Computer Science Research Paper

Final Draft

1. Your final draft must be written in a Word document in current APA  format and must include a title page, an abstract, a running title, a  body, and a references page. Note that you do not have to include  the sentence outline you prepared in the previous assignment. The  sentence outline was designed to help you organize your paper.

2. The body of the paper must be at least 2,000 words.

3. At the minimum, the research paper should include the following headings:

a. Introduction

b. Problem statement

i. What is the research paper attempting to solve?

ii. What are the implications of a Biblical worldview on the problem?

c. Purpose statement

i. What are the goals of the research paper?

d. Literature review

i. Review of related research relevant to the problem

e. Implications of the research paper

i. Relevant to a Biblical worldview

ii. Relevant to industry and managers

f. Biblical worldview implications

i. Justification for ethical storage of user data

ii. Biblical worldview of integrity of personal data

g. Conclusion

Research Paper Top and outline is attached….

Malware

All posts must be a minimum of 250-300 words. APA reference. 100% original work. no plagiarism.

1. Discuss tools and techniques to remove Malware from infected machines; using a popular product to make your point.

2. Discuss the vulnerabilities that computer memory and computer process have that malware can take advantage of and exploit.

discussion-13

 If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security? 

Breach -1

 

Many types of systems are networked together, and the number of devices that are added to this network increases every year. With this explosive growth of networked systems, companies are now working harder to bring more sophisticated security systems online for greater protection from outside attacks.  For this Discussion, you will analyze a security breach caused by an employee or third party from inside an organization.  

  • Could the security breach have been prevented?  If so, how? 
  • How were business drivers impacted by the breach?
  • How does use of security policies mitigate risks for the breach?

FTK Imager Lite

Question-1

Describe the FTK Imager Lite tool functionality and process used in an examination of a device. Using the Internet, research the web for an article related to the tool and answer the following questions:

  1. What are some of the advantages or disadvantages of the tool?
  2. Discuss the tools setup
  3. Appraise the value of the tool in gathering evidence for the prosecution.?

No Plagiarism 

· Should be 400 words without References.

Question-2

Prepare a two-page paper (double-spaced) that describes the device or system you will investigate and the intended tool you plan to use to conduct your forensics investigation. The interim paper should be in the form of an Executive Summary. Be sure to provide references in APA format.

Tool: FTK Imager Lite

No Plagiarism 

2 Pages without References

assignment

  Review the included ISACA built risk case.  You will need to complete the tasks identified in the later part of these slides labeled To Do.  Re-evaluate the probability and risk level for all of the rows in table 2.  When you make your decision on the new probability rating, you will need to justify this with one to two articles.  When you identify the new risk level, you will need to identify two to three articles as examples or sources to justify the changes.  Don’t just move it up or down, use current news and trends with similar companies to justify why you moved or even kept it the same.  For each item, run a Quantitative or Qualitative risk analysis for a proposed mitigation.  In other words, find a fix for each item and put a price tag with it.  Decide what items are in budget and make your choice.  You will add three new columns to table 2, one will be a proposed mitigation plan with budget and risk level from the FAIR methodology, and the second column will be if your risk decision (accept, mitigate, transfer, avoid).  Submit the completed spreadsheet to the submission item in this week.  You will also need to answer the 10 discussion questions at the end of the slides and submit those with your spreadsheet, either as a second page with answers in the cells or as separate document.