Macintosh Forensics

 Learning Objectives and Outcomes

  • Describe the capabilities of three tools used to recover deleted Macintosh files.
  • Recommend one of the tools for use in a given scenario.

Assignment Requirements
You are an experienced digital forensics specialist for DigiFirm Investigation Company. One of your clients is a small music production company. One day you receive a phone call from Andrea, the owner and president of the music company.Andrea believes one of her employees, a sound technician, has been stealing intellectual property from the company. She thinks he is copying original music scores and then selling them to upstart musicians, claiming that he wrote them. Andrea checked the employee’s computer the previous night and thinks he has been deleting the files to cover his tracks. He uses a Macintosh computer.There are several tools available for recovering files that have been deleted from a Macintosh computer, including:

  • MacKeeper, https://mackeeper.com/
  • Mac Undelete, http://www.macundelete.com/
  • Free Undelete Mac, http://www.freeundeletemac.com/

For this assignment:

  1. Research three specific tools that can aid in recovering deleted Macintosh files.
  2. Write a report about the capabilities of the tools.
  3. Recommend one of the tools for use in this case and justify your recommendation.

Required Resources

  • Course textbook
  • Internet

Submission RequirementsFormat:Microsoft WordFont:Arial, Size 12, double-spaceCitation Style:Follow your school’s preferred style guideLength:1-2 pages
Self-Assessment Checklist

  • I researched three specific tools that can aid in recovering deleted Macintosh files.
  • I described the capabilities of the tools.
  • I recommended one product for use in this case and justified my recommendation.
  • I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.

analytical memo

write an analytical memo 1 page 

 Write an analytic memo as if you were the researcher. Questions to consider: What patterns do you notice? What are the ideas/themes? If you were categorizing and coding the data thematically, what ideas stand out most? How do the participants differ in how they approach the question? How does each participant’s experience impact the way they answered the question? What qualitative “findings” or interpretations can you make with this sample data set? 

Artificial Intelligence

 Provide an overview of the recurrent neural network and compare it with the convolutional neural network   (at a minimum of 2 pages, including images 

 Provide an overview of the generative adversarial network and compare it with the convolutional neural network   (at a minimum of 2 pages, including images 

Week 1 DQ BA

Q. Come up with your own definition of business architecture and provide a description supporting your definition. Do not use an outside source for the definition. 

Note: 250 words with intext citations with 2 references must needed.

Assignments

 

Assignments:1 

Learning About OWASP

Visit the OWASP website. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the history and background of OWASP. 

See the Vulnerabilities tab. Choose one of the vulnerabilities on the linked page and describe briefly.

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. For your first written assignment, you have unlimited times to retry your assignment.

To improve Safe Assign score, submit references in a separate document or paste in the text section.

Attach your WORD doc and then hit SUBMT.

Assignment:2

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

1. Prohibit guessable passwords

o such as common names, real words, numbers only

o require special characters and a mix of caps, lower case and numbers in passwords

2. Reauthenticate before changing passwords

· user must enter old pw before creating new one

3. Make authenticators unforgeable 

· do not allow email or user ID as password

Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations.  Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necesarry.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.

To improve Safe Assign score, submit references in a separate document or paste in the text section.

Attach your WORD doc and then hit SUBMT.

Assigment:3

Do a bit of research on JSON and AJAX.

How do they relate to the the Same-Origin policy?

Using WORD, write several short paragraphs on each. A  total of 200-300 words. 

Use your own words and do not copy  the work of another student.

Attach your WORD document here.

Assignment:4

You are the web master of a college website. You share a server with other school departments such as accounting and HR.

Based on this chapter, create at least five security-related rules for staff members who are adding web pages being added to your site. Include a justification and explanation for each rule. Rules should relate to college, staff and student, and system information security.

Write your answer using a WORD document. Do your own work and use your own words. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.

To improve Safe Assign score, submit references in a separate document or paste in the text section.

Attach your WORD doc and then hit SUBMT.

Assignment:5

Do a bit  if research into File Inclusion Vulnerability.

  • What is it?
  • Why is is dangerous?
  • What is the difference      of low and remote inclusion?
  • What methods can me      employed to prevent a security breach?
  • What programming      languages are vulnerable to this type of attack.

Post between 100-300. Use your own words. Do not copy the work of another students.

Assignment:6

You are the web master for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

· Who is likely to attack your site?

· When are attacks likely to occur?

· What sort of attacks might take place?

· How can you best minimize attacks and protect the integrity of your site?

Write between 200-300 words.

Programming

Java programming using intellij.

Q1: Celsius Temperature Table

The formula for converting a temperature from Fahrenheit to Celsius is

C = 5 / 9 ( F 32 )

where F is the Fahrenheit temperature and C is the Celsius temperature. Write a method named celsius that accepts a Fahrenheit temperature as an argument. The method should return the temperature, converted to Celsius. Demonstrate the method by calling it in a loop that displays a table of the Fahrenheit temperatures 0 through 20 and their Celsius equivalents.

Q2: Test Average and Grade

Write a program that asks the user to enter five test scores. The program should display a letter grade for each score and the average test score. Write the following methods in the program:

• calcAverage—This method should accept five test scores as arguments and return the average of the scores.• determineGrade—This method should accept a test score as an argument and return a letter grade for the score, based on the following grading scale:

ScoreLetter Grade

90–100​​ A

80–89 ​​B

70–79 ​​C

60–69 ​​D

Below 60 ​​F

Q3: Conversion Program

Write a program that asks the user to enter a distance in meters. The program will then pre-sent the following menu of selections:

1. Convert to kilometers

2. Convert to inches

3. Convert to feet

4. Quit the program

The program will convert the distance to kilometers, inches, or feet, depending on the user’s selection. Here are the specific requirements:

• Write a void method named showKilometers, which accepts the number of meters as an argument. The method should display the argument converted to kilometers. Convert the meters to kilometers using the following formula:

kilometers = meters * 0.001

• Write a void method named showInches, which accepts the number of meters as an argument. The method should display the argument converted to inches. Convert the meters to inches using the following formula:

inches = meters * 39.37

• Write a void method named showFeet, which accepts the number of meters as an argument. The method should display the argument converted to feet. Convert the meters to feet using the following formula:

feet = meters * 3.281

• Write a void method named menu that displays the menu of selections. This method should not accept any arguments.• The program should continue to display the menu until the user enters 4 to quit the program.• The program should not accept negative numbers for the distance in meters.• If the user selects an invalid choice from the menu, the program should display an error message.

Here is an example session with the program, using console input. The user’s input is shown in bold.

Enter a distance in meters: 500 [Enter]

1. Convert to kilometers

2. Convert to inches

3. Convert to feet

4. Quit the program

Enter your choice: 1 [Enter]

500 meters is 0.5 kilometers.

1. Convert to kilometers

2. Convert to inches

3. Convert to feet

4. Quit the program

Enter your choice: 3 [Enter]

500 meters is 1640.5 feet.

1. Convert to kilometers

2. Convert to inches

3. Convert to feet

4. Quit the program

Enter your choice: 4 [Enter]

Bye!

Q4: Present Value

Suppose you want to deposit a certain amount of money into a savings account, and then leave it alone to draw interest for the next 10 years. At the end of 10 years, you would like to have $10,000 in the account. How much do you need to deposit today to make that happen? You can use the following formula, which is known as the present value formula, to find out:

P = F / ( 1 + r ) n

The terms in the formula are as follows:

P is the present value, or the amount that you need to deposit today.• F is the future value that you want in the account. (In this case, F is $10,000.)• r is the annual interest rate.• n is the number of years that you plan to let the money sit in the account.

Write a method named presentValue that performs this calculation. The method should accept the future value, annual interest rate, and number of years as arguments. It should return the present value, which is the amount that you need to deposit today. Demonstrate the method in a program that lets the user experiment with different values for the formula’s terms.

Deliverables:

1. Source codes – 4 X 20 = 80%2. Screenshots of the program output. – 4 X 5 = 20%

Note: Sparingly comment your java source code, save all the files in your_lastname_lab_2 folder, zip it, and upload for grading.

Thank you!

Assignment

1 page

Write a descriptive comparative review of  IPv4 and IPv6 and

explain what IPv4 and IPv6 are. Discuss and compare the following features:

a) Addressing method

b) Number of classes

c) Configuration 

d) Routing information protocol

e) Network Configuration

f) Best feature

g) Security

g) Mobility & Interoperability

i) Compatibility with mobile devices

k)Can they communicate with each other? Do we need both of these protocols?

week–4

 write words about  your opinion whether Edward Snowden is a hero or a criminal. You might consider the First Amendment and/or the public’s right to know as well as national security concerns.  

Exp19_Excel_Ch08_Cap_Golden_State_5K

  

Exp19_Excel_Ch08_Cap_Golden_State_5K

  

Exp19_Excel_Ch08_Cap_Golden_State_5K

Project Description:

You are a volunteer for the Golden State 5k, an annual 5k held across several cities in California to raise money for at risk youth. As part of your duties, you track donations, volunteer information, and race results. This year you have decided to use Excel to calculate frequency distribution by age and time, calculate various descriptive statistics, and forecast participation rate as well as donation rate for 2025.

     

Start   Excel. Download and open the file named Exp19_Excel_Ch08_Cap_GoldenState5k.xlsx. Grader has automatically added   your last name to the beginning of the filename.

 

Ensure the RaceResults worksheet   is active, then use the FREQUENCY function to calculate the frequency   distribution of the race results in column D. Place your results in the range   G4:G9.

 

Enter a function in cell F22 to   calculate the correlation between age (Columns C) and race time (Column D).

 

Enter a function in cell G22 to   calculate the covariance between age and race time. 

 

Enter a function in cell H22 to   calculate the variance of the ages in the data set. Note this is a sample of   data not a population.

 

Enter a function in cell I22 to   calculate the standard deviation of the ages in the data set.

 

Ensure the Data Analysis ToolPak   add-in is active. Use the Data Analysis ToolPak to create a histogram with   chart output starting in cell H12 based on the ages of the runners surveyed.   Use the range F13:F18 as the Bin Range. Ensure that Chart output and   Cumulative percentage is included in the results. Place the upper left hand   corner of the chart in cell L13.

 

Ensure the VolunteerInfo   worksheet is active. Use the Data Analysis ToolPak to perform a single factor   ANOVA on the range C5:E21 (Including column lables). Place the results   starting in cell G5. 

 

Create a Forecast Sheet that   depicts year over year growth in participation for the city of Los Angeles.   Set the Forecast end year as 2025 and place the results on a new worksheet named 2025Forecast.

 

Ensure the Participants   worksheet is active then create a scatter plot chart that places the   Participant observations on the X axis and the Donation dollars on the Y axis   (do not include column headings). Add the chart title Participant   Forecast and a   linear trendline to the chart that also shows the Equation and the R-square.

 

Enter a function in cell F6 to   calculate the intercept of the linear trendline created in the prior step.

 

Enter a function in cell G6 to   calculate the Slope of the linear trendline.

 

Enter a function in cell H6 to   calculate the R-square of the linear trendline.

 

Enter a function in cell I6 to   calculate the Standard Error. 

 

Use the FORECAST.LINEAR function   in cell F9 to forecast potential donations once the goal of 20,000   participants is reached. Format the results as Currency.

 

Complete your analysis by adding   formulas in the range G9:H9 to calculate the high and low thresholds of the   forecast.

 

Save and close EXP19_Excel_Ch08_CAP_GoldenState5k.   Exit Excel. Submit the file as directed.

Cyber security discussions and research report

Need to present a Discussion with a word count of above 120+ words and each discussion need a separate reference link for sure.

1) Pros/Cons of Apples airtag Anti- stalker features = Need this same topic in 4 different formats and 4 different URL links as well needed) 120*4 = 480 words

2)Risk management framework training = Need this same topic in 3 different formats and 3 different URL links as well needed) 120*3 = 360 words

3) Key skills for COMSEC manager = 120 words  Need link reference as well

Need to present a research report related to CYBER SECURITY on with a word count no more than 70-110 words(not more than the count provided) and should provide a separate 

URL reference link too

1) Pros/Cons of Apples airtag Anti- stalker features = Need this same topic in 4 different formats and 4 different URL reference links as well needed) 70*4= 280 words

2)Risk management framework training =  Need this same topic in 3 different formats and 3 different URL reference links as well needed) 70*3 = 210 words

3) Key skills for COSMEC manager = 70+ words Need link reference as well

It is suggested you use a Research Theme to help you stay focused, and to provide continuity throughout your research.  Here is a list of ideas, but this list is not all-inclusive: 

Current technologies available to support management functions,

Best Practices,

Future improvements/technologies, or

Other standards related to your specific field.

Note: The content should be in a general words with no technical jargons.

This question is from a cyber security subject so that the matter should relate to cyber security for sure and should connect to readers.

 NO PLAGIARISM STRICTLY  and do not use AI to get the copy paste information lik Chatgpt

Each one should be different and no each topic information should be similar to the other topic strictly.

Content should be unique and in a simple understanding way.

Deadline: 04/13/2023 11:59AM CST

Also provide me the separate files for discussion and the research reports instead of submitting in a single file.