Cloud Computing and Digital Forensics

1.)  

In 500 words or more, compare DNS failover and cloud failover. 

Use at least three sources. Use the Research Databases available from the Danforth Library  as your first choice. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

2.)   Using Chapter 10 as a reference (refer to uploaded file), Explain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?

Write your answer using a WORD document. 

Writing across the Curriculum

 

Please follow the instructions for Writing Across The Curriculum 

1. Pick any topic related to Discrete Structures or Discrete Mathematics (ex: Data Science, Bit Coin (Block Chain), Cryptography, Q-bits (Quantum Computing), Graph & Trees, Analysis of Algorithm Efficiency, Set Theory, (Surface Web vs Deep Web vs Dark Web), Artificial Intelligence, Machine Learning, Deep Learning, etc.

2. Write 2 to 3 pages of report on the selected topic. 

  • First paragraph – Do an introduction about the topic.
  • Second paragraph – What are the problem(s)?
  • Third paragraph – What are the soulution(s)? (ex: application in real world, etc.)
  • Fourth paragraph – Your conclusion about the topic.
  • Fifth – Give citation or references in APA format.

NOTE: Your paper should have double space, free from grammar and spelling mistakes.

Softwear Anti-virus Security Architecture

Length: Minimum of 1500 words 

Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. In-text citations as required.

Question: 

1. Since it is so dangerous, why would designers install software into the kernel at all (or make use of kernel software)? If you were an antivirus designer or maker, what other methods do you utilize to prevent virus? (900 Words – two references)

2. If the maker of antivirus software wants to be successful, the software has to be as close to bulletproof as the maker can possibly make it. Nothing is perfect; we certainly should understand at this point that no software can be proven bug free and that no security posture is 100% risk-free. Based on this statement, what do you think it could be better to improve the antivirus software? How safe do you feel to use antivirus software in your organization, and what other precautions do you use to prevent virus, malware, etc.? (600 Words – two references)

SOX Compliance

 

Write an essay of at least 500 words discussing how database auditing and monitoring fit within a SOX compliance framework. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

short answer

 

Please respond to the following:

  • Given the various types of loops available in JavaScript, recommend the one that you believe is better for processing data from an array. Provide a rationale for your response.
  • Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You will also be showing your instructor what you have picked up.
  • Be sure to respond to at least one of your classmates’ posts.

Emerging Threats -5

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

IA 6

In 250- 300 words
Explain in your own words what some of the challenges are with the Change Management Process for IT security.
 

Discussion: Knowing Your Auidence

In a business environment, there are many different audiences to which you will be communicating. There are audiences within the company, including various departments, upper management, high-tech groups, and low-tech groups, among others. There are external audiences, including customers to whom you need to provide product documentation and contractors to whom you may need to provide technical specifications. You may also be communicating to different cultural groups or possibly even multiple audiences at the same time. Discuss generally the things that you need to be aware of when communicating with audiences, and offer an example of this by choosing a specific audience (customers, management, high-tech, low-tech, diverse cultural groups, etc.). Define the stakeholders in that audience and explain how you would go about crafting communications to them regarding products or services that your company offers.

Linux

This is the final exam. You will attempt to have a web server located on the henry.net domain (the 192.168.0.X subnet you are on when you log into the learning environment). You will find the webserver using the tools you learned how to use during the 7 weeks you had of class. You are expected to do one of two things. The first is to change or alter the web page of the web site called Grandma’s Famous Cookies for Diabetics, or Shutdown the web server

End product 2

  • Distinguish between due care and due diligence.
  • Based on your experience, provide examples of due care and due diligence.
    1500 words