Computer Science Homework

  

Expert Testimony

Introduction

You were the lead investigator on Operation Stop Hack and have now been subpoenaed as an expert witness in the case against the perpetrators. It is up to you to convey the complexities of the crime and evidence to the jury so they can understand the scientific procedures using in aiding the crimes resolution.

Instructions

Write a 3–5 page paper in which you:

  1. Analyze the overall procedures for First Responder and Incident Handling and ascertain the fundamental way in which such procedures relate to the scenario in this specific case.
  2. Explain the major steps involved in evidence acquisition and how to maintain the integrity of the evidence, outlining any and all repercussions if the evidence is improperly preserved.
  3. Consider the importance of the chain of custody and explain the main reasons why the documentation required to preserve the chain of custody is critical.
  4. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double-spaced, using Times New Roman      font (size 12), with one-inch margins on all sides. Citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title,      and the date. The cover page and the reference page are not included in the required assignment page length.

CS 1181

  

CS 1181

Upload the following programs using your Moodle account.

Asg6a.cpp

Write a program to store the results of a lab experiment involving daily temperatures in a text file named temperatures.txt. Prompt the user for the 6:00AM, Noon, and 6:00PM temperatures for a period of 7 days. The temperatures cannot be less than -50 or greater than 110. Write each temperature to the file using the following format:

field 1: day

field 2: 6:00AM temperature

field 3: Noon temperature

field 4: 6:00PM temperature

The file should have 7 records, one for each day.

NOTE: Store the temperatures.txt file in the same folder as the program source code.

Asg6b.cpp

Write a program to read the temperatures.txt file you created for asg6a and create a temperature report for each day with an average for each period using the following format:

Day Morning Noon  Evening

1 45 63 57

7 41 57 43

Average  nn.n nn.n  nn.n

ple week14 p14

Hello,

i need this paper by 4/28 afternoon 12am.

Strictly No plagiarism please use your own words.

Answer each these questions in a paragraph with five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

  1. Give an example from the book where insufficient testing was a factor in a program error or system failure.
  2. What was one cause in the delay in the completing of the Denver Airport.
  3. Why didn’t the healthcare.gov website work at first?
  4. What is one characteristic of high reliability organizations?
  5. Describe the potential risks of alert fatigue in EHR systems.
  6. What were 2 common factors in both the Therac-25 case and the space shuttle disaster.
  7. What does design for failure mean?

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

Discussion Reply!!! About 50 words

  

  • Review  contributions to threats and  vulnerabilities on a home network and determine if they have gaps in  their understanding.
  • Provide feedback on a classmate’s home  network security measures they are not currently using. Do you have any  other suggestions or recommendations for them?

What threats do you need to be concerned about on your home network?

Some threats that you should be concerned about are Ransomware,  Information Theft, Data Breaches, Malicious Ads, and Remote Access Tools  (RAT). Some of these threats you would think are targets for just big  companies.  There might be a young hacker trying to make a name for  themselves or wanting to settle a score with somebody.  Every threat  needs to be taken seriously and guarded against you never know who the  next victim of a hack will be.

What are the vulnerabilities of each of your devices on your home network

Almost every device has a vulnerability one way or another.  The more  devices you have on your network the more vulnerable you are. Opening  the wrong email on either a smartphone, computer, or even a smart tv can  infect your network.  Depending on what IoT devices you have on your  network your whole house could be vulnerable.  For example, you have an  attached garage to your house, and you never lock the door between your  house and the garage.  You have your garage door opener linked to your  network and you get hacked with a RAT they can now gain access to your  house while you are away and rob you and there would not be any form of  forced entry into the house.  You would just think you forgot to lock a  door somewhere and that is how they got in; little do you know they used  the garage door to gain access into the house.  

What techniques can you use to protect your devices on your home  network? (Make sure to discuss how you will protect your network traffic  on your wireless network.)

Some good techniques to use to protect your devices is having a good  virus scanning software that scans your computers and network throughout  the day and will alert you of any possible treats that tried to gain  access to your network.  Keeping your software up to date will keep you  safer while on the internet and on your network; everyday there are new  ways to attack you if you do not keep up with the updates the software  will look past it as something that is vicious and can hurt your  network.  Change passwords from time to time, and never make it close to  the old password.  I have noticed a lot of online services requiring  you to come up with a more complicated password to keep your information  safe with using special characters. Do not use the same password for  everything.  You can use a VPN to help disguise your network and make it  harder to find and hack.

Discuss some home network security measures you are not currently using but may consider using.

I should change my passwords more often than what I do, and I am also  guilty of using almost the same password for everything because it is  easier to remember.  I know by doing this I put myself at risk of a lot  of things being hacked but with so many online services and accounts I  have it makes it easier to access them for me and not have to reset my  password every month.

References:

Trend Micro, (2017, February 20). Common Threats to Home Users and How to Defend Against Them

https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/threats-to-home-users-and-how-to-defend-against-them

Database – Discussions

Create a discussion thread (with your name) and answer the following question(s):

Discussion 1 (Chapter 12): Compare inheritance in the EER model (see Chapter 4) to inheritance in the OO model described in Section 12.1.5 

Instructions:  Your response to the initial question should be 250-300 words.  Next respond to two postings provided by your classmates. The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often. You are require to create your initial thread in order to view and respond to the threads posted by other students.  There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post as needed.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

IT 470

How did the W3C get started? Who can join the W3C and what is the cost?  

Not more than 350 words total. Respond to at least two other students (150 words each peer)!!

2. Two (2) paragraphs (350 Words total) discussion response to main DQ questions. In addition, respond with two (2) students/Peers to Peer (identify peers) or two classmates. The responses should 150 words each and must focus on the discussion topic above. Examine related issues, ask questions, provide hypothesis and/or situation(s). A peer response may not be to a peer already responded to more than twice.

Note: plagiarism is not tolerated in this course. Everything must be in your own words with sources! Failure to do so will result in failing grade. 

Project 6: Global Approaches to Cybersecurity Step 7: Compile International Cybersecurity Environmental Scan Findings

 Project 6: Global Approaches to Cybersecurity
Step 7: Compile International Cybersecurity Environmental Scan Findings

Compile all of the information you found in the previous two steps and write a two-page summary. Use the International Cybersecurity Environmental Scan Template to guide your summary, which should include descriptions of the regions and of the cybersecurity threats prevalent in the regions selected. Address the role of international bodies (NATO and United Nations) in influencing and contributing to international cybersecurity policies.

Submit your summary for feedback. This summary will be included in your final report.

Vulnerability Memo

 Your task this week is to check the internet and the Common Vulnerabilities and Exposures (CVE) List for networked IoT or IoMT devices with publicly known problems identified in the past six months.  

Select two devices related that might be relevant to the organization setting and review what is known about the vulnerabilities of these devices.

For each device, include background information about the device, a description of the vulnerability, possible solutions that have been identified to fix the vulnerability, and your recommendation on whether the organization should avoid the product.

Use this Memo Template to record your work.

How Will My Work Be Evaluated?

In writing a clear and concise memo to inform management about potential vulnerabilities, you are demonstrating communication skills, technical expertise, and responsiveness to stakeholder needs and concerns.

The following evaluation criteria aligned to the competencies will be used to grade your assignment:

  • 1.2.1: Identify the target audience, the context, and the goal of the communication.
  • 1.3.4: Balance original content with supporting sources.
  • 1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
  • 2.1.1: Identify the issue or problem under consideration.
  • 10.1.1: Identify the problem to be solved.
  • 10.1.3: Define the specifications of required technologies.
  • 12.1.1: Determine business needs that require policies, processes, and procedures.
  • 12.3.1: Select controls.
  • 12.3.2: Describe the implementation of controls.