Cloud computing and digital forensics – Week 6

Week 6 Discussion: (500 words)

Compare and evaluate in 500 words or more qualitative v quantitative risk assessment.  

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Week Six Assignment: (300 words)

Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

Use your own words and do not copy  the work of another student.

Project7

  

Scenario

Due to the Always Fresh expansion, management wants additional network controls to protect their growing network.

Tasks

Consider the Windows servers and workstations in the domains of a typical IT infrastructure. Based on your understanding of network security controls, recommend at least four possible controls that will enhance the network’s security. Focus on ensuring that controls satisfy the defense in depth approach to security.

Summarize your network security controls in a summary report to management. You must provide rationale for your choices by explaining how each control makes the environment more secure.

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Arial, size 12, double-space

§ Citation Style: Follow your school’s preferred style guide

§ Length: 2 to 4 pages

Discussion1

Assume you are a security professional for an educational institution with 10 servers. Researchers on campus push a lot of traffic over the network, which slows performance at times. You also have a limited budget. You are evaluating both stand-alone and embedded firewalls in preparation of a purchase. A stand-alone firewall filters traffic before it reaches your servers, while an embedded firewall would be implemented on each server.

Answer the following question(s):

Which type of firewall would you choose? Why?

Discussion2

The process of reaching security goals is a continual process that requires specific direction. An organization’s success at complying with its internal security policy and external security regulations depends, in part, on clearly stated goals.

Answer the following question(s):

  1. What are two potential consequences to an organization that does not have clearly stated goals? Why?

Week 7

Week 7 Assignment

—> Word doc “Week7 questions.doc” is attached for this

Complete the following assignment in one MS word document:

Chapter 12 –discussion question #1-3 & exercise 1 & 12 & 16

Chapter 13- discussion question #1-4 & exercise 3 & 4 & 6

When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.

All work must be original (not copied from any source).

chapter 13: pdf attached

chapter 12: lecture video 

https://s3.amazonaws.com/blackboard.learn.xythos.prod/5a31b16bb2c48/6824829?response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27zoom_0%25287%2529.mp4&response-content-type=video%2Fmp4&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20201006T150000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=AKIAYDKQORRYTKBSBE4S%2F20201006%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=c42d1be195a371680f6a182a5ed5fd7b55b59b73cc45f27663f3a7d39d7f181f

Week 7: Discussion 1

Week 7: Discussion 1

Create a discussion thread (with your name) and answer the following question:

Discussion 1 (Chapter 12): Examine Alexa’s skill in ordering drinks from Starbucks.

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Week 7: Discussion 2

Week 7: Discussion 2

Create a discussion thread (with your name) and answer the following question:

Discussion 2 (Chapter 13): Research Apple Home Pod. How does it interact with smart home devices?  Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.

 Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text citations.

Response Required Discussion cloud

Please read the below discussion posts and provide response in 75 to 100 words

Post#1

 

Cloud computing offers a variety of service to its users and so is the audit of it multifunctional and multi-directional. The purpose of the audit can be many and based on that the audit report can reveal different information about the cloud computing audit. The scope of cloud computing audit in my the business will include the IT and its controls of the business as well as the administration, risk assessment, communication, monitoring several activities, system operation, logical as well as physical access and finally change management. “The importance  of  IT  auditing  and  especially  cloud  computing auditing  is  an  essential  effort to  ensure  the  proper  functioning processes  of  an  the organization’s  IT  systems,  management, operations, and  related  processes,  to  avoid  fraudulent,  in  order to  have  comprehensive  and  accurate financial view of their business” (Moghadasi, 2018).

The IT structure of the cloud computing of the business is the basic that needs to be understood to ensure that everything is in proper condition and place so as to enhance the overall business and the output and this is effectively understood by an audit of cloud computing structure. Another important area being targeted by the audit is risk assessment. With the advances in the cyber field, the types of risks to have advanced. Thus the business needs to have thorough knowledge about its cloud computing and related risk so as to take security measures against them. Cloud computing audit for risk assessment reveals information about qualitative and quantitative aspects of the risks and thus becomes crucial in securing the business from any future attack or breaches. “The outsourced data, however, in the cloud are not always trustworthy because of the inadequacy of physical control over the data for data owners” (Sookhak, 2017).

The activities being performed on the cloud can be monitored by the audit of it. It helps the business owner understand what employees are doing on the cloud and how fruitful an employee is towards the overall development and growth of the business. Any activity being performed which is not related to the work profile of the employee can thus be revealed in the audit so the business can take appropriate measures against such employees or clients. “Despite regulatory interest in the audit impact of new technologies, little empirical work has studied how auditors behave when clients introduce cloud platforms into their accounting information system” (Banker, 2020).

The organization systems operation is also an important scope of cloud computing audit. It investigates the working of several systems and informs what systems need to be upgraded or changed for better results. The communication happening on the cloud is a part of audit wherein the business owner gets to know who is communicating over the cloud and who is viewing the information stored overcloud. Any unauthorized access being taken by a third party to the cloud services will be revealed in the audit report thus helps in blocking such access and improving the accessibility features for the enhanced security of the business cloud computing (Moghadasi, 2018).

Post#2

 

Cloud computing auditing ensures the proper functioning of the IT system, the operations, the management, and the related processes. It helps to avoid fraudulently that provides a comprehensive and accurate financial view of the business. Nurhajati states that cloud computing audits are relevant towards protecting the data, identification and access management, risk technology, setting up rules and ensure better operations (Nurhajati, 2016). It is through cloud computing audits that points out the risk that is related to cloud computing that ensures business continuity.

The objectives that are required to be covered by cloud audit is to provide the stakeholders with having an internal security policy and towards having a successful control process of the cloud computing service. It also helps to evaluate the productiveness. The purpose of cloud audit is also to provide an interface between the service provider and the clients of the company. It helps to identify the definiteness and the inadequacies that can be found in internal control. It also provides the assessment criteria and generates the capabilities of reporting (Marks, 2015). Thus the stakeholders become much more confident in regards to the quality of the audit that also ensure better internal control.  The auditors are also required to consider the control access, the control framework, and the features of authorization, notification in regards to a data breach, latency in communication and also take into consideration international law. The cloud auditor is also required to consider the cloud support and the IT support functions and towards anticipating re-enforcing the business function.

The cloud auditors are required to understand the risk association, the ways to deal and towards developing the abilities towards auditing the plan and the strategy. As the architecture for cloud computing consists of different models different components and services, it is required for the cloud auditor towards considering if the application is compatible with that of the cloud environment (Moghadasi, Mousavi, & Fazekas, 2018). This is because most of the application depends on the internal network of the organization and not the internet. Further, the web applications are required to be accessed that would assure authentication, monitoring, and access control. The cloud auditors are also required to assess the appropriateness of the control access over the other resources. They are required to access the endpoints and ensure that there is sufficient security. This would help towards gaining legitimate access towards the cloud resources (Halpert, 2011). Moreover, the service level agreement is required to be considered all communication and correspondence between the different vendors.

The audit process encompasses various phrases which include the planning process. In the planning process, it is required to understand the nature of the business. In the planning process, it requires examination of the controls and the procedures, the structure of the organization, the terms and the reviews and also understanding the application and also the comprehensive control review (Halpert, 2011). The next stage is the control examination phrase where the auditor is required to access the quality and towards specifying the degree to rely on. They are also required to execute and examine the control and test the outcome.

Time article

 

Read this Time article and view the video explaining how Russian trolls spread fake news.  Discuss in 500 words whether the government should regulate Facebook more closely.  

Use at least three sources. Use the Research Databases available from the Danforth Library, not Google.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

Reply to two classmates’ posting in a paragraph of at least five sentences by asking questions, reflecting on your own experience, challenging assumptions, pointing out something new you learned, offering suggestions. These peer responses are not ‘attaboys’.   You should make your initial post by Thursday evening so your classmates have an opportunity to respond before Sunday.at midnight when all three posts are due. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

3 page review for blockchain

Find a peer reviewed article pertaining to blockchain and finance that is not one of the required readings for this course. Write a critical review of the article that is at least 3 pages long (content). Be sure to provide in-text citations when you paraphrase or directly quote from the article. Also include a reference page with an APA style citation of the article. Follow the writing requirements for this course when preparing the paper. Use the following format for the paper:

1.  Introduction, including the purpose of your paper and a preview of your paper. Be sure to also provide the article’s title and author(s)’ name(s) in the introduction of your paper.

2. Discuss the purpose and problem the article is addressing.

3. Elaborate on the content of the article.

4. Discuss the findings and conclusion(s) drawn by the article’s author.

5. Discuss the author’s point of view and assumptions. Indicate whether unsubstantiated assumptions were made and whether there is bias that exists in the article.

6. Discuss the significance of the article. Why it is important? On what do you base your assertions?

7. Conclude your paper. Summarize the important aspects of the review.

8. References

Your paper should include 8 centered and bolded headings that correspond to each of the required sections (Introduction, Article’s Purpose and Problem, Content, Article’s Findings and Conclusions, Point of View and Assumptions, Significance, Conclusion, References).

Creating Company E-mail/WIFI/Internet Use Policies

  

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

  References:

https://resources.workable.com/email-usage-policy-template

https://www.sans.org/security-resources/policies/general/pdf/email-policy

OLTP vs OLAP

1. Compare and contrast at least three differences between OLTP and OLAP database designs.

2. Provide details, explanations, and examples.

3. 3-4 Paragraphs

4. provide website references

Week 4 Project

 Creating a BudgetIn this assignment you will create a spreadsheet and a chart to help a hypothetical couple work out their budget. You will submit a Microsoft Excel spreadsheet following the directions below to the appropriate submission folder by the due date. You will name this file W4P_LastName.xlsx.Click on the link below, Week 4 Project Tips, for some visual aids on how to tackle this week’s project.Week 4 Project TipsPlease Note:Information to help you with this project is available in the Week 4 online lectures, your textbook, as well as Microsoft Excel Help (F1). Your professor is also a great resource. If you work ahead, you can post questions about this assignment on the Questions for the Professor discussion board and still submit your assignment on time.ScenarioTom and Sally were trying to get a handle on their budget. They heard that MS Excel could help them with that.  Tom is going to school and has cut back on his hours. Sally has finished her associate’s degree and is working full time. They want to look at the last three months of their income and expenses to see where they can make changes.Part I – The SpreadsheetFirst, in an Excel Spreadsheet, create a budget to show Tom and Sally’s income, expenses, and money leftover each month (Net). Create formulas in your spreadsheet for your calculations using the following data:

  • Tom brought home $1,000 a month for January, February, and March.
  • Sally brought home $1,900, $2,000, and $1,975 respectively for those three months.
  • They paid $1,000 for rent and utilities each month.
  • They paid $88 for insurance each month.
  • They paid $60 for cell phones and $60 for Internet/TV each month.
  • They spent $600, $750 (due to a big birthday bash), and $500 on food respectively.
  • Their car payment and gas came to $225, $250, and $300 respectively.
  • Entertainment and gifts were $75, $100, and $45 respectively.
  • They paid a little extra on their credit card $150, $125, and $100 respectively.
  • They allocated $200 each month for personal grooming and health care.
  • They put $100 each month into savings.
  • Miscellaneous Expenses came to $200, $100, and $400 respectively.

A sample budget layout is included below as an example of one way to lay out a budget. Part II – The ChartOnce you have worked out the budget spreadsheet, use the tabs at the bottom of the page to open another sheet. Here you will create a chart similar to the example below using the tools you learned about in the lectures and the textbook. On the new sheet:

  1. Create a column chart to visually represent their monthly expenses. If you have a challenge getting the chart on this sheet, research how to move your chart using your reading or Help (F1). You might also try right clicking on the chart.
  2. Add a descriptive title to the chart.

Part III – Changing Values

  1. Copy everything from Sheet 1 (the budget calculations) and paste it into a new worksheet.
  2. Change values for Sally’s March income to $200 more. Let’s say that they didn’t use as much heat in March and their utilities were $75 less (you could use a formula to figure out $75 less but you don’t have to). See how the totals change automatically if you used formulas correctly. If the values did not change, check your formulas and try them again. Seek help if you can’t figure this out.
  3. Rename each of your three spreadsheets with descriptive names.

By the due date assigned, submit this budget to the Submissions Area. In the message box, share how the process of creating this went for you, including any challenges, successes, or insights. In the Comments box, briefly share your experiences with completing this project. 

Assignment

 Find a criminal case that involved Digital Forensics. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the case and the how digital forensics were used  in the investigation. 

Safe Assign is software that verifies the originality of your work against on-line sources and other students.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25.