WEBAssignment

 

Provide a reflection of at least 500-800 words of how the knowledge, skills, or theories of “ WEB BROWSER FORENSICS ” have been applied or could be applied, in a practical manner to your current work environment(software developer). If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide an 500-800 word minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

Assignment and Discussion

 

Week 8 – Discussion

What do you think is the single greatest physical threat to information systems? Fire? Hurricanes? Sabotage? Terrorism? Discuss this question and provide support for your answer.

Writing Assignment – WK 8

Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? The video on Google’s Data Center may give you some ideas to write about for this assignment.

Your written assignment should consist of 2-3 paragraphs.

 

Task 3 Do Homework

  • 8.1 What is the difference between RFC 5321 and RFC 5322?
  • 8.2 What are the SMTP and MIME standards?
  • 8.3 What is the difference between a MIME content type and a MIME transfer encoding?
  • 8.4 Briefly explain base64 encoding.
  • 8.5 Why is base64 conversion useful for an e-mail application?
  • 8.6 What is S/MIME?
  • 8.7 What are the four principal services provided by S/MIME?
  • 8.8 What is the utility of a detached signature?
  • 8.9 What is DKIM?

Discussion:

 In no less than 250 words, describe a type of email threat and how a hacker can use it to get sensitive information.  How can a network administrator prevent this type of attach from happening? 

SyncSession Assignment

 

Write a 4-5 page paper (deliverable length does not include the title and reference pages)

  • Why and how are employers increasingly using workplace monitoring?
  • What are the capabilities of advanced surveillance technologies, and what ethical issues do they raise?

Assignment 1 cryptography

  Question: Evaluate the history of cryptography from its origins.  Analyze how cryptography was used and describe how it grew within history.  Look at the reasons why cryptography was used and how it developed over the years.  Was it used or implemented differently in varying cultures?  

 –The writing assignment requires a minimum of two written pages to evaluate history.

  -You must use a minimum of three scholarly articles to complete the assignment.

– The assignment must be properly APA formatted with a separate title and reference page. 

 – No Plagiarism 

Summarize content in textbook

Chapter 1 – Review the Key Lessons from Chapter 1 – Explain the five key lessons and note the importance of each key lesson from chapter 1. Also, note why is it important to understand these basic concepts. (Information Technology and Organizational Learning Textbook)

Chapter 2 – Note why the IT organizational structure is an important concept to understand. Also, note the role of IT in the overall business strategy. (Information Technology and Organizational Learning Textbook)

The above submission should be two pages in length and adhere to APA formatting standards.
Quotes are not allowed, paraphrase your source.
A title page and references are required.
APA formatting is required.

2 pages

APA 7th

Strictly plagiarism free

Windows Hardening Recommendations

Scenario

As a security administrator for Always Fresh, you have been instructed to ensure that Windows

authentication, networking, and data access are hardened. This will help to provide a high level of

security.

The following are issues to be addressed through hardening techniques:

▪ Previous attempts to protect user accounts have resulted in users writing long passwords down

and placing them near their workstations. Users should not write down passwords or create

passwords that attackers could easily guess, such as words founds in the dictionary.

▪ Every user, regardless of role, must have at least one unique user account. A user who operates

in multiple roles may have multiple unique user accounts. Users should use the account for its

intended role only.

▪ Anonymous users of the web server applications should only be able to access servers located in

the demilitarized zone (DMZ). No anonymous web application users should be able to access any

protected resources in the Always Fresh IT infrastructure.

▪ To protect servers from attack, each server should authenticate connections based on the source

computer and user.

Tasks

Create a summary report to management that describes a hardening technique that addresses each

issue listed above. Provide rationale for each selection.

Required Resources

▪ Internet access

▪ Course textbook

Submission Requirements

▪ Format: Microsoft Word (or compatible)

▪ Font: Arial, size 12, double-space

▪ Citation Style: Follow your school’s preferred style guide

▪ Length: 2 to 4 pages

Self-Assessment Checklist

▪ I addressed all issues required for the summary report.

▪ I created a well-developed and formatted report with proper grammar, spelling, and punctuation.

▪ I followed the submission guidelines.

Computer Science Business Data and Communication Presentation

Explain and provide example when it is possible that will cover chapter 6 subjects:

•Network architecture components

•Traditional network design

•Building-block network design

–Needs analysis

–Technology design

–Cost assessment

Pick Two of Network Simulation Tools from the following, and Discuss, Present them on the class:

•[WANsim] WAN simulators and emulators http://www.wan-sim.net/

•[OPNET] OPNET Modeler, http://www.opnet.com/

•[NS2] NS2 official website, http://www.isi.edu/nsnam/ns/

•[NS2-wiki] NS2 resource webpage, http://nsnam.isi.edu/nsnam/index.php/Main_Page

•[NS3] NS3 official website, http://www.nsnam.org/documents.html

•[OMNeT] OMNeT++ official website, http://www.omnetpp.org/

•[REAL] REAL 5.0 simulator overview, http://www.cs.cornell.edu/skeshav/real/overview.html

•[SSFNet] Scalable Simulation Framework (SSF), SSFNet homepage, http://www.ssfnet.org/homePage.html

•[J-Sim] J-Sim homepage http://www.j-sim.org/

•[QualNet] QualNet official site, http://www.scalable-networks.com/products/•[YANS], Yet Another Network Simulator http://yans.inria.fr/code/yans/?summary

•[GTNetS] The Ge orgia Tech Network Simulator (GTNetS) http://www.ece.gatech.edu/research/labs/MANIACS/GTNetS/

Essay

 

  1. The following must be submitted by the end of the Residency day (7:30pm ET) on Saturday. No credit is available for submissions not made by this time. The system will not accept submissions made after this time. This is not a group assignment, so no collaboration or discussion is allowed; it must be worked on individually. Submit your responses to all three questions in a single document. There should be a single title page for the document. However, each question should have its own separate references page (a source may be reused for multiple questions). The total length of the document should be between 13 and 16 pages. Do not include the wording of the questions in your paper.
    Question 1:
    In 750-1000 words, identify and explain the five steps of forecasting, and then come up with an original example taken from your own professional experiences to illustrate these steps. Your response must be original. You must incorporate at least three reliable sources, both as references and corresponding in-text citations. APA format is expected.

    Question 2:
    In 750-1000 words, explain qualitative and quantitative forecasting, and then come up with an original example of each taken from your own professional experiences to illustrate these two forecasting types. Your response must be original. You must incorporate at least three reliable sources, both as references and corresponding in-text citations. APA format is expected.

    Question 3:
    In 750-1000 words, identify and explain the types of data patterns, and then come up with an original example of each (strive to make it based on your own professional experiences) to illustrate each data pattern type. Your response must be original. You must incorporate at least three reliable sources, both as references and corresponding in-text citations. APA format is expected.

  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Individual Project

Prepare  an 8 page APA style paper and at least 3 additional peer reviewed resources. Include an introduction and  conclusion in the paper. Remember to use APA formatted headings for each  section of the paper and provided in text citations of the sources you  use. This paper should address the following questions:

(1)  Does Blockchain technology have the potential to cause the paradigm  shift in business practices that many experts are predicting? Explain  why or why not.  Support your answer with research. 

(2)  Is there evidence to suggest that Blockchain technology will change the  way HR is practiced? If there is, discuss that evidence. If there is  not, what issues exist that impede its adoption?

(3)  Which functions of human resource management could be most impacted by  Blockchain technology? How might the HR functions change? Support your  answer with research.

Course writing requirements:

  • References  MUST be cited within your paper in APA format. Your reference page and  in-text citations must match 100%. Papers without in-text citations will  earn failing grades.
  • Always include a cover page and reference page with ALL submissions (even initial discussion posts) 
  • Provide  the EXACT web link on the reference page citations for all online  sources – do not provide just the home page, but the EXACT LINK – I  check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write MORE than the minimum requirement of the word count assigned
  • As  always, the word count is ONLY for the BODY of the paper – the cover  page, reference page, and / or Appendix (if included) do not count  towards the word count for the paper 
  • Indent the first line of each new paragraph five spaces
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.