
- Review of Literature (using notes on p. 13a – ONE objective summary is graded already — apply feedback)
- Analysis of Literature (compare and contrast activity on p. 16a)
- For this submission: You will submit your full draft of the Literature Review in a WORD document.
- YOU MUST CHECK YOUR SIMILARITY prior to submission here.
- Grading:
- Title Page = 10 pts
- Literature Review: Intro, Review of Literature, and Analysis of Literature WITH in-text citations and correct level headings:
- Introduction = 15 pts
- Review of Literature = 40 pts
- Analysis of Literature = 20 pts
- References page with ALL three research articles listed = 15 pts
hw
JSP and MySQL Assignment
1. Create a database called premiergardens2 using MySQL.
2. Create a table inventory in the premiergardens2 database.
3. Create the following fields for the inventory table – toolid CHAR(5) (Primary Key), toolname CHAR(30), wholesale DECIMAL(7,2), retail DECIMAL(7,2), sold INTEGER, and inventory INTEGER.
4. Create a front-end HTML form, insertinventory.html, with text fields that will allow you to enter the following data into the inventory table. Do not hard code this information. Please insert one record at a time in the inventory table using a JSP script inserttools.jsp.
toolid
toolname
wholesale
retail
sold
inventory
TS234
Tractor Scooter
85.03
97.95
122
26
GH178
Greenhouse
82.19
119.59
9
155
ED829
Edger
83.22
115.99
55
115
HS398
Hot Stick
212.44
318.99
26
75
PS098
Pole Saw
226.99
342.95
33
15
5. Write a JSP script, displaytools.jsp, that will display all of the records in the inventory table.
6. Create a front-end HTML form that simulates the sale of tools, selltools.html.
7. Write a JSP script, toolsales.jsp, that will run one update query for sold and a second update query for inventory. Thus, when the user selects an item, decrement the number of items in inventory and then increment the number of items sold.
8. Run the script created in step 5. to verify that the values are updated.
9. Create a front-end HTML form, profits.html, that will have radio buttons that will allow the users to query the database table.
a. Show the total profit and number sold for the tractor scooter.
b. Show the total profit and number sold for greenhouse.
c. Show the total profit and number sold for edger.
d. Show the total profit and number sold for hot stick.
e. Show the total profit and number sold for pole saw.
f. Show the total profit and number sold for all items.
10. Write a JSP script gardenprofits.jsp. You must run a different SELECT query for each tool. The profit is computed as sold * (retail – wholesale).
Digital forensics
Review the material on routers.
It is sometimes said that information extracted from a router or switch does not necessarily provide specific evidence of a particular crime. What is meant by that? If true, what then is the most useful information collected from these devices in an investigation?