Digital forensics evidence

 

  1. Compare and contrast the three categories of crime as outlined by the Cybercrime Convention computer-integrity crimes, computer-assisted crimes, and content-related cybercrimes.
  2. Provide an example of one of these types of cybercrime offenses

Write 1000 words document in APA format

Data mining

Assignment 1

When thinking about different algorithms and AI tools in organizations, what is the danger of having multiple data mining algorithms in various systems within an organization?  What can occur and why can this lead to inaccurate or inconsistent data?  Answer in 50 words.

Assignment 2

  1. What is knowledge discovery in databases (KDD)? 
  2. Review section 1.2 (Page no 4)and review the various motivating challenges.  Select one and note what it is and why it is a challenge.
  3. Note how data mining integrates with the components of statistics and AL, ML, and Pattern Recognition.
  4. Note the difference between predictive and descriptive tasks and the importance of each.

Follow the APA 7 format and keep the headings for each answer.  Ensure there are at least two-peer reviewed sources to support your work. Word document of 2 pages (this does not include the cover page or reference page).

Textbook: Introduction to Data Mining

topic writing

 After you have read the assigned chapters for the week, you will share your initial thoughts about what type of strategy you would like to use for your final paper. In your original post, answer the following: What writing strategy would you like to use to write your final paper? Why? What topic(s) would you like to write on for your final paper

Risk Mitigation Plan

  

Scenario

You are an IT security intern working for Health Network, Inc. (Health Network), a fictitious health services organization headquartered in Minneapolis, Minnesota. Health Network has over 600 employees throughout the organization and generates $500 million USD in annual revenue. The company has two additional locations in Portland, Oregon and Arlington, Virginia, which support a mix of corporate operations. Each corporate facility is located near a co-location data center, where production systems are located and managed by third-party data center hosting vendors. 

Company Products

Health Network has three main products: HNetExchange, HNetPay, and HNetConnect.

HNetExchange is the primary source of revenue for the company. This service handles secure electronic medical messages that originate from its customers, such as large hospitals, which are then routed to receiving customers such as clinics.

HNetPay is a web portal used by many of the company’s HNetExchange customers to support the management of secure payments and billing. The HNetPay web portal, hosted at Health Network production sites, accepts various forms of payments and interacts with credit-card processing organizations.

HNetConnect is an online directory that lists doctors, clinics, and other medical facilities to allow Health Network customers to find the right type of care at the right locations. It contains doctors’ personal information, work addresses, medical certifications, and types of services that the doctors and clinics offer. Doctors are given credentials and can update the information in their profile.

Health Network customers, which are the hospitals and clinics, connect to all three of the company’s products using HTTPS connections. Doctors and potential patients can make payments and update their profiles using Internet-accessible HTTPS websites.

Information Technology Infrastructure Overview

Health Network operates in three production data centers that provide high availability across the company’s products. The data centers host about 1,000 production servers, and Health Network maintains 650 corporate laptops and company-issued mobile devices for its employees.

Threats Identified

Upon review of the current risk management plan, the following threats were identified:

§ Loss of company data due to hardware being removed from production systems

§ Loss of company information on lost or stolen company-owned assets, such as mobile devices and laptops

§ Loss of customers due to production outages caused by various events, such as natural disasters, change management, unstable software, and so on

§ Internet threats due to company products being accessible on the Internet

§ Insider threats

§ Changes in regulatory landscape that may impact operations

Management Request

Senior management at Health Network has determined that the existing risk management plan for the organization is out of date and a new risk management plan must be developed. Because of the importance of risk management to the organization, senior management is committed to and supportive of the project to develop a new plan. You have been assigned to develop this new plan.

Additional threats other than those described previously may be discovered when re-evaluating the current threat landscape during the risk assessment phase.

The budget for this project has not been defined due to senior management’s desire to react to any and all material risks that are identified within the new plan. Given the company’s annual revenue, reasonable expectations can be determined.

Project: Risk Mitigation Plan 

Senior management at Health Network allocated funds to support a risk mitigation plan. They have requested that the risk manager and team create a plan in response to the deliverables produced within earlier phases of the project.

The risk mitigation plan should address the identified threats described in the scenario for this project, as well as any new threats that may have been discovered during the risk assessment. You have been assigned to develop a draft of this new plan. 

GO19_AC_CH01_GRADER_1G_HW – College Construction 1.0

GO19_AC_CH01_GRADER_1G_HW – College Construction 1.0

  Project Description:

In this project, you will create database objects to track the construction projects and the events related to the projects at a college. You will create a table and import data from Excel to create a second table. You will use a database template to enter data into the Events table. You will create a simple query, a form, and a report.

     

Start Access. Open the file Student_Access_1G_College_Construction_HW.accdb downloaded with   this project. Close the Event List multiple-items form that automatically   opened. Open the Navigation Pane.

 

In   Datasheet view, create a new table. Beginning in the second column of the   table and using the data type of Short Text, create the Building Project, Site,   and Contractor fields (in that order). In the fifth   column, using the Currency data type, create the Budget Amount   field.

 

Change   the data type of the ID field to Short Text, rename the ID field to Project ID and change the Field Size to 5

 

Starting   in the Project ID field, add the following three records to the new table:

  

P-356

Student Center,     3-story

Northeast Campus

RR Construction

61450000

 

P-823

Student Center,     2-story

Southeast Campus

RR Construction

41960000

 

P-157

Health Professions     Center

Northwest Campus

Marshall Ellis     Construction

42630000

 

Save   the table as 1G Projects, and then close the table.

 

Append   the records from the downloaded Excel file a01G_Projects.xlsx to the 1G Projects table.

 

In   the Navigation Pane, organize the objects by Tables and Related Views. Open   the 1G Projects table (the table has eight records). Close the Navigation Pane.

 

Switch   the 1G Projects table to Design view. For the Project ID field, enter a   description of Enter the Project ID   using the format P-### For the Site field, enter a description of Campus Location.   Save the table.

 

Switch   to Datasheet view, apply Best Fit to all of the fields in the table, save the   table, and then close the table.

 

Import   the records from the downloaded Excel file   a01G_Contractors.xlsx into the database as a new table named 1G Contractors. Designate the first row as column   headings and the CO ID field as the primary key.

 

Open   the 1G Contractors table in Datasheet view (the table has four records).   Apply Best Fit to all of the fields in the table, save the table, and then   close the table.

 

   Based on your 1G Projects table, use the Query Wizard to create a simple   query. Add the Site, Building Project, and Budget Amount fields (in that   order). Keep the default name of 1G   Projects Query, click Finish to display the query results, and then close   the query.

 

Based   on your 1G Projects table, use the Form tool to create a form for the table.   Save the form as 1G Project Form, display the form in Form view, and   then close the form.

 

Based   on your 1G Projects table, use the Report tool to create a report. Delete the   Budget Amount field from the report. Save the report as 1G Projects Report.

 

Sort   the Building Project field in ascending order. Set the width of the Building   Project, Site, and Contractor fields to 2 inches. Delete the page number from   the report, save the report, and then close the report.

 

Open   the Navigation Pane, open the Event List form, and then close the Navigation   Pane. In the Event List multiple-items form, enter the following two records   (the Start Time and End Time data will reformat automatically):
 

  Title: Groundbreaking Start Time: 6/13/22 10a End Time: 6/13/22 11a Description:   Student Center groundbreaking   Location: Northeast Campus
  Title: Dedication Start Time: 8/26/22 12:30p End Time: 8/26/22 2p
  Description: Gymnasium building   dedication   Location: Southwest Campus

 

In   the Event List form, click New Event, and in the Event Details single-record   form, enter the following record (the Start Time and End Time data will   reformat automatically):
 

  Title: Community Arts Expo Start Time: 10/5/22 6p
  End Time: 10/5/22 9p   Description: Book and Art Expo at   Library   Location: Southeast Campus 

Read the Green Computing Research

  

 Read the Green Computing Research Project, Part 2 in Appendix C. Document the requirements and develop a scope statement.
Write a 2-3 page paper in which you:
1. Document the requirements based on the information provided and assumptions that you have made, including a requirements traceability matrix.
2. Include a list of questions to ask the sponsor about the project scope. Include at least six (6) questions for full credit.
3. Develop a scope statement for the project.
4. Describe product characteristics and deliverables
5. Use at least two quality resources in this assignment

week2 assignment

 Need this assigment by saturday(09/03) 11:30pm

In 500 words

Step 1: Review the business rules and components you identified in week 1(attached below), and use the information to create your tables and an entity relationship diagram.  You can add business rules, entities, and structure to the concept as you create the diagram.  The diagram should have at least 5 tables. Show the primary key and relationships.  You can use Visio, Powerpoint, the Oracle SQL (Links to an external site.) developer data modeler or Access.   Paste your graphics or screen captures in a Word document and turn in to the professor via the online class. 

Step 2: Continue to work on your database (Links to an external site.) using: Excel.  Take screen captures of the work you have done so far and include them in a Word document. Turn in to your professor via the online class.  

Step 3: Extra information: Review the information re: Oracle data models at: http://www.oracle.com/technetwork/developer-tools/datamodeler/overview/index.html (Links to an external site.) 

Note:No copypaste strickly, plagiarism results in termination.

Include references.

 

disaster and recover planning

 

Please provide references for your original postings in APA format.

1. Discuss the types of backup locations, per the text and Powerpoint presentation raeadings for the week.

2. Would a single backup location be adequate or should a combination be used? What combination would you recommend?