Assignment

 

In 500 words or more, discuss the benefits of DNS failover as an adjunct to cloud failover. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

digital forensic

1. Digital_evidence_and_US_justice_system – Google Drive 

 

  • Summarize the current challenges and difficulties faced by the U.S. Justice system in digital forensics.
  • Identify how constant change in technology affects digital forensics and data acquisition in the U.S. Justice System.
  • Importance of documentation of digital evidence 
  • The importance of digital evidence processing in investigations. 

2. SWGDE-Best-Practices-for-Mobile-Phone-Forensics-021113 (1) (1).pdf 

 identify three potential problems “mobile devices” digital forensics data acquisition could present in the future. 

H2

 Please answer all the questions on the attached Homework-1 Module, and please review the APA doc. 

Assignment

  

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Assignment:

This is a required assignment, worth 100 points, and must be submitted by the due date. Late assignments will not be accepted.

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Submit your Practical Connection Assignment here.

Week 10 Assignment – Designing a Secure Network

 

 

Introduction

In this three-part assignment, you will  apply the various concepts you have learned throughout this course to  the design of the single most secure network possible, capable of  supporting three IT services: e-mail, file transfer (centralized), and  VPN. After you have fully designed your  network, you will need to provide three data flow diagrams explaining  how your designed network handles three different transactions: 

  • The first datapath diagram should show an internal user sending an  e-mail with their corporate e-mail address to a user on the Yahoo  domain with an arbitrary address of [email protected].
  • The second datapath diagram should show a user initiating an FTP  session from inside your network to the arbitrary site of  ftp.netneering.com.
  • The third datapath diagram should show an externally located  employee initiating a VPN session to corporate, in order to access files  on the Windows desktop computer DT-Corp534-HellenS at work.

The specific course learning outcome associated with this assignment is: 

  • Recommend solutions, products, and technologies to meet business objectives.

Instructions

Part 1

Use Microsoft Visio or an open-source alternative to: 

  • Create a diagram showing the overall network you have designed,  from the user or endpoint device to the Internet cloud; following the  access, core, and distribution layer model; depicting at least  four-fifths of the necessary network components; and citing specific,  credible sources that support the design. Include the following, at a  minimum:     
    • An authentication server (Microsoft Active Directory).
    • Routers.
    • Switches and/or hubs.
    • Local users.
    • Remote users.
    • Workstations.
    • File share (CIFS).
    • Mail server.
    • Web servers (both internal and external).
    • Firewalls.
    • Internet cloud.
    • Web proxy.
    • E-mail proxy.
    • FTP server (for internal-to-external transport).
Part 2

Use Microsoft Visio or an open-source alternative to: 

  • Create a datapath diagram for the following e-mail transaction:     
    • A local (corporate) user, with the e-mail address  [email protected], sends an e-mail to a Yahoo recipient at  [email protected].       
      • Document and label the diagram showing the protocols and path  of the data flow as data traverses through your network from source to  destination.
      • Show user authentication when necessary.
      • Cite specific, credible sources that support the diagram.
  • Create a datapath diagram for the following file transfer transaction:     
    • A local user, Jonny Hill, transfers a file, using FTP, through  the Internet to another company’s site (ftp.netneering.com). He has to  access the secure shell, using his active directory credentials, to  authenticate the FTP server (Linux running Redhat) on the DMZ. He needs  to transfer files from his desktop across the Internet to  ftp.netneering.com.       
      • Document and label the diagram showing the protocols and path  of the data flow as data traverses through your network from source to  destination.
      • Show user authentication when necessary.
      • Cite specific, credible sources that support the diagram.
  • Create a datapath diagram for the following VPN transaction:     
    • A remote user, Hellen Stover, connects, via VPN, from home  through the Internet to her corporate desktop, DT-Corp534-HellenS.  Hellen uses a browser to initiate her VPN connection. By going to  https://VPNaccess.corp534.com, she arrives at a login page where she  needs to authenticate using her Active Directory credentials before the  VPN tunnel is built.       
      • Document and label the diagram showing the protocols and path  of the data flow as data traverses through your network from source to  destination.
      • Show user authentication when necessary.
      • Cite specific, credible sources that support the diagram.
Part 3

Write a 6–10 page paper in which you: 

  • Explain the function and configuration of at least four-fifths of  all required network devices, citing specific, credible sources.     
    • Authentication server (Microsoft Active Directory).
    • Routers, switches, and/or hubs.
    • Local and remote users.
    • Workstations.
    • File share (CIFS).
    • Mail server.
    • Web servers (both internal and external).
    • Firewalls.
    • Internet cloud.
    • Web proxy.
    • E-mail proxy.
    • FTP server (for internal-to-external transport).
  • Explain how the overall network design protects the organization  from both inside and outside attacks, addressing all required network  design features and considerations and citing specific, credible sources  that support your assertions and conclusions. Address:     
    • Physical and virtual access.
    • Logging requirements.
    • Security policy.
    • Firewalls.
    • Proxy servers.
    • The VPN tunnel.
    • DMZ isolation.
    • User authentication.
    • Distribution of layer routers and switches.
  • Explain how your layered design compensates for possible device  failures or breaches in network security, addressing all key design  features and considerations and citing specific, credible sources that  support your assertions and conclusions. Include:     
    • Load balancing.
    • Swappable devices.
    • Standby backup devices.
    • QoS prioritization.
    • Vendor support for core and services.
  • Explain how to make the file transfer process more secure, fully  addressing FTP security risks and how specific FTP replacement devices  add protection, clearly delineating the features of each device, and  citing specific, credible sources that support one’s assertions and  conclusions.

Discussion Board: Perception

 

 In this unit, you are learning about how perception affects social situations.   

According to your textbook, we use four types of cognitive schemata to make sense of perceptions: prototypes, personal constructs, stereotypes, and scripts. We apply schemata to organize and interpret experiences in our lives. The schemata shape our perceptions and influence how we communicate.

Find a recent example in the media (commercial, scene in a movie/TV show, etc. that was produced this year) that features two or more of these schemata, and how it influenced the social situation in the media clip. Please include an APA reference for your media clip. 

Assg -7b

 

Follow the instructions in the given Week 6 While Loops PDF document for his week’s assignment. Once you completed all steps , then you will upload the .CPP files

Upload the following .CPP files.

LastNameW6A1.cpp
LastNameW6A2.cpp
LastNameW6A3.cpp
LastNameW6A4.cpp
LastNameW6A5.cpp

Week6_WHILE_LOOPS.pdf 

Report 2

Now, put into practice what you have studied in this course.

Note: You need to include (if any) your used forms, etc. and also include your actual collected data (no names). 

Formatting the document: include a Title page with student name, course number, etc. ALL BOLD and CENTERED, any appropriate font size accepted. Document Written in single column format. Document Written in Times New Roman font. Regular (paragraphs) are written in font size 12 regular (non bold). Subsection titles (have at least 11 subtitles) are written in font size 12 BOLD and numbered 1. 2. 3. Etc. Paragraphs are left and right justified.

Your report should include in addition to the title page the following sections:

1-     Compile a list of usability and user experience goals using design goals (ch1)

2-     Transfer them to questions using design goals (ch1)

3-     identify users’ needs and identify user requirements and then list main tasks (ch10).

4-     Come up with scenarios and use cases (ch10).

5-     come up with requirements and write them using Volere shell (ch10).

6-     come up with a conceptual model (ch2).

7-     Elect a mental model from people (ch3).

8-     Analyze findings and come up with an enhanced conceptual model (ch3).

9-     consider interface design issues (ch6).

10-  Sketch some initial designs (including the interface) (ch9).

11-  Evaluate the two designs and then select one to implement in next phase(ch9).