Check each attachment!!
5s week 2 assignment BS
in 300 words
Learning About OWASP
Visit the OWASP website.
Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP.
See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.
Safe Assign is software that verifies the originality of your work against on-line sources and other students.
Include references, do not copy paste.
700 words: Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter).
Chapter 11 – Review the employment challenge in the digital era (as well as the entire chapter). Reflect on the various challenges are present in the digital era. Will things get better or more complicated as times goes on? Explain. What are some methods to assimilate new generations into the workforce to think about competitive advantage?
Digital Forensics
Cybercrime Law, Computer-Integrity Crime, Fraud, and Abuse.
Preamble.
Integrity of evidence, cyber-crime, fraud, and abuse are prefaced on the assumption that computer and internet technologies are designed to make life easier for a public and private organization, the judicial system, and forensic investigators; it has, unfortunately, made life incredibly challenging and enduring in all levels of forensic investigation. Cyber-crime, fraud, abuse, are open-ended criminal operations, allowing unauthorized users to obtain information from various sources against a target organization. Naturally, criminals are endowed with extraordinary skills and expertise to break into any organization’s secured network center. Most criminal are have access automated freeware tools available on computer and Internet and breaks into the organization’s secured network system, data, assets, resources, to make forensic investigation exceedingly tricky. Most organizations and the global community are actively using computer and internet technologies to build four walls around security data storage centers, creating an opportunity for forensic investigator’s ability to produce reliable evidence. Similarly, organizations and the global defensive approach require a proactive plan of action to guide against data breach. This section examines the primary federal statutes used to prosecute cybercrime. The focus is on the Computer Fraud and Abuse Act and the statutes criminalizing identity theft, child pornography, and copyright and trademark offenses (Casey, 2011: 86-95).
Computer Fraud and Abuse Act
The Computer Fraud and Act, Abuse is the primary source of federal law related to computer cybercrimes, and approval of the Computer Fraud and Abuse Act (CFAA) in 1986. The amendments were designed to update specific Arts provisions in light of advancements in computer and internet technologies and to address loopholes that existed in earlier versions of the Act. Criminals gaining unauthorized access to a computer, disseminating malware, launching denial of service attacks, trafficking passwords, and using computers and the internet to commit fraud. Criminals are sophisticated and can intentionally use the computer and internet technologies without authorization.
Research Question 2:1. Develop a measurable research framework of hos computer fraud and Abuse Act (CFAA) can play a role during the forensic investigation and impact on conclusive evidence in court.
Research Question 2:2. To what extent can the computer fraud and Abuse Act (CFAA) of 1986 empowers forensic investigation to bring cyber-crime, fraud, and abuse to justice.
Situation 1.
Naturally, criminals often retain extraordinary skills and expertise to break into any
organization’s secured network center. The criminal fully utilizes automated freeware
tools available on computers and the Internet and breaks into the organization’s secured network system, data, assets, resources, and makes forensic investigation exceedingly.
- These extraordinary skills, expertise, and availability of automated freeware tools are creating a considerable obstacle against the forensic investigation process. We are the nation of law.
Question 2:3. Develop a measurable research framework of amendment items needed to strengthen the computer fraud and Abuse Act (CFAA), and expand forensic investigator authority over criminal activities.
security policy
security policy
linux
1. For this discussion topic you need to apply the things that you have read and come up areas of enterprise that docker would be most useful for.
2. As you have learned from your reading Docker is available for many platforms and in many forms. Your assignment is to research containerization solutions that are competitors to Docker and compare and contrast them. You should find at least two competitors and investigate their features compare and contrast them and see where each of them have advantages.
3. For this discussion topic you need to apply the things that you have learned throughout the course. Consider all of the virtualization topics that have been covered and discuss how you see the role of virtualization moving forward in the enterprise.
4. For this assignment you are going to research various orchestration options and evaluate them to see which ones you think would add value to a business. You should as part of this assignment develop a method to objectively evaluate the platforms and the arrive at a conclusion using your method. Make sure to justify the components of your decision making process while you explain them.
5. you are expected to do research and post your findings on the pros and cons of cloud computing
Cyber Law – Discussion 1
Read Chapter 1 of the Goldman Textbook and describe in a minimum of 500 words what the Internet is and how it has changed the world. Post should contain APA citations and add references
Assignment
Discussion #2: Discuss the financial benefits of chatbots. Discussion
#4: Discuss the limitation of chatbots and how to overcome them.
#5 Discussion Examine Alexa’s skill in ordering drinks from Starbucks.
Due care due deligence 1
Distinguish between due care and due diligence.
- Based on your experience, provide examples of due care and due diligence.
- 500 words
Quality Management and control Project Draft and Final Project
Course Name: Quality Management and control
Project Topic:
INSTRUCTIONS FOR THE PROJECT REPORT
1. Abstract
a. This section should:
i. Provide an overview of the project you are going to be working on.
b. It should include the following:
i. A brief summary of the project to be done.
ii. The purpose of the project or the problem being solved.
iii. General overview of how the problem was studied.
iv. The findings and conclusions.
Note:
· The abstract should be between 150 and 250 words.
· The abstract should be a single paragraph double-spaced and should not be indented.
2. Introduction
a. This section should contain:
i. Sufficient background information about the quality tools – Pareto or histogram and control charts – you are about to employ. Therefore, do some research on the quality tools you will be using for the project. Include some information about the project, for example, information about defects.
ii. The rationale for the project.
Note:
· This section should be at least two to three pages.
3. Methods
The method section should be written in narrative, paragraph format. It should describe the steps you intend or have taken in order to complete the project.
a. This section should contain:
i. How you would sample and collect the data in your field and what each category of data would represent.
ii. A list of all the steps you intend to take to create the charts.
Note:
· This section should be at least two to three pages.
4. Results
The results section should contain all the charts you have created. You should label the charts. A simple description of the charts should be made under each chart.
Note:
· This section has no page limit.
· Include these Pareto charts or histogram and any of the control charts.
5. Discussion and Conclusions
This section should discuss and conclude your results – discuss the charts, discuss any trend of the defects over the period such as five-day period chosen. It should also explain how the project turned out and whether or not there is room for improvement.
Note:
· This section should be at least one to two pages.
· Discuss significant/vital few versus trivial/useful many.
· If you have created a histogram, describe the distribution.
· Provide ideas for fixing the defects/problems permanently.
· Include your recommendations.
6. Draft Report
This section should contain your draft report. Draft means you think the paper is good to go; you think it is done. The paper is draft because it has not yet been accepted or published. It also only draft because you haven’t yet submitted it for final evaluation. Before you submit this draft, you should have already completed the project and double checked spelling, grammar, punctuation, and APA style. You are strongly encouraged to have had others read the report before submitting it to the instructor. Use the grammar checker in your Word processor set to the most stringent setting. This should be submitted to Turnitin.
Note:
· The draft report should contain the following: abstract, introduction, method, results, and discussion and conclusion. Please make sure you have a title page, a table of contents, a list of figures, and a list of tables in the final submission and also put a reference section (Use a minimum of five references). The draft report should be in MS Word.
7. Final Report
This section should be your absolute final version of your project report. Please use APA style. This should be submitted to Turnitin.
Note:
· The final report should be an improvement over the draft report.
8. PowerPoint Presentation – PLEASE DON’T WORK ON THIS (8) PowerPoint Presentation.
This section should contain at least 12 slides on the important aspects of the project. This will be presented in class and submitted on Canvas.
9. Evaluation
You should evaluate your team members by the evaluation form on Canvas and send your evaluations to the instructor as a file upload through Canvas.
Note:
· Only those who have worked in teams can evaluate each other.
· Use the evaluation forms under Project Module.
· Evaluation is confidential.
· Evaluation points (five points) are extra credit.
Other Project Requirements
· Use APA style (sixth edition) for the report except when conflicting with the project requirements. If you don’t have APA manual, click https://owl.english.purdue.edu/owl/resource/560/01/
· Use a minimum of five references
· There should be a title page and a table of contents
Submission
· Submit draft report at Draft Report Submission under Project Module.
· Submit draft spreadsheet file at Spreadsheet File Submission under Project Module.
· Submit final report at Final Report Submission under Project Module. Many universities and associations believe that using more than 5-10% of other’s work in your document (even if quoted and cited correctly) is too much; that you haven’t done enough original work. PSU subscribes to Turnitin which checks how much of your work is original. This is not just used to check for plagiarism but also for originality. Turnitin will be used for the draft and final reports. Your Turnitin score should be no more than 10%.
· Submit final spreadsheet file at Spreadsheet File Submission under Project Module.
· The due date and time for the submission of spreadsheet file and Word file is posted on Canvas. For reports submitted after the due time a subtraction of 10% will be taken from the score and 5% shall be taken for each subsequent business day. It is the student’s prerogative to wait until the last minute to submit the report and gamble that he/she will be prevented from submitting the paper on time because of some unforeseen event.