discussion

 What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents. 

Digital Forensics Tools&Tech

 

Week Nine Assignment

Use the web or other resources to research at least two criminal or civil cases in which  recovered files played a significant role in how the case was resolved.

Use your own words and do not copy  the work of another student.

Attach your WORD document here.

Assignment

FORENSIC DESIGN ASSESSMENTS

This task relates to a sequence of assessments that will be repeated across Chapters 6, 7, 8, 9 and 10. Select any example of a visualisation or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualisation’s anatomy. In each case your assessment is only concerned with one design layer at a time.

For this task, take a close look at the composition choices:

  1. Start by identifying all the applications of colour deployed, listing them under the headers of 1) project composition, and 2) chart composition
  2. How suitable are the choices and deployment of these composition properties? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential composition approaches, what would you do differently or additionally?

Assignment Link: http://book.visualisingdata.com/chapter/chapter-10

Assignment Requirements: At least 500 words in length

References: At least two peer-reviewed, scholarly journal references.

Cloud computing and digital forensics – Week 8

Week 8 Discussion(500 words)

Discuss in 500 words or more  federated architecture in cloud systems. Remember that this is a cloud class not a database class. 

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. 

Write in essay format not in bulleted, numbered or other list format. 

Do not use attachments as a submission. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your post and that you reply to two classmates in a substantive way (not ‘nice post’ or the like).  Your goal is to help your colleagues write better. Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. . I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

Week Eight Assignment(250-300 words)

Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

PLEC Week 5

 Discuss in 500 words your opinion whether Fair Use of copyrighted material should be expanded, contracted, or left alone. Justify your choice.   

21

DELIVERABLES:

1.  SCOPE OF WORK- 1 page SOW report

2.  WORK BREAKDOWN STRUCTURE- WBS

3.  THREATS AND VULNERABILITES REPORT- 2 or 3page report 

4.  NETWORK ANALYSIS TOOLS REPORT- 1 OR 2 page report

5.  VULNERABILITY ASSESSMENT- matrix

6.  LESSONS LEARNED REPORT- 2 or 3 page report

7.  FINAL VULNERABILITY ASSESSMENT REPORT-Your final document will be seven to 10 pages long, not including charts and graphics, and will include appendices, including a vulnerability assessment matrix. 

EH week1 p1

 

Hello,

i need this paper by 08/26 afternoon.

Strictly No plagiarism please use your own words.

Review the required reading material and summarize one of the scholarly articles listed on the selected websites. In 2-3 paragraphs (300 words), and using your own words, explain why ethical hacking is necessary in today’s complex business environment.

Click on the LINK to submit your WORD document for this week’s assignment.

https://resources.infosecinstitute.com/the-benefits-of-learning-ethical-hacking/

https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/

https://www.youtube.com/watch?time_continue=5&v=eNQycQwKV7Y&feature=emb_title

Strictly No plagiarism