Discussion 3

 

Week 3: Discussion

The United States vs. Carey, 1998

Prologue 

Carey had been under investigation for possible sale and possession of cocaine and his residence as the center of operation. Six (6) months after the last purchase, the law enforcement officers obtained a warrant to arrest him. During the arrest, officers observed in plain view, a device for smoking marijuana in his residence and labeled the unit as marijuana in defendant’s apartment.

Plan of Action

Alerted by these items discovered in Mr. Carey’s apartment, the law enforcement officers asked Mr. Carey to consent to a search of his apartment. In clean and clear language, the law enforcement officers informed him of the intention to obtain a search warrant to search his apartment if Mr. Carey refused permission. After considerable discussion with the officers, Mr. Carey verbally consented to the search and later signed a formal written consent at the Officer’s station.

The search warrant was all-inclusive; thereby, authorized officers to search the filesystems on the computers for names, telephone numbers, ledger receipts, addresses, and vital documentary evidence about the sale and distribution of controlled substances.

Discoveries

1:1. Armed with the consent, the officers returned to Mr. Carey’s apartment the same night and discovered quantities of cocaine, marijuana, hallucinogenic mushrooms; took two computers believed to demonstrate evidence of drug dealing.

1:2. During the examination of Mr. Carey’s computer, investigators found files with sexually suggestive titles and the label “.jpg” that contained child pornography. 

1:3. In the process, investigators temporarily abandoned the search for evidence about the sale and distribution of controlled substances and focused on child pornography files, and Mr. Carey was charged with one count of child pornography.

 Court Proceeding

  • In the appeal, Mr. Carey challenged child pornography count as inadmissible and unacceptable because the computer was taken as the result of a general, warrantless search out of his apartment
  • Law enforcement officers contention was the warrant authorized them to search any filesystem on the computer that might contain data and information germane to drug crimes, cocaine, marijuana, hallucinogenic mushrooms, and asserted that child pornography came into plain view during the search. 
  • The court concluded that the investigators exceeded the scope of the warrant and reversed Mr. Carey’s conviction.
  • The Law enforcement officers adopted “Plain view doctrine” that must have not been extended to embrace wide-ranging search warranties from one item to another until something incriminating emerges.

Precautious

  1. Digital forensic investigators must be extremely cautious and avoid breaching the fundamental principle of digital forensic investigation.
  2. Digital forensic investigators inadvertently abandoned the search warrant and overstepped the authorized limit of the search warrant.  
  3. Investigators engrossed in child pornography files. Notably, Mr. Carey was charged with one count of child pornography.
  4. Tactlessly, Digital forensic investigators failed to obtain a new search warrant before conducting extra search on Mr. Carey’s child pornography operation.

Answer All Questions: (1:1 – 1:3)

Question 1:1. Provide a comprehensive plan of action on Mr. Carey’s count germane to drug crimes, cocaine, marijuana, hallucinogenic mushrooms.

Question 1:2. Provide a comprehensive narrative and concluding evidence on Mr. Carey’s use of the computer to compiled names, telephone numbers, ledger receipts, addresses, and vital documentary evidence on the sale and distribution of controlled substances.

Question 1:3. Describe the immediate danger of Mr. Carey’s modus operandi germane to drug crimes, cocaine, marijuana, hallucinogenic mushrooms, and child pornography in a developing rural community?

IT incident response

 

Research an incident that has been identified within the last year that resulted in a breach of security.  Determine whether or not proper monitoring would have detected the breach sooner

The breach you research and post must be unique, no duplicates please..

database

 

Explain in 500 words or more what NIST Is and how it should be used by a dba.  

Use at least three sources.   Use the Research Databases available from the Danforth Library, not Google.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.

Write in essay format not in bulleted, numbered or other list format.  

Data visualization

 

Kirk (2016) states that the topic of color can be a minefield.  The judgement involved with selecting the right amount of color for a particular application can be daunting. With regards to visualizations, there are different levers that can be adjusted to create the desired effects (Kirk, 2016). The levers are associated with the HSL (Hue, Saturation, Lightness) color cylinder.

Apply scholarly research and use examples. Select and elaborate on one of the following:

  • Color Hue Spectrum
  • Color Saturation Spectrum
  • Color Lightness Spectrum

Remember your initial post on the main topic should be posted by Wednesday 11:59 PM (EST). Your 2 following posts should be commenting on your classmates’ post on different days by Sunday 11:59 PM (EST). You should end the week with 3 total discussion posts.

A quality post is more than stating, “I agree with you.” Maybe you should state why you agree with your classmate’s post. Additionally, post some examples or find a related topic on the internet or University’s library and comment on it in the discussion post.

Use Case Description versus Activity Diagram

Share your thoughts and opinions on Use Case Diagram, Activity Diagram, and Entity Relationship Diagram (ERD) in this week’s discussion.

  • Flesh out your thoughts and interact with your classmates. Post your initial response by the middle of each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You will also be showing your instructor what you have picked up.

Click the link to access the discussion. If you need help with completing discussions, please watch this video for more information.

Research Paper

Company – Amazon

– Then select a key area of predictive analytics (from chapters 4-7) to implement in the organization. Some key areas to consider are listed below.

Select major topic (Data mining process, methods, and algorithms (from Chapter 4); Machine- learning Techniques for Predictive Analytics (from Chapter 5); Deep Learning and Cognitive Computing (from 6); and Text Mining, Sentiment Analysis, and Social Analytics to discuss for the residency requirement ( from chapter7) 

You must indicate:

– Why the predictive analytic component is going to be implemented by noting the problem that you are trying to solve, noting how your team will solve the problem with the selected method (this must be a thorough in-depth analysis), and also present your findings using a power point presentation.

-Note any Big Data Challenges or other technology or cultural challenges you may face and how you will mitigate these challenges in your presentation.

` Format for paper: Title page, Abstract, Header with page numbers, Reference page, APA form and style with Times New Roman 12 point font.  Body of the paper is 10-12 pages long (excludes title page, reference page, abstract).  Any diagrams  or charts inserted do not “count” to make the required length.  Any diagrams or charts need to be approved by the professor. FIVE scholarly sources AND your text are required both incorporating intext citations and references.  Be sure to have a concluding section that briefly summarizes the most important “take-aways” from your paper and this should be 3 paragraphs long minimum.

the Information Technology and Organizational Learning textbook:

Complete the following assignment in the Information Technology and Organizational Learning textbook:

  • Chapter 7 – Review the section on dealing with multiple locations and outsourcing.  Review figure 7.2 and note how virtual team communications further reiterates the importance of this model. 
  • Chapter 8 – Review the Siemens AG case study.  Note the importance of understanding the interrelationships amongst all the senior leaders at every location.  Pay special attention to Figure 8.1 and Figure 8.2. Note how the corporate CIO should engage with each of the regional leaders.  Why is this important?

Complete the assignment using narrative paragraphs and explain your thoughts and findings in detail. Adhere to APA format requirements and do not use lists or bullets. Identify your answers by its chapter # to help the reader find your answers to specific items. Use Times New Roman 12 font, double-spaced. Include a coversheet with your name, class ID and the title of the assignment. Your submission needs to be at least two pages in length (one page per chapter). The coversheet, figures, tables, and reference list doesn’t count toward the page count. Post the assignment as one MS Word document by the due date in the syllabus. Do not submit any other format such as PDF. Please provide and cite two references IAW APA.

RIPV2

computer

The term paper for this class is worth 200 points, and it requires you to do a research and write a 2000-2500 word paper describing  RIPv2 Protocol

 The paper will include the following:

  • The paper must have a distinct and well written Introduction, Supporting Body and Conclusion; 
    • In the body include the following 
      • The history of the protocol chosen;
      • The programmable parameters of the protocol and how they affect traffic flow;
      • The major differences between the routing protocol chosen and the others that were not chosen;
      • How the chosen protocol can be used in a modern day routed network environment.
  • ·  Site at least two advantages and two disadvantages, of your chosen routing protocol subject

·  Site at least two of the most common programmable parameters of the protocol, and how they affect traffic flow

·  Discuss the major differences between the routing protocol chosen and all others that were not chosen

In the Conclusion of your Paper 

·  Discuss how your chosen protocol can be used in a modern day routed network environment. (seen in Conclusion)

Paper Sections:

Description: Your Paper MUST contain the following sections. 

* Title Page

– Title of Paper

– Author

– Class

– Professor

* Introduction

* Body

– Support Introduction 

– Elements (see above)

– History

– Advantages/Dis-advantages

– Two Programmable Parameters

– How do they effect traffic flow

– Compared your chosen Protocol to all Routing Protocols we have studied

* Conclusion

– Your Opinion of selected Routing Protocol

– A Summary

– Modern Day Usage 

Security Awareness Training Program

Employee training in security normally is a one-time or annual event. It has been proven that security awareness can be reinforced through the use of posters placed in strategic locations.

  1. Research any computer security threat or a recent attack. Select one element of the threat or attack (e.g., “Clean Desk”).
  2. Design a Security Awareness Training Poster that is simple and compelling (e.g., the WWII poster “Loose Lips Sink Ships”).
  3. Include how to empower trainees to analyze cybersecurity theories and practices in the light of God’s revealed truth and apply professional, ethical, and responsible behaviors to tangible security situations from a Christian worldview.