Activity to do

“Research a security threat. Learn about the CryptoLocker Virus. Write a brief document targeted to end users that answers these questions:

-What are the symptoms that a PC has been infected by the CryptoLocker Virus?

-What advice would you give users about whether to pay the ransom demanded?

-How can a support specialist remove the CryptoLocker Virus from a user’s PC?

-What is the preferred method to avoid getting infected by the virus?”

 USE WORD (for this document). Use Captured Screens or Photos. Bullets are beautiful to list “symptoms that a PC…”, “advice would you give”, How can “, and “what is the preferred method” (of course, they are asking for 1 answer but a good writer/student aiming for an “A” grade would give two answers and say which is the best/or one you, as student, prefer. 

Web Forensics

 

Explain how cookies can show that a user has visited a site if that user’s history has been deleted.

Optional: install Windows Historian and see the sites visited by a particular user. 

Module 2 – Case assignment

  

Module 2 – Case assignment
In this case assignment, you will install Oracle database 11g express edition and SQL developer to your computer, validate your installation, and write a short 3-4 page paper with screenshots of your download. This assignment has three parts:
Part 1
To successfully finish this assignment, you will first need to study the required reading materials, follow the installation guide, and read the getting started guide.
Oracle database express installation guide (2011). Click here.
Oracle database express getting started guide (2011). Click here.
Part 2
Download SQL developer at http://www.oracle.com/technetwork/developer-tools/sql-developer/downloads/index.html. Make sure you download the zip file that include the JDK1.6.0_11.
Part 3
Following this link to learn how to connect to Oracle database using SQL developer.
Expectations:
Successfully install Oracle database 11g express edition and Oracle SQL developer to your computer
Describe your experience with the installation.
Open the sample database HR, and make screen shots of the database and copy them into your paper;
Open HR database, describe what information you see there, using the terms introduced in this module, such as table, schema and key. Describe the tables in HR database in detail.

 

Find data, explore data, make some pretty pictures

1. For this project you must find some published or existing data. Possible sources include: almanacs, magazines and journal articles, textbooks, web resources, athletic teams, newspapers, professors with experimental data, campus organizations, electronic data repositories, etc. Your dataset must have at least 250 cases, two categorical variables and two quantitative variables. It is also recommended that you are interested in the material included in the dataset. 2. Utilizing technology preform exploratory data analysis, EDA. (a) For at least one of the quantitative variables, include summary statistics (mean, standard deviation, five number summary) and graphical displays (histogram, box plot and qq plot). Are there any outliers? Is the distribution normal, symmetric, skewed, or some other shape? (b) Create a graphical display looking at multiple variables and their correlation. (c) For at least one of the categorical variables, include a frequency and relative frequency table. (d) Include a two-way table for two of the categorical variables and discuss any relevant proportions. Describe any possible relationship between the two variables. (e) Include a side-by-side plot for at least one categorical and at least one quantitative variable. Describe any association between the two variables. Use summary statistics to compare groups. (f) Create a visualization or preform a statistical computation that is appropriate to your data but not already included. 3. Write your report! (a) Introduce your data set including a reference to where it can be found. Describe all relevant variables that you will use in your analysis. (b) Describe all ways that were neseccary to clean and organize the data. (c) Include all items requested above. Include graphs and text about each. (d) Write a brief conclusion highlighting the most interesting features of your data. The report will be graded by the following criteria: ˆ Statistical analysis – 30 points. The statistical tests are all provided. ˆ Graphical Representations – 30 points. The requested graphical displays are made and included in report. ˆ Data collection – 15 points. The data is gathered in a responsible way. The method of collection is clearly stated and variables are all explained. If a sample of the data is used it is done in a proper way. ˆ Interpretations – 15 points. The results of the statistical analysis are clearly explained and interpreted in the context of the problem. The conclusions accurately reflect the analysis and are well supported. ˆ Writing quality – 10 points. The paper is readable and clearly written. There are few, if any, grammatical or spelling errors and they do not interfere with the clarity of the paper. Numbering on this document is not used in the report in anyway.

server virtualization and cloud computing

 This week, you have read about server virtualization and cloud computing in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness for virtualization.
  • Explain Microsoft (or another product) licensing for virtualized environments.
  • Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization.
  • Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azure’s Internet as a Service (IaaS) and storage capabilities

Make a recommendation for cloud computer use in the organization, including a justification for your recommendations.Submit your midterm research paper as a single document. Your paper should meet the following requirements:

  • Be approximately four to six pages in length (1200-1800 words), not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Application security

The concept of a multilayered defense strategy. Explore some of the advantages and disadvantages of embracing a multilayered defense strategy and contrast the approach with a monolithic approach to security.   

  • Contrast the advantages and disadvantages of using a multilayered approach to securing information system resources.
  • Explain how each advantage and disadvantage you identified in the first point impacts budget, usability, and the environment’s attack surface.
  • 500 words
  • APA format with references  needed

CIS 213 DB 4

 1 page apa format

Unit 4 Discussion: Work vs Product Breakdown

Compare and contrast the use of a Work Breakdown Structure versus a Product Breakdown Structure. Use an example of a business IT project you know of or have researched to clearly illustrate your points and understanding of these two breakdown structures. Additionally, please respond to two other classmates’ posts. 

IT473 Week 2

 

Discussion Week 02

Write a short survey on computer graphics.

The question is: How has computer graphics influenced the gaming industry?

This assignment is not a group paper. Follow the APA Publications Manual sixth Ed. Limit your first post to a minimum 300 words. You must include five verifiable references.

Cloud Testing Services

 

Instructions

  1. Research a cloud testing service. Some examples include: 
    • SOASTA CloudTest
    • Nessus
    • LoadStorm
    • BlazeMeter
    • QualiTest
    • SoftSol STiC

2. In a Word document, identify the following and write a brief summary of what you learned in your research:
 

  • The type, features, and functionality of the testing service
  • Who provides the service and billing/pricing options

 IMPORTANT: This is not a formal paper. Please be concise. be between 1/2 to 1 page.