DForsnisc-we-6

Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

350 words

Case Project 13-7: Lake Point Security Consulting

 

“Lake Point Consulting Services (LPCS) provides security consulting and assurance services to over 500 clients across a wide range of enterprises in more than 20 states. A new initiative at LPCS is for each of its seven regional offices to provide internships to students who are in their final year of the security degree program at the local college.

Predish Real Estate and Auction (PREA) buys and sells high-end residential and commercial real estate across a multistate region. One of the tools that PREA offers is a sophisticated online website that allows potential buyers to take virtual tours of properties. However, PREA’s site was recently compromised by attackers who defaced the site with malicious messages, causing several customers to threaten to withdraw their listings. PREA’s senior management has demanded a top-to-bottom review of their security by an independent third party. LPCS has been hired to perform the review, and they have contracted with you to work on this project.

  1. The first task is to perform a vulnerability assessment of PREA. Create a PowerPoint presentation for the president and his staff about the steps in a vulnerability assessment. List in detail the actions under each step and what PREA should expect in the assessment. Your presentation should contain at least 10 slides” (Ciampa, 605).

Carefully read the case project statement and step number 1 to ensure you cover all of the requested topics. Refer to the information given in the Module 4 assignment that was similar to this for reminders about how to create good presentations. Remember to use the speaker’s notes (this is especially important as I will not see you give this presentation. I need to know what you will say if you were in front of an audience), few bulleted items on the screen, and applicable graphics (charts, graphs, clipart) to make the presentation interesting. You should have an introduction slide, a conclusion slide, and a slide for the list of your sources, along with any content slides needed to get your point across. Information technology specialists always need to be prepared to talk about technology to those who are not versed in the subject. This assignment gives you practice in doing just that.

BE D6

  

Discussion:

Discuss the risks of avoiding confrontation of a problem employee. 

Should be 250-300 words with references.

Should be in APA format

qqq

Please click on the following articles to review the content:

Improve Time-Management Skills

https://www.virtuesforlife.com/8-ways-improve-time-management-skills/ (Links to an external site.)

How to Manage Your Time in College

https://www.wikihow.com/Manage-Your-Time-in-College (Links to an external site.)

Why Time Management is Important – Eight Reasons Why Time Management is Crucial

https://www.appointment-plus.com/blog/why-time-management-is-important (Links to an external site.)

Top Ten College Student/Graduate Job Search Mistakes

https://www.thebalance.com/top-college-student-graduate-job-search-mistakes-2059842 (Links to an external site.)

Please click on the following videos to review content:

The Value of Time

The Value of TIme (Links to an external site.)

How to Find an Internship You Will Value

https://bigfuture.collegeboard.org/get-started/outside-the-classroom/how-to-find-an-internship-youll-value (Links to an external site.)

Best Practices for a Successful Job Search

Best Practices for a Successful Job Search

After reading the assigned articles, please write a one-page essay double-spaced 12 pt. font describing your career path strategy in your major including education, experience, skills, and job requirements. In addition, include steps necessary to advance in your chosen career.

Module 8 – Case Project 14-3

Your manager has asked you to research and recommend a writing guide that examiners in your digital forensics company can use for all official written reports. Conduct research on the Internet to find information about style manuals and technical and legal writing guides. You should also research writing guides from professional associations, such as the IEEE and the American Psychological Association. Write a two- to three-page report recommending a style manual or technical/legal writing guide for your company to use and explain the reasons for your recommendations. You might want to combine guidelines from different sources in coming up with recommendations for digital forensics reports.

Business Intelligence Manager Resume

Friday: Reflective Assessment – Business Intelligence Resume

Saturday: Reflective Assessment – Characteristics of A Data Whisperer

Take a cursory look at this link on data whisperer…..

The data whisperer — Why you need one, and why it’s not your data scientist

Sunday: Reflective Assessment – Modern Data Scientist/Business Intelligence Manager

Example –

Review the business intelligence manager resume sample provided in this folder. Select and discuss 2 components of the Business Intelligence Manager resume that relates to your future or current job.

Your reflective assessment paper should be at least 100 words, double-spaced, and typed in an easy-to-read MS Word (other processors are fine to use but save it in MS Word format).

Discussion on VPN

What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices? If you do use a VPN, which one and why did you select that particular one?

Privacy and Compliance

 

Learning Objectives and Outcomes

  • Analyze importance of privacy and compliance with the privacy regulations.
  • Identify information that is protected by the Privacy Act of 1974.

Assignment Requirements

Referring to chapter 3 in the textbook, address the following:

Using what you have learned about the importance of privacy and compliance with the privacy regulations, identify information that is protected by the Privacy Act.

 

Required Resources

  • Textbook: Access Control, Authentication, and Public Key Infrastructure, Chapter 3.

 

Required Resources

  • Textbook: Access Control, Authentication, and Public Key Infrastructure, Chapter 3.

research questions and hypotheses

 Primary Task Response: Within the Discussion Board area, write 300–500 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Quantitative research questions use the scientific method to answer and, therefore, each research question has two associated hypotheses.

  • What are the differences between research questions and hypotheses?
  • What key information needs to be included in quantitative research questions and hypotheses?
  • Provide an example of one quantitative research question and its two associated hypotheses.