Write a research report on Software Engineering and Software Security.
All the instructions are attached here under. Please read the instructions and work accordingly.
Write a research report on Software Engineering and Software Security.
All the instructions are attached here under. Please read the instructions and work accordingly.
1. please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies (300 Word).
2. Do you feel that countries and companies need explicit strategies for technology development, given the tremendous amount of largely spontaneous creativity that occurs today, often in areas where new technologies are not expected to exert a great influence? Why or why not? (300 Word)
DISCUSSION:
Should be between 250-to-300 words.
DUE DATE: Wednesday End of Day USA time (3 days from now)
Reply: I need 2 replies. Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO)
DUE DATE: Saturday End of Day USA time (6 days from now)
Topic:
Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.
Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:
RESEARCH:
Need this research paper by Friday USA time. (5 days from now).
7 pages without references and cover page. Follow APA 7 format and citations.
TOPIC:
Develop a disaster recovery plan for an organization. There are many different templates available online for you to use as reference and guidance. Your plan should cover the following sections (these sections detail the elements in a DR plan in the sequence defined by industry compliance standards ISO 27031 and ISO 24762):
Your paper should meet the following requirements:
Required Textbook: Tapscott, D., &Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin.
Discussion:
You installed and set up a Bitcoin Wallet last week(watch the above link). Do you plan to use your wallet to buy or sell merchandise or services? If so, what do you plan to do with your Bitcoin? If not, describe why you don’t want to use Bitcoin. Will your plans change in the future?
Write 200 words paper.
Please review the following two papers:
Dickson, B. (2019). How to Keep Your Bitcoin Safe. PC Magazine, 37.
Retrieved from http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=f5h&AN=138901618&site=eds-live
Ruslina, E. (2019). Legal Protection for Bitcoin Users in E-Commerce Transactions. Journal of Internet Law, 23(4), 3–6.
Retrieved from: http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=buh&AN=139556416&site=eds-live
Discuss the “Legal Protection for Bitcoin users in E-Commerce.” Provide use cases as examples and citations.
You must do the following:
1) Create a new thread. As indicated above, please discuss “Legal Protection for Bitcoin users in E-Commerce”.
2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should extend the conversation started with the thread.
ALL original posts and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”)
RUBRICS
Also I need comments for posting to 3 other students which should be atleast 150 words each comment.
Question 1:
Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics. and
Question 2:
What are the privacy issues with data mining? Do you think they are substantiated?
Write a “Post” with a word content of 200-300 words for each question and copy the Post into a Word doc.
Chapter 14 – According to Troitzsch (2005), microsimulation could be described as a form of variant and social simulation that can be seen to be located between and contrasted with system dynamics — with a macro focus and low complexity — on one side, and agent-based modeling — with a behavioral focus often relying on notional rules — on the other (Gilbert and Troitzsch, 2005). Following these collective research revelations by these authors who share the same ideas, what is the definition of the core of microsimulation?
Question: According to Gilbert and Troitzsch (2015) what is the definition of the core of microsimulation from this context?
Identify and name the definition of the core of microsimulation,
provide a clear narrative to support your response based of this case study — Not a general definition from the Internet.
Each field or industry will have its own aspects and skills that will define an expert in the field. For this assignment, you should:
Instructions:
1) What type of device or system did you select to conduct your forensics investigation?
2) What tool did you use for the data capture?
3) What did you learn from the experience?
· No Plagiarism
· APA Format required
· Each Answer Should be 350 words without References.
!!! NEED 2 ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM!!!!
!!! One Answer using FTK IMAGER LITE Tool !!!
!!! Second Answer using Autopsy Tool !!!
Artificial Intelligence and Machine learning are very popular today and help to solve many functions. For example, AT&T has embedded the artificial engine IBM Watson into the ticketing system to help solve customers problems on the first call. This AI engine simulates solutions based on million bits of information from past history.
In 80 words or more what do you think is a disadvantage with AI systems?