wk3dis_531

 Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics. 

Data Mining

Write one page on how data mining helps to gain competitive advantage for businesses. Include at least 2 references and in-text citation.

Research paper for inferential statistics in decision making

Regression test for statistics:

Regression test (2 pages)

Half page introduction(article) 

Image should be like statistical graph

Analysis.

Results of the test

NOTE: – 1.     APA format and should have references to each page 

               2.     Total Document should contain minimum 2 pages

Interm1

  For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available. You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:Week 3 – Prepare a two-page paper (double-spaced) that describes the device or system you will investigate and the intended tool you plan to use to conduct your forensics investigation. The interim paper should be in the form of an Executive Summary. Be sure to provide references in APA format. 

risk management

Bellow URLS Will discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management.

Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. 

ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.

URL : https://s3.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/7209489?response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Week9-Interdependent%2520Strategic%2520Security%2520Risk%2520Management%2520With%2520Bounded%2520Rationality%2520in%2520the%2520Internet%2520of%2520Things.pdf&response-content-type=application%2Fpdf&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20201020T180000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAYDKQORRYTKBSBE4S%2F20201020%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=e26ec3baa22db08b5f2bb413601387c1f340d6e88d07bdccf91e126e4724f5e5

URL : https://web.a.ebscohost.com/ehost/results?vid=0&sid=34cd95fb-0bc3-4ed4-a199-d7450c412c71%40sdc-v-sessmgr02&bquery=Total%2BInformation%2BRisk%2BManagement%253a%2BMaximizing%2Bthe%2BValue%2Bof%2BData%2Band%2BInformation%2BAssets&bdata=JkF1dGhUeXBlPXNoaWImZGI9ZTAwMHhuYSZ0eXBlPTAmc2VhcmNoTW9kZT1BbmQmc2l0ZT1laG9zdC1saXZl

600 discussion on the organizational leadership (Description box has more info)

1. Organizational performance is the fifth aspect of the model, reflect on the question, do certain leadership behaviors improve and sustain performance at the individual, group, and organizational level?  Please explain your response.

2. There were two types of innovation addressed  (product and process innovation), please note your own personal definition of these concepts and offer an example of both.

Cyber Crime Final Project

Final Project

*****

This is an individual project or max, two team project in which you will conduct research on computer/digital forensics to learn more about associated underpinnings.

*****

The research you select should cover a forensics topic discussed or presented in the course. The topic you select is entirely up to you. I have included 6 examples below.  You can select one of these (first come/first serve) or submit your own.

Post in the Discussion Forum your Forensics Project. No Duplicate Forensics Project allowed.

*****

Post your Forensics Project Name in the Discussion Forum with the names of your team-mates by Tuesday, October 6th.

*****

The deliverable is (1) a report (PowerPoint) submitted to me in Blackboard (Final Project dropbox on Week 12 & Discussion Board thread) by Nov 10, and (2) a ten minute presentation in class on deliverable including any demo in Nov 10. The report should include:

– Project Description

– Project Goal/Objectives

– Details of Work Performed

– Outcomes

– Conclusion

Grading Rubric – 25 Points towards Final Grade:

– 15    points for Complexity of Project (High = 3, Medium = 2, Low = 1)

– 5    points for Report

– 5    points for Presentation

TOPIC:

(10) Image File Tampering

Create an image file tampering using either a FaceSwap app, Photo Editing application to change the image file. Compare the hash, EXIF (Exchangeable Image File) metadata of all the files you have tampered from the original.

The project requires a brief paper and a power point document. 

Paper needs to be no more than 2 pages.

Need both assignments by 4pm Eastern. 11/17
Paying $30 for both. 

plain view doctrine

 

Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

Use your own words and do not copy  the work of another student.

Attach your WORD document here.