Question 5

  

Scenario

After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

Consider the following questions for collecting and handling evidence:

1. What are the main concerns when collecting evidence?

2. What precautions are necessary to preserve evidence state?

3. How do you ensure evidence remains in its initial state?

4. What information and procedures are necessary to ensure evidence is admissible in court?

Tasks

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

Address the following in your policy:

§ Description of information required for items of evidence

§ Documentation required in addition to item details (personnel, description of circumstances, and so on)

§ Description of measures required to preserve initial evidence integrity

§ Description of measures required to preserve ongoing evidence integrity

§ Controls necessary to maintain evidence integrity in storage

§ Documentation required to demonstrate evidence integrity

Required Resources

§ Internet access

§ Course textbook

Submission Requirements

§ Format: Microsoft Word (or compatible)

§ Font: Times New Roman, size 12, double-space

§ Citation Style: APA

§ Length: 2 to 4 pages

Windows Security Configuration Question

 

Essentially, it is a document that serves as a guide to configuring a desktop / system security. 

Please develop this guide for a Windows 10 desktop environment. The hardening checklist will take the form of a table or chart that lists how the Windows 10 desktop should be hardened. 

This will be culmination of everything you have learned, in terms of Operating Systems, Security Controls, and various strategies that can be employed. Essentially this documents will summarize everything you know about securing a system in an easy to follow checklist. You should try to provide a short and quick one sentence description on each setting or task that you are recommending in the checklist.

Add relevant sources

Python Scripting

Need someone with a lot of experience in Python Scripting. Please read all of the directions on the file before attempting it. 

Test Results Project with no plagiarism

Project should have no plagiarism. Please see the attachments. Even example PPT is attached for reference, this is just reference, this project shouldn’t have any reference to the attached example. 

Every day we use data in one way or another in our daily lives, we find ways to analyze situations and create viable solutions based on quantitative and qualitative information that we collect mentally as well as physically.  For this project, you are going to become an educational advisor for a fictional educational institution.  The Vice President of Instruction of the institution has provided you with the raw data of the assessment scores of their students’ final exam in their GED Preparation Course.  The course consists of scores in mathematics and English and Pass or Fail Overall Score.  There is also information in regard to the demographics of the students.

Based on the raw data that you have been provided(attached in form of pdf and excel file), you are going to develop a   presentation using visuals of the data that have been provided.  You are going to make recommendations to the Vice President of Instruction of the University of suggested improvements that can be made based on your analysis of the data that has been provided to you.

Within   your data presentation include:

A   variety of graphics that illustrate the represented data

An   explanation of what each graphic represents

Explain   how the graphics should be interpreted (include a key)

Finally,   summarize your analyzation of the data and provide the VP with some suggestions to improve the quality of instruction within the school.  Refer to your visuals within your summary.

For this assignment, you can use any method that you want to use.  Some students use Microsoft Word, some students have used Powerpoints.  

Please make sure that you look at the example that is also attached!!

Eu data protection laws

 Hide Assignment InformationInstructions

In order to complete assignment #8 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #8). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 – outside sources. Please be sure to follow APA guidelines for citing and referencing source. Assignments are due by 11:59 pm Eastern time on Sunday.

Chapter 14A large American multinational corporation wants to establish a telephone and email hotline for employees to report wrongdoing within the company. The company has offices in the European Union and wants to ensure that it avoids violations of E.U. data protection laws. What steps can the company take to increase the likelihood that its hotline reporting system remains in compliance? 

Practical Connection Paper for Access Control Course

Provide a reflection of at least 500 words (or 2 pages double spaced APA) of how the knowledge, skills, or theories of Access Control course have been applied, or could be applied, in a practical manner to your current work environment. 

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace

NOTE: I am working as a Software Developer. Please relate the skills and theories of Access Control that have applied in the current work.

bharg research paper

 

The final portfolio project is a three- part activity. You will respond to three separate prompts but prepare your paper as one research paper. Be sure to include at least one UC library source per prompt, in addition to your textbook (which means you’ll have at least 4 sources cited). 

Start your paper with an introductory paragraph.

Prompt 1 “Blockchain” (2-3 pages): Explain the major components of blockchain. Be sure to include how blockchain is affecting a global economy and how you see it growing in the future. 

Prompt 2 “Big Data” (1-2 pages): Describe your understanding of big data and give an example of how you’ve seen big data used either personally or professionally. In your view, what demands is big data placing on organizations and data management technology?  How does big data affect a global economy.

Prompt 3 “Government and Policies” (1-2 pages):  Discuss the role government plays in a global economy.  Also, look at what policies are currently in place and then discussion what policies should be put in place..

Conclude your paper with a detailed conclusion section. 

The paper needs to be approximately six to eight pages long, including both a title page and a references page (for a total of eight to ten pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet these requirements: 

  • Be approximately six to eight pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Computation

 

Estudie las siguientes lesiones en GCFAprendeLibre (Excel 2016: 1,3 , 6-15, 19 – 28).

Prepare en Excel y suba el libro de calculo con las palabras de vocabulario, traducción, sus definiciones y las referencias. .

Vocabulario

Cinta de opciones
Cuadro de nombres
Barra de fórmulas
Columnas
Filas
Celdas
Libros de cálculo
Hojas de cálculo
Barra de herramientas de acceso rápido
Función

La hoja de calculo debe de verse algo así:

El ejemplo esta en un file