refer to the attached document.
Lab Paper
identify the scope for an IT risk-mitigation plan, you will align the plan’s major parts with the seven domains of an IT infrastructure, you will define the risk-mitigation steps, you will define procedures and processes needed to maintain a security baseline for ongoing mitigation, and you will create an outline for an IT risk-mitigation plan
Computer
attachment
Practicum 1 & 2
1. Practicum 1 – Evidence collection; this phase is meant to act as though you are the forensics investigator collecting the evidence directly from the source. In this instance, the memory dump information has been provided to you.
a. Deliverable(s):
i. Download the Narcos files. NOTE: THIS WILL TAKE TIME, THE FILES ARE LARGE.
ii. Create a chain of custody form using the provided template. Document the receipt of evidence files (each memory dump file and image should be its own line) by entering your name, date, evidence info (what it is), and a hash value of the file.
iii. Make a second tab in the CoC and document any known information from the scenario (Persons, places, etc.) – use the above provided information as well.
2. Practicum 2 – Evidence Review; Focus on the actual review of the provided files and try to piece together an event trail by following forensic investigation standards (REMEMBER DAUBERT, FRYE, AND OTHER STANDARDS TAUGHT IN THE PROGRAM!) Your goal should be to collect evidence to present to your boss in part 3.
a. Deliverable(s):
i. Continue to update the Chain of Custody form as you “check out” evidence to review.
ii. Review the evidence files and create an excel spreadsheet or Word doc (either is fine) documenting any relevant information you can find. NOTE: This portion of the project will not be given to you. All resources (including each other) are at your disposal (Others, GOOGLE!!) and all are accepted for your use!
You will code, build, and execute
. c++
You will code, build, and execute an Automated Teller Machine (ATM) Menu-Driven Console Application. You will utilize classes in the design of this program.
Learning outcomes:
To be able to explain the need for menus in a program
To be able to determine ways to implement menus in a Windows console application
To be able to understand the classes and objects used in a Windows console application
To be able to write a Windows console application
Deliverables
Section
Deliverable
Points
Lab 6
Step 5: Program Listing and Output 45
Lab Steps
Preparation:
If you are using the Citrix remote lab, follow the login instructions located on the iLab tab in Course Home.
Locate the Visual Studio 2010 icon and launch the application.
Lab:
Part A: Password XXXXX
Step 1: Requirements
Write a windows console application that simulates an Automated Teller Machine (ATM) menu similar to the following (this program assumes you are uniquely logged in).
Welcome to the DeVry Bank Automated Teller Machine
Check balance
Make withdrawal
Make deposit
View account information
View statement
View bank information
Exit
The result of choosing #1 will be the following:
Current balance is: $2439.45
The result of choosing #2 will be the following:
How much would you like to withdraw? $200.50
The result of choosing #3 will be the following:
How much would you like to deposit? $177.32
The result of choosing #4 will be the following:
Name: (Student’s first and last name goes here)
Account Number:(NNN) NNN-NNNN/p>
The result of choosing #5 will be the following:
01/01/11 – McDonald’s – $6.27
01/15/11 – Kwik Trip – $34.93
02/28/11 – Target – $124.21
The result of choosing #6 will be the following:
Devry Bank, established 2011
(NNN) NNN-NNNN/p> 12345 1st St.
Someplace, NJ 12345
The result of choosing #7 will be the following:
*Exit the program – terminate console application.
Step 2: Processing Logic
You will create a Menu Builder class (for menu applications), a Test Menu class (for Main), and a MenuBuilder.h for a total of three files as a demonstration of understanding, creating, and using classes.
Using the pseudocode below, write the code that will meet the requirements.
Create a Test Menu class
For main method and to call the Menu Driven class
Create a MenuBuilder Class
This will be where you create statements for the following:
1. Check balance
2. Make withdrawal
3. Make deposit
4. View account information
5. View statement
6. View bank information
7. Exit
Create a MenuBuilder.h
Include a header file in your program.
2. This will be where you utilize standardized Identifiers,
preprocessor directives, classes, namespaces, and so forth.
Step 3: Create a New Project
Create a new project and name it LAB6. Write your code using the Processing Logic in Step 2. Make sure you save your program.
Step 4: Compile and Execute
a) Compile your program and eliminate all syntax errors.
b) Build your program and verify the results of the program. Make corrections to the program logic if necessary until the results of the program execution are what you expect.
Step 5: Print Screenshots and Program
Capture a screen print of your output. (Do a PRINT SCREEN and paste into an MS Word document.)
Copy your code and paste it into the same MS Word document that contains the screen print of your output.
Save the Word document as Lab06B_LastName_FirstInitial.
OR
A. Lab # CIS CIS170C-A6
B. Lab 6 of 7: Menu-Driven Application
C. Lab Overview – Scenario/Summary
You will code, build, and execute an Automated Teller Machine (ATM) Menu-Driven Console Application. You will utilize classes in the design of this program.
Learning outcomes:
- To be able to explain the need for menus in a program
- To be able to determine ways to implement menus in a Windows console application
- To be able to understand the classes and objects used in a Windows console application
- To be able to write a Windows console application
D. Deliverables
Section
Deliverable
Points
Lab 6
Step 5: Program Listing and Output
45
E. Lab Steps
Preparation:
If you are using the Citrix remote lab, follow the login instructions located on the iLab tab in Course Home.
Locate the Visual Studio 2010 icon and launch the application.
Lab:
Part A: Password Program
Step 1: Requirements
Write a windows console application that simulates an Automated Teller Machine (ATM) menu similar to the following (this program assumes you are uniquely logged in).
Welcome to the DeVry Bank Automated Teller Machine
1. Check balance
2. Make withdrawal
3. Make deposit
4. View account information
5. View statement
6. View bank information
7. Exit
The result of choosing #1 will be the following:
Current balance is: $2439.45
The result of choosing #2 will be the following:
How much would you like to withdraw? $200.50
The result of choosing #3 will be the following:
How much would you like to deposit? $177.32
The result of choosing #4 will be the following:
Name: (Student’s first and last name goes here)
Account Number: 1234554321
The result of choosing #5 will be the following:
01/01/11 – McDonald’s – $6.27
01/15/11 – Kwik Trip – $34.93
02/28/11 – Target – $124.21
The result of choosing #6 will be the following:
Devry Bank, established 2011
(123) 456-7890
12345 1st St.
Someplace, NJ 12345
The result of choosing #7 will be the following:
*Exit the program – terminate console application.
Step 2: Processing Logic
You will create a Menu Builder class (for menu applications), a Test Menu class (for Main), and a MenuBuilder.h for a total of three files as a demonstration of understanding, creating, and using classes.
Using the pseudocode below, write the code that will meet the requirements.
Create a Test Menu class
For main method and to call the Menu Driven class
Create a MenuBuilder Class
This will be where you create statements for the following:
1. Check balance
2. Make withdrawal
3. Make deposit
4. View account information
5. View statement
6. View bank information
7. Exit
Create a MenuBuilder.h
1. Include a header file in your program.
2. This will be where you utilize standardized Identifiers,
preprocessor directives, classes, namespaces, and so forth.
Step 3: Create a New Project
Create a new project and name it LAB6. Write your code using the Processing Logic in Step 2. Make sure you save your program.
Step 4: Compile and Execute
a) Compile your program and eliminate all syntax errors.
b) Build your program and verify the results of the program. Make corrections to the program logic if necessary until the results of the program execution are what you expect.
Step 5: Print Screenshots and Program
1. Capture a screen print of your output. (Do a PRINT SCREEN and paste into an MS Word document.)
2. Copy your code and paste it into the same MS Word document that contains the screen print of your output.
3. Save the Word document as Lab06B_LastName_FirstInitial.
END OF ILAB
Summary Paper
Write a summary paper that discusses the importance of ethical codes of conduct for
cybersecurity professionals and their organizations. See specific instructions attached. Must be in APA format. Please note the paper must feature the following career tracks:
1. Network Enterprise Infrastructure
2. Internet and Multimedia Applications
IT Project Management Individual Assignment
READ INSTRUCTIONS CAREFULLY!
ALL INSTRUCTIONS WILL BE IN “ITPM CA3” FILE
THERE WILL BE 20 PRESENTATIONS FOR ADDITIONAL INFO
NEED TO BE DONE IN 24 HOURS
Research Paper on Latest technology ( 10 pages)
Instructions:
Search for “Latest Technology” and choose any latest technology since 2020 from the Google Search result for your research paper
Sub Headings: Introduce the technology; Explain the purpose of its invention; Analyze its positives; Discuss its negatives or perceived weakness; and suggest how you can improve on the technology.
It should be at least 10 (excluding references) with at least 5 APA citations & matching references
Formatting: Introduction; Image / Table; Conclusion;
APA Format and “NO Plagiarism”
No Money negotiations after accepting the Bid
Research for gaming
Track Specialty: Gaming Software Developer
Report: Your task for this project is to create a 3–4-page report about your assigned specialty. This report will be a professional document that showcases your team’s research, writing, and technical skills (utilizing MS Office, inserting graphs/charts/images, etc.). Your report should include:
(( 1 -What are current trends, innovations, risks within this area?)) 1 page (Intro/answer)
2-Who are the key players/people you need to know in this industry?
3-Which companies do you need to know? Be thorough.
Best Practices for Obtaining Evidence from an ISP
Best Practices for Obtaining Evidence from an ISP
Learning Objectives and Outcomes
- Identify best practices for obtaining evidence for a digital forensic investigation from an Internet service provider (ISP).
Assignment Requirements
You are a digital forensics intern at Azorian Computer Forensics, a privately owned forensics investigations and data recovery firm in the Denver, Colorado area. Azorian has been asked to assist in an investigation of a possible cybercrime involving theft of intellectual property. The information will need to be obtained from an Internet service provider (ISP) while complying with any applicable laws and regulations. Your manager wants to update staff on details about best practices for working with ISPs and obtaining electronic evidence.Your manager has asked you to find a resource on the web that contains information useful to this investigation and write a report about the resource.For this assignment:
- Research the Internet for information on working with an ISP to legally obtains electronic evidence in a digital forensic investigation.
- Write a report that describes best practices for obtaining electronic evidence from an ISP.
Required Resources
- Course textbook
- Internet access
Submission RequirementsFormat:Microsoft WordFont:Arial, size 12, double-spaceCitation Style:Follow your school’s preferred style guideLength:1-2 pages
Self-Assessment Checklist
- I selected researched the Internet for information on working with an ISP to legally obtain electronic evidence in a digital forensic investigation.
- I wrote a report that describes best practices for obtaining electronic evidence from an ISP.
- I followed the submission guidelines.