bharg research paper

 

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Blockchain” (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?  How does big data affect a global economy.

Prompt 3 “Government and Policies” (1-2 pages):  Discuss the role government plays in a global economy.  Also, look at what policies are currently in place and then discussion what policies should be put in place..

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately six to eight pages long, including both a title page and a references page (for a total of eight to ten pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet these requirements: 

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

2019 Georgia cyber attack

2019 Georgia Cyberattacks

You are assigned with the task of writing a 1500-2000 word critical analysis academic paper on the incident response and disaster recovery of a specific cybersecurity incident. You will find your assigned cyberattack/breach in the list below. Your paper must analyze how the targeted/victim organization detected, responded to, and recovered from the attack. Your paper must include the following:

1. It must be 1500-2000 words not including the references (you will lose marks if you exceed or fail to meet the wordcount by). 

2. It must be an original work of your own research and writing skills, free of plagiarism. 

3. It must be in the ieee format with correct citations and references. 

4. It must be written in professional academic language free of colloquialisms but also written so that a reader with an unknown level of knowledge (such as a C level executive, a board member, or manager) can understand your meaning, argument, and purpose. 

5. You must use reliable sources. i.e. Trusted verifiable web resources (i.e. legitimate websites, news resources, white papers, peer reviewed works such as books, conference papers, reports journal articles, etc) NOT Wikipedia or personal blogs. 

6. Your paper must have an introduction with a clearly stated thesis (an argument statement that tells the reader the point you will make. For example, XYZ company’s response to the ABC cyberattack was poorly managed due to a lack of communication or 123 Corp prevented severe financial losses due to their incident response handling). The introduction is the roadmap/outline to your paper. Following the introduction there must be a body containing the history of the attack/breach and an analysis of the incident that supports and proves your thesis. Lastly, you must write a conclusion that states how you have proven your argument and why it matters to Contingency Planning (IRP, BCP, DRP). The written part of the paper must be followed by a properly formatted list of references.

Access control discussion 13

Discuss why business use cryptography?

It must be at least 450 words and have references.

No plagiarism and no grammar mistakes and need APA format.

properly cite the references.

Digital Forensics Tools and Tech – New England

 

Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness.

Write a short paper, 200-300 words, using WORD and submit here.

Resource assignment fri

Please find at least 5 sites with useful and relevant information that focus on some aspect of blockchain in finance. Include a short summary of the sites and the applicable citations/reference information.

Python Assignment

Instructions:

NOTE: Make sure to fully read the instructions before starting

With this file you will find a handful of files ending in .txt containing the following data:

schedule.txt:

    A table containing applications, command line flags, start times, stop times, whether the application is enabled,

    and the days of the week the application runs. Days of the week are read as follows:

    1,4-7 = Sunday, Wednesday, Thursday, Friday, Saturday

    *     = Every day of the week

apps#.txt:

    A date to consider and an unsorted list of application names

example.txt:

    Example output for apps1.txt

Create a Python 3 program that does the following:

    1.  Takes the path to a schedule file, the path to an app file, and the path to an output file as command line arguments

    2.  Writes a csv of the applications that would run on the date in the app file as well as their options,

        start times, and stop times

For example, executing the following should result in a file similar to example.txt:

    python3 script.py schedule.txt apps1.txt example.txt

You can assume the apps files will never contain an application that is not present in the schedule file and that

neither input will contain malformed or invalid data

Discussion 4

 

Preamble

In August of 1997, a Swiss couple, John 52 years old and Buntham 26 years old Graben Stetter, were arrested at the Hilton in Buffalo, New York, and accused of smuggling thousands of computerized pictures of children having sex into the United States. The couple were alleged by authorities to have sold wholesale amounts of child pornography through the internet and carried with them thousands of electronic files of child pornography to the United States from their Swiss home.

Allegations

  1. The couple were unproven to have agreed over the internet to sell child pornography to the United States (US) Customs agents posing as local US porn shop owners.
  2. The couple were suspected to have agreed to sell 250 CD-ROMs to US investigators for $10,000. According to reports, one CD-ROM had over 7,000 images.
  3. The couple were further alleged to have their 2-year-old daughter, traveling with them at the time of the arrest, who is also a victim.
  4. Authorities professed that photographs of the 2-year old daughter are on the CD-ROMs the parent were distributing.

Mitigation

Criminal’s MO is a learned behavior that continue to grow, develop, and advance tirelessly as the perpetrators turn out to be more experienced, sophisticated, and confident in the operation. Digital imaging technology and the internet allegedly help to unearth Swiss couple; John and Bentham’s prevailing MO, with intent of producing, marketing, and distributing child pornography materials to counterparts, and vulnerable innocent citizens of the world community.

          Underground communications, seizure of 250 CD-ROMs and arrest of the Swiss couple was made possible by efficient use of computer and internet technologies. The couple were targeting international buying communities, secured agreement to sell and distribute illicit materials. Furthermore, the illicit items were alleged to have been digitized for transport, ease of storage, and ease of duplication as soon as the couple arrive in the United States. Emergence of computer and internet technologies helped digital forensic investigation in process.

Questions

The Swiss couple attempted to underestimate the United States custom agents and digital forensic investigator. Provide all-inclusive description on the importance of computer and the internet technologies.

The couple were suspected to have agreed to sell 250 CD-ROMs to US investigators for $10,000. Provide comprehensive narrative on how to approach the Swiss couple with only allegation; yet, not officially charged.

Testing Project Proposal Paper on Reconnaissance Phase

Reconnaissance project need help to get done. Below is the project requirement. USA 

  • Prepare a business case justifying the need for a penetration test. Remember, the project manager is usually NOT excited about the test and is only doing it to check a box. Make sure they are aware of why it is necessary, and what benefits it brings them. In this business case, be sure to include why Penetration Testing is important from the business perspective, not just the security perspective.
  • Develop a project timeline. Use project management software such as Microsoft Project, Zoho Projects, Team Gantt, or any other similar piece of software to develop a Gantt Chart showing the timeline. This project is due to take 5 weeks (Weeks 2-6 of our course).
  • Define what deliverables the organization can expect from you. At what points in your timeline can they be expected (be sure to include these in your timeline above!), and what will they contain?
  • Discuss the difference between active and passive information gathering. What activities are conducted in each type of information gathering?
  • Discuss what OSINT is and what kinds of tasks it entails.

Paper Requirements:

  • Written Communication: Write in a professional manner using APA 6th Edition and formatting with correct grammar, usage, and mechanics.
  • Resources: Identify at least two scholarly resources (peer-reviewed. Scholarly journals, not news articles, Wikipedia, blog posts, etc…) and two industry resources (whitepapers, industry (e.g., Cisco, Palo Alto Networks, etc…) blog posts, Cybersecurity professionals (Troy Hunt, Bruce Schneier, etc…) blogs, etc…).
  • APA Formatting: Resources and citations are formatted according to APA 6th Edition.
  • Length: 3-5 Pages (not including Title Page, References, and any Abstract/Executive Summary)
  • Font and font-size: Times New Roman 12pt, double spaced

 

Resources: