Week 7 Assignment

 

Digital forensics is often summarized in four phases (e.g. collection, preservation, analysis and reporting). We have learned this already.

However, I think it’s important for you to be aware of how there are many different excellent models out there that seek to break down digital forensics in a series of flowcharts / phases / moving parts. Then Chapter 14 talks about the different trends and future directions.

So, I am attaching a couple research papers. Please check out them out in which can be found in the Supplemental Materials folder.

Some of the models out there are very specific e.g. for network forensics, triage, or cybercrime.

I would like you to read these papers – who knows you may actually see a model that resonates well with you. This can be helpful if you are asked to consult on what is the right model that should be followed in a particular legal matter in today’s brave new world.

Instructions

Now that you have reviewed the different models of digital forensics, what are your thoughts about the author’s proposed model? Do you agree or disagree? Do you have a preference for the other models and if so what is your preference and why? Note – there are NO right or wrong answers here. I value your insights. No more than 2 pages please

Executive Dashboard and Data Driven Input

Assignment 1:

 Research a scholarly paper or professional video on “Executive Dashboards”  and reflect on only one (1) of the following:

  • “Components”: What are the components of an executive dashboard? 
  • “Drill-down”: What is an example of a drill-down dashboard?
  • “Analytics”: What type of analytics is most often shown on an executive dashboard?

NOTE:
You must copy and paste the topic (“Components” or “Drill-down” or “Analytics”) at the start of your paper to provide a context for your answer.
This paper must be between 250-300 words on what caught your eye and reflect on what you read. 
Do not add extraneous text that does not address the question – do not add an introduction or conclusion. 

Assignment 2:

 Research a scholarly paper or professional video on “Data Driven Input” and reflect on only one (1) of the following topics:

  • “Analytics Centric”: How can input be designed to support an Analytics Centric organization?
  • “Competency Centers”: The benefits of Analytics Competency Centers in data-driven organizational change.
  • “Roles”: The role of Systems Analysts, Business Analysts and Super Users in data-driven decisions.

NOTE:
You must copy and paste the topic (“Analytics Centric” or “Competency Centers” or “Roles”) at the start of your paper to provide a context for your answer.
This paper must be between 250-300 words on what caught your eye and reflect on what you read. 
Do not add extraneous text that does not address the question – do not add an introduction or conclusion.
Do not copy and paste text from the referenced resource. 

Virtualization

 1) Discuss three situations for uses of different operating system installs in a virtual environment while at the same time securing the operating system installation.

For example, think about why a system administrator would install several different versions of Microsoft Windows VM’s? Or maybe a developer installing different distributions of Linux? Think about the different IT departments an organization may have and what can be done to save time, money, and resources when they utilize virtual machines.

 You are encouraged to conduct research and use other sources to support your answers. Be sure to list your references at the end of your post. 

The Stages of Cyber Operations

 

The Stages of Cyber Operations

Introduction

Cyber operations have a long and storied history that has evolved tremendously over the last few decades. Cyber operations, and in particular its subset of cyber warfare, came into realization during the 1980s, took-off as an information-gathering mechanism during the late 1990s and early 2000s, then became militarized and still is to this day. Two major incidents that characterize the late 1990s and early 2000s are the Moonlight Maze and the Stuxnet incidents, respectively. Cyber operations were performed throughout each of these incidents.In this assignment, you will describe the goals and objectives of cyber operations, examine the Moonlight Maze and Stuxnet incidents, and identify the regulations or laws that were instituted in the U.S. because of these incidents.The specific course learning outcome associated with this assignment is:

  • Evaluate the stages and motivating factors of a cyber operation in network traffic.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.

Instructions

Write a 3- to 5-page paper in which you:

  • Describe the goals and objectives of each of the seven stages of cyber operations, defined for this assignment as:
    • Target recognition.
    • Reconnaissance.
    • Gaining access.
    • Hiding presence.
    • Establishing persistence.
    • Execution.
    • Assessment.
Moonlight Maze Incident
  • Explain how each cyber operations stage of the Moonlight Maze incident was implemented and what motivated the activities during each stage.
  • Describe the regulations or laws that were instituted in the U.S. because of the Moonlight Maze incident, citing specific, credible sources.
Stuxnet Incident
  • Explain how each cyber operations stage of the Stuxnet incident was implemented and what motivated the activities during each stage.
  • Describe the regulations or laws that were instituted in the U.S. because of the Stuxnet incident, citing specific, credible sources.
Source Citations and Writing
  • Support your main points, assertions, arguments, or conclusions with at least three specific and credible academic references synthesized into a coherent analysis of the evidence.
    • Cite each source listed on your references page at least one time within your assignment.
    • For help with research, writing, and citation, access the library or review library guides.
  • Write clearly and concisely in a manner that is well-organized; grammatically correct; and free of spelling, typographical, formatting, and/or punctuation errors.
    • Use section headers in your paper to clearly delineate your main topics.

chapter 9 & 10

Pick a theory from the text. Write 50 words about how the theory relates to your life

1 file for chapter 9- page 421

1 file for chapter 10- page 459 

Exp19_Excel_Ch04_ML2_Riverwood_Realty

  

Exp19_Excel_Ch04_ML2_Riverwood_Realty

Exp19 Excel Ch04 ML2 Riverwood Realty

Excel Chapter 4 Mid-Level 2 – Riverwood Realty 

  

Project Description:

You work as a real estate agent for Riverwood Realty, an independent real estate agency in Utah. As part of your end of year reports, you compile a list of homes that have sold in your sales region. To complete your report you will create an Excel table, apply Filters, Sort, perform basic calculations using unqualified structured references, and prepare the document to print.

     

Start Excel. Download   and open the file named Exp19_Excel_Ch04_Assessment_Homes.xlsx.   Grader has automatically added your last name to the beginning of the   filename.

 

Freeze the panes so   that the column labels do not scroll offscreen.

 

Convert the data to a   table and name the table Sales.

 

Apply Purple, Table   Style Dark 10 to the table.

 

Remove duplicate   records from the table. Excel should find and remove eight duplicate records.

 

Add a new column in   column I named Days on Market. Use unqualified structured   references to calculate the days on market (Sale Date – Listing Date) in   column I. Set column I’s width to 14.

 

Apply a Total Row to   the Sales table. Set the Selling Price and Days on Market totals to Average.

 

Use Quick Analysis to   apply the default Top 10% conditional formatting to column F. 

 

Apply 3 Traffic   Lights (Unrimmed) conditional formatting icon set to column I. Set the icon   to display green for homes that sold within 45 days, yellow for 46 to 90, and   red to homes that took more than 90 days to sell.

 

Filter the data to only display sales by the Selling   Agent Hernandez.

 

Sort the table in   Ascending order by City (Column C). 

 

Set the range A1:I83 as the   print area.

 

Save and close Exp19_Excel_Ch04_Assessment_Homes.xlsx.   Exit Excel. Submit the file as directed.

help

 

Pick only one topic:

-How to hack cryptocurrencies and block chain systems? What are the biggest weakness in those systems?

-Cloud security: Describe cloud security challenges and recent hacks and security controls to protect cloud environment

-Future of cybersecurity: Describe future of cybersecurity, what to expect in 5 year.

Artificial Neural network and Deep learning

Chapter 5

Discussion Question 1: What is an artificial neural network and for what type of problem can it be used for?

Discussion Question 2: Compare artificial and biological neural networks. What aspect of biological networks are not mimicked by artificial ones? What aspects are similar?

Discussion Question 3: What are the most common ANN architectures? For what types of problem can they be used?

Discussion Question 4: ANN can be used be used for both supervised and unsupervised learning. Explain how they learn in a supervised mode and in an unsupervised mode.

Exercise 6: Go to Google Scholar (scholar.google.com) Conduct a search to find two papers written in the last five years that compare and contrast multiple machine-learning methods for a given problem domain. Observe commonalities and differences among their findings and prepare a report to summarize your understanding.

Internet Exercise 7: Go to http://www.neuroshell.com/examples.html. Look at USG Corporation example. Comment on the feasibility of achieving the results claimed by the developers of this neural network model.

Chapter 6 

Discussion Question 1: What is deep learning? What can deep learning do that traditional machine-learning methods cannot?

Discussion Question 2: List and briefly explain different learning paradigms/methods of AI.

Discussion Question 3: What is representation learning, and how does it relate to machine learning and deep learning?

Discussion Question 4: List and briefly describe the most commonly used ANN activation functions.

Discussion Question 5: What is MLP, and how does it work? Explain the function of summation and activation weights in MLP-type ANN.

Exercise 4: Cognitive computing has become a popular term to define and characterize the extent of the ability of machines/computers to show “intelligent” behavior. Thanks to IBM Watson and its success on Jeopardy! cognitive computing and cognitive analytics are now part of many real-world intelligent systems. In this exercise, identify at least three application cases where cognitive computing was used to resolve complex real-world problems. Summarize your findings in a professional organized report.

Textbook: Business Intelligence and Analytics 

ISBN: 9780135192016

Your response should be 5-6 pages. There must be APA formatted references (and APA in-text citation) to support the thoughts in the post.

Blockchain Project

 Identify a topic in your specialization. (For IT students,  Information Technology is not a topic, however, Millennial’s perceptions  of smart phone technology could be a topic.).  

  1. What is the cited problem? The problem you want to address has to  come from the literature, and be cited, who are saying there are  problems.
  2. What is the population you would like to address?
  3. What methodology are you planning on using? (If you are unsure, do  you plan on a quantitative or qualitative study? .
  4. Locate at least one article related to your topic. What was the  research question in the study? Who were the participants in the study?  What findings were reported?

Discussion Response – Algorithms and Their Apps

Please respond with 150 words or more to the discussion below with your own opinion on algorithms, sorting, and the concepts that go along with it. 

 

After reading and doing my own research about arrays in programing, I  thought it made sense and I understood it. I was familiar with GUI as I  have worked with VM Ware before. I’m a visual learner, so after  watching hours and hours of Youtube videos I did not think it would be  hard to incorporate into my program. Module 3 was the module I struggled  with the most. Not with understanding, but more so with writing the  actual program. I had such a hard time figuring out the proper commands  to put in to make the program do what I wanted it to do. I will keep  watching videos and asking peers and colleagues I have in the I.T world  for help. 

We use sorting in the real world more than we know. In the  programming world, sorting is a set of instructions that take an array  or list as an input and arrange the items into a particular  order. Sortings are mostly done in numerical order or alphabetical  order. Sortings can be done in ascending (A-Z, 0-9) or descending (Z-A,  9-0) order. In the real world, we use sorting when doing things such as  online shopping. We can filter results by sorting based on ascending  prices (low to high) or descending prices (high to low). We can also  sort y color, material, size, etc depending on what you are shopping  for. Another example of when we use sorting is when we are looking at  music we have downloaded on our smartphones, songs and/or artists are  usually sorted out alphabetically in ascending order.