Digital Forensics Tools and Tech

 

Explain how cookies can show that a user has visited a site if that user’s history has been deleted.

Optional: install Windows Historian and see the sites visited by a particular user. 

Use your own words. Attach your WORD document here.

300 words APA format

Research paper 15 pages subject Enterprise risk management and need PPt of 12 slides

 
•    Here’s the approach you can take for this paper:

  • Title page (ensure team members and IDs are listed)
  • Introduction – provide a background of the selected organization.
  • Risk #1
  • Description
  • Impact on organization
  • Recommendation on how to manage it
  • Risk #2 
  • Description
  • Impact on organization
  • Recommendation on how to manage it
  • Risk #3
  • Description
  • Impact on organization
  • Recommendation on how to manage it
  • Conclusion
  • References (minimum of 12 reputable sources)
  • Appendix (if any)

The paper will range from 15-to-20-pages includes title page, content, and references.

Please write in APA Style.

Discussion

Incident Response Team (IRT) Policies

  • Describe the different ISS policies associated with incident response teams (IRTs).

Keywords

Use the following keywords to search for additional materials to support your work:

  • Business Continuity Plan (BCP)
  • Business Impact Analysis (BIA)
  • Containment and Minimizing Damage
  • Disaster Recovery Plan (DRP)
  • Incident Classification
  • Incident Response
  • Incident Response Support
  • Incident Response Team (IRT)
  • Incident Response Team (IRT) Charter
  • Incident Response Team (IRT) Members
  • Media Handling

Lab 15 HTML

  • Review the Multimedia PDF and the Web Development PPT
  • Download the Word document below and follow the instructions
  • HTML Lab
  • ZIP up your HTML file and your image file into a Lab15.zip file
  • Upload the ZIP file to Canvas for grading

Business Intelligence – Discuss the difficulties in measuring the intelligence of machines.

Please complete Chapter 2 – discussion question #1 & exercises 4, 5, and 15 (limit to one page of analysis for question 15)

Discussion question 1 – Discuss the difficulties in measuring the intelligence of machines. 

Exercise 4 – In 2017, McKinsey & Company created a five-part video
titled “Ask the AI Experts: What Advice Would You Give to Executives About AI?” View the video and summarize the advice given to the major issues discussed.
 

Exercise 5 – Watch the McKinsey & Company video (3:06 min.) on today’s drivers of AI at youtube.com/ watch?v=yv0IG1D-OdU and identify the major AI drivers. Write a report. 

Exercise 15 – Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recognition product. 

Discussion

Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least two scholarly source should be used in the initial discussion thread. Use proper citations and references in your post.

Data visualization

According to Kirk (2016), The essence of “Formulating Your Brief” is to “identify the context in which your work will be undertaken and then define its aims: it is the who, what, where, when and how.” It could be formal or informal as any project you think you must make it. This phase is where you create a vision for your work.

1. Why is it so important to formulate your brief for a data presentation? Discuss some ways you would implement to formulate an effective brief. What are some advantages to your methods? What are some disadvantages?

2. Please provide a summary as to whether you agree/disagree with their advantages/disadvantages.

– apa

– 2pages

– no plagiarism

– 2 references

Reference
Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design. Thousand Oaks, CA: Sage Publications, Ltd.