Investigating and Prosecuting Cybercrime: 8-10 Pages Term Paper

  Paper outline

Title: Investigating and Prosecuting Cybercrime

1- Introduction

a. What is Cybercrime?

b. The different types of cybercrime we will focus on

2- Cybercrime Concerns

3- Laws/Penalties on Cybercrime

4- Law Enforcement: How to investigate and prosecute cybercrime

5- Constraints, Legal Guidance and Best practices

6- Conclusion

Instructions:

 

2. Term Paper:

You will write and submit a 8-10 page term paper (excluding title 

page, tables, figures, references, etc.) based on the feedback you received on the 

outline of your paper. Your final project will include the following sections: introduction, 

literature review, findings, discussion, policy implications, and conclusion. 

The paper will be evaluated on the usual criteria for assessing scholarly or scientific 

papers, such as quality of content, writing style and organization, demonstration of 

knowledge and mastery of the paper’s topic, use of literature sources, how well the 

paper relates or adds to the extant body of knowledge on the topic, adequacy of the 

approach taken in the paper, and the soundness of logic, theoretical reasoning, and 

conclusions.  

An abstract page and complete list of at least seven (7) references are also required, 

but do not count towards the page requirement. 

The paper must use the Times New Roman or Arial font size 12 and be double-spaced 

with one-inch margin on all sides.

Your project must conform to the APA style of writing. Other than the format of tables 

and figures, the three particular areas of the APA style you should pay attention are the 

use of levels of headings and sub-headings, the text citations, and the format of the 

references.

Mitigating cloud computing risks

Imagine you are an information security manager in a medium-sized organization. Your CIO has asked you to prepare a case analysis report and presentation on establishing internal controls in cloud computing. The CIO has seen several resources online that discuss the security risks related to cloud-based computing and storage. One that stood out was Cloud Computing Risk Assessment: A Case Study. You are asked to summarize the information you can find on the Internet and other available sources. The CIO wants to have a firm grasp on the benefits and risks associated with public, private, and hybrid cloud usage. There is also concern over how these systems should be monitored to ensure proper usage and data security.

Instructions

Write a 3–4 page paper in which you:

  1. Provide a summary analysis of the latest research available in this area.
  2. Examine the risks and vulnerabilities associated with public clouds, private clouds, and hybrids. 
    • Include primary examples applicable from the case studies you reviewed.
  3. Suggest key controls that organizations could implement to mitigate these risks and vulnerabilities.
  4. Develop a list of IT audit tasks that address a cloud computing environment based on the results from the analysis of the case studies, the risks and vulnerabilities, and the mitigation controls.
  5. Use at least three quality resources. Note: Wikipedia and similar websites do not qualify as quality resources.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.The specific course learning outcome associated with this assignment is:

  • Assess the risks and vulnerabilities with cloud computing along with controls for mitigating the risks and vulnerabilities.

Modify the Module

1) Modify the Module 5 Car class to provide a start() method that overrides the Vehicle class start() method and a speedUp() method that overloads the Vehicle class speedup() method.  The initial code for the Car and Vehicle classes, and the TestCar2 driver class from Module 5 is shown below.   The Car class’s overriding start() method must start a car in a southerly direction at zero speed.  The Car class’s overloaded speedup() method should just accept the additional miles per hour that the car should start moving from its current speed.  Modify the TestCar2 driver class to form a new TestCar3 driver class that creates a myCar3 instance and uses single start() and single speedup() method calls to use the Car class’s start() and speedup() methods only to accelerate it by 50 mph.  Be sure that you include the course, the program number, your name, and the date in your program header.  Include additional comments as necessary and maintain consistent indentation for good programming style as shown in the text.  Be sure that you capture all of your output for this program’s execution for full credit! 

 2) You may use any Java Integrated Development Environment (IDE) you choose to develop your source code, compile and link your code, and execute your program (jGRASP is recommended).  Or you may use the Windows Command Prompt.    You are to submit the following deliverables in a single Microsoft Word file in this order, and clearly labeled.     a) A screen snapshot of your Java source code (all file(s) shown separately)  displayed in the IDE or Windows editor showing a successful compilation if possible (only the beginning of the source file(s) are necessary).  

Java Interactive GUI Application for Number Guessing with Colored Hints  (based on Module 7 material)  1) Develop a Java application that plays a “guess the number” game as described below. a) Your application first gets a random number in the range 1-1000 inclusive (you might want to use Math.random() or the Random class).   b) The application then displays the following prompt (probably via a JLabel):  

Computer Networking Presentation

 

Submit a presentation that can be used by a small business to train its employees on the importance of network security. Your presentation, at a minimum, should  include slides that address the following:

  • why and how networks are attacked
  • why physical security is as important as the security that comes from properly selected/configured solutions, and 
  • the role employees play in network security.

Research about (Smart Meter)-(Theft Detection)

  ((What I need is a comparison table between papers))

– Papers should be about:

· The Systems Developed in Smart meters  

· The Systems Developed in Theft detection

– Papers not older than 2018 

– (NOT LESS THAN 6 papers)

Discussion Board

 Read the link mentioned below and consider the following questions for this discussion board:

 https://blog.bugsnag.com/bug-day-ariane-5-disaster/ 

 

1. Do you see the importance of choosing the right variable type for a range of values?

2. Should there have been a way to test this without risking the hardware?

3. Since the code worked well on previous missions, is it fair to blame the developers when the code was used on a faster rocket?

4. What other thoughts do you have about this incident.  

MKT -9

 

What Would You Do?

Three people applied to you for an opening as a lathe operator.  One is totally unqualified.  One is experienced, but has a poor attitude. The third lacks experience, but seems especially eager for the job; you think she would be a good worker if she had more experience, but you’re not sure.  You have some rush work you need to get out.  Which of the following courses would you choose?

1. If the eager applicant has good references, hire her for a probationary period. But keep looking for a more qualified person in case she doesn’t work out.

2. Pass up the three applicants. Keep looking.

3. Hire the experienced person, ignoring his attitude—you’ve got work to get out!

Question 1: Say what you would do and why you would choose that option.

Pages 499-500, Case 15.1

Question 2: What avenues are now open to Trent? What does this case say to you about the need for supervisors to act morally?

Write a shell script to locate

  

Write a shell script to locate executable files. This script takes a list of  file names from the command line and determines which would be executed had these names been given as commands.