draft 3

Submit Draft 3 of your technical report here.

Include a revised or current outline (most outlines which have been submitted so far need revision) at the beginning of your document and begin the draft of the report on a new page.  At the end of the draft include all references you have found related to your topic.

You need to find articles from professional journals to include in your paper.  You must have some professional journal articles; the best option would be to have half or more of the articles from professional journals.  A 10 page single spaced paper needs 10 or more references.

For this draft and all following drafts, include a tentative title and below the title include  the following: Your name, Department of Computer Science and Information Systems 

Convert all URLs/references to APA format and include the URL at the end of each reference.  References go at the end of the paper.

Cyber Security

 

Choose ONLY ONE topic from the following topics for your presentation:

NOTE: (Topics are drawn from your project work in order to minimize effort).

1. Current Security Threats     

2. Identify Vulnerabilities in IT Security   

3. Analyzing Malicious Windows Programs  

4. Analyzing Code Constructs in Malware

Please do an audio recording of your presentation with PowerPoint slides.

  • You may use Microsoft PowerPoint software to record your audio on each slide (video is not required). 
  • PowerPoint presentation guidelines:
    • Include title slide
    • Minimum and Maximum of 12 slides including title slide and bibliography. 
    • Notes are required for each slide except title slide.
    • Individual presentations should be timed to end in approximately 15 to 20 minutes.

Submission:

  • Powerpoint (PPT) (with audio recording) file should be submitted on Canvas by each individual in order to receive a grade for your presentation.
  • Rubric used for grading is posted on Canvas.

Final – Planning

Your team has been asked to test and document enhancements to a web application that allows buyers to purchase custom-printed canvas shoes. The tasks and dependencies are as follows:

  • Create a testing plan

Once the testing plan is ready, your team can:

  • Test the user interfaces
  • Test the database
  • Test the network
  • Write the documentation first draft

When the user interface tests are complete, you can:

  • Perform user testing—enlist some users to test the user interface

When the database and network testing are complete, you can:

  • Perform integration testing—network with the database

When the user testing of the user interface and the database testing are complete, you can:

  • Perform integration testing—database, network, and user interface

When all integration testing and user testing are complete, you can:

  • Perform system testing

Then you can:

  • Review and revise documentation

After all other tasks are complete, you can:

  • Obtain management approval

Duration estimates for the tasks: 

a. 3 days

 b. 10 days 

c. 6 days 

d. 7 days 

e. 20 days 

f. 5 days 

g. 3 days 

h. 2 days 

i. 8 days

 j. 4 daysk. 5 days

  1. Create a network diagram and a Gantt chart for the project tasks. Ask your instructor if you are permitted to use software such as Microsoft Project to help you prepare your diagrams. 
    1. What is the planned duration for the testing project?
    2. What is the critical path for the testing project?
    3. For each task NOT on the critical path, calculate the amount of slack available.
    4. If the user testing of the user interface takes 15 days, what will the impact be on the project duration?

Text-

Title: Project Management 

Subtitle: https://opentextbc.ca/projectmanagement/ 

Authors: Adrienne Watt 

Publisher: BCcampus Open Education 

Publication Date: 2019 Edition: 2nd Edition

ITCO322U1IP

 

Assignment Description

Assignment Details

In this course you will demonstrate your knowledge of object-oriented programming by writing Java programs. The first step is to install the Java Software Development Kit (JDK) and an integrated development environment (IDE) called NetBeans in which you will write, execute and debug your programs. In this assignment you will also write your first program using Java to show that you have correctly installed the IDE and have learned the fundamentals of coding in the Java language.

The project instructions and deliverables are as follows (read through these instructions fully before beginning your assignment):

  1. Download and install JDK and NetBeans using the installation instructions. Visit the School of Information Technology Library Guide. On this page, look for the Installation Guides, then open the guide that has instructions for installing NetBeans and Java.
  2. Create a console program that allows the user to enter these three pieces of information:
    • The name of their favorite restaurant
    • The location or address of the restaurant
    • How often they eat at a restaurant each month
    • Each input in your program must be preceded by on-screen instructions that tell the user what to do. Each input must be stored in its own variable with an appropriate data type, and you must use a name for the variable that indicates what information it contains. For example, you might call the variable that stores the first input (the favorite restaurant) “favrest”, or “restaurant”.
  3. After accepting each input, the program must thank the user for entering the information and then display what they entered on the screen. For example, if the user entered “McDonald’s” for their favorite restaurant, the program must say something like “Thank you! You entered: McDonald’s”. This must appear in the output window before continuing to the next input.
  4. If the user enters 10 or more as the number of times they eat at a restaurant each month, the program must, in place of the usual report to the screen, instead inform the user with a special message of some kind, such as “Big spender!” or “Consider cooking at home!”. Be creative but professional with your message. If they do not enter 10 or more as that number, then the program must instead follow the output requirements of the previous step.
  5. When all the above steps have been completed and the output reported to the screen, the program must thank the user for their information and then terminate.
  6. Document your code using appropriate in-line comments. This includes variable declarations, input and output methods, and conditional logic. Your comments must explain how the program works to a programmer who is familiar with Java and NetBeans but has not seen this program before.

Your deliverable for this assignment is the NetBeans project you created using the steps above (ZIP the whole folder that contains the project). You must also submit a screenshot showing NetBeans running on your computer (upload separately or add to the ZIP).

4 DIFFERENT SET OF QUESTIONS

4 SETS OF CASE QUESTIONS, SAVE EACH ONE IN A WORD DOC.

Chapter-03 Video Case

SEE ATTACHED LINK: https://youtu.be/hMa5YHOInIc

Answer the following

1. What does Immelt mean by the “digitization of the industrial world” and “the industrial
Internet?” What are the four central elements of the industrial Internet?
2. What were the three alternatives GE had for developing the hardware and software
capabilities to become a digital frm?
3. Which option for developing its digital capabilities did GE choose and why?
4. Why does the new GE want to treat analytics as a company expertise just as it has always
treated material science?

————————————————————————–

Chapter-04 Video Case

SEE ATTACHED LINKS: https://youtu.be/sBKPacCuXsw AND https://youtu.be/84r3qd19tZU

Video Case Questions

1. What did the FCC’s net neutrality rules decide in 2015 about whether or not ISPs can be
regulated as public utilities, and why is this important?

2. Are you in favor of network neutrality? Why or why not?

3. Do you believe broadband providers should be allowed to charge companies like Netfix
and YouTube a premium for their bandwidth consumption?

4. What are some potential consequences for consumers of ending net neutrality regulations?

—————————————————————

Chapter-07 Case

SEE ATTACHED LINK: https://youtu.be/Vk0DakFvXPA

Answer the following questions

1. List and discuss briefly the benefits claimed by Cisco for its IX5000 telepresence technology.

2. Why did Jerry Bruckheimer’s production firm adopt telepresence technology?

3. What are the business benefits to Bruckheimer’s production company of using telepresence technology?

4. In the past, work was organized into central buildings located in central locations (like
cities) in order to facilitate face-to-face interactions. What impacts might telepresence
have on the organization of work? How could you use these tools to organize work on a
global scale even when employees are in different physical locations?

————————————————————————————————-

Chapter-08 Case

SEE ATTACHED LINK: https://youtu.be/AGevaFreD84

Answer the following questions

1. What are cyberespionage groups stealing from the United States?

2. What does the video claim is the evidence these attacks are coming from China? Is this
believable?

3. What does Adam Siegel in the video claim is the motivation of the Chinese government
for conducting cyberespionage against the United States?

4. Why didn’t Nortel management take the Chinese threat seriously? Why do various
contributors in the video claim that American management does not take the problem
seriously?

5. The video claims the attacks on American corporate and military computer systems are
increasingly sophisticated. Do you believe this is true?

digital forensics

  

Use the web or other resources to research at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved. In 350 words

3-4 paragraphs

 

Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).

Your written assignment should be 3-4 paragraphs in your own words, and should include a reference citation for your source of information.

Discussion and research reports for Cyber security

Need to present a Discussion with a word count of above 150+ words and each discussion need a separate reference link for sure.

1) Deep learning cyber issues(150 words)

2) File Integrity monitoring ( Need this same topic in two different formats and 2 different URL links as well needed) (150+150 = 300 words)

3) Insider threat (150 words)

4) Cloud native application protection platform (CNAPP) ( Need this same topic in two different formats and 2 different URL links as well needed) (150+150 = 300 words)

5) Cryptojacking ( Need this same topic in two different formats and 2 different URL links as well needed) (150+150 = 300 words)

Need to present a research report on with a word count no more than 70-110 words(not more than the count provided) and should provide a separate 

URL reference link too

  

1) Deep learning cyber issues – 70-110 words

2) File Integrity monitoring ( Need this same topic in two different formats and 2 different URL links as well needed) (70+70= 140+ words)

3)Insider threat – 70-110 words  

4)Cloud native application protection platform (CNAPP) ( Need this same topic in two different formats and 2 different URL links as well needed) (70+70 = 140+)

5) Cryptojacking ( Need this same topic in two different formats and 2 different URL links as well needed) (70+70 = 140+ words)

 

It is suggested you use a Research Theme to help you stay focused, and to provide continuity throughout your research.  Here is a list of ideas, but this list is not all-inclusive: 

Current technologies available to support management functions,

Best Practices,

Future improvements/technologies, or

Other standards related to your specific field.

Note: The content should be in a general words with no technical jargons.

This question is from a cyber security subject so that the matter should relate to cyber security for sure and should connect to readers.

 NO PLAGIARISM STRICTLY 

Each one should be different and no each topic information should be similar to the other topic strictly.

Content should be unique and in a simple understanding way.

Deadline: 02/08/2023 11:59PM CST

Also provide me the separate files for discussion and the research reports instead of submitting in a single file.

Discussion and Research paper

Research paper:

Find a peer-reviewed scholarly journal article discussing government planning and/or entrepreneurial innovation. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. You should use the UC library ( https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles ( https://scholar.google.com/ )Once you find the article, you will read it and write a review of it.  This is considered a research article review.Your paper should meet these requirements: 

  • Be approximately 3-4 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion:

 

In discussion 5, we looked at networks in general; however, in this discussion we’re looking at wireless networks, mostly focusing on mobile networks.  Mobile networks in a global economy can be a challenge for multiple reasons.  First, governments in other countries control the mobile networks.  Second is the technology.  Mobile networks in other countries might not be as good as the mobile networks within the US.  As a global company, how can we deal with this?  With a big push for 5G, which has speeds well over 2Gbps, how does that change the way you do business?  What are some things you need to think about when it comes to doing business globally, using a wireless mobile network?

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.