A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail. Why do think all of these skills are necessary?cys-D-14C
Week 2
Week 2 Individual Assignment
Please be sure to review Chapter #2 and Chapter #3. After reviewing the content, please answer the following 5 questions.
Please be sure to provide adequate support for your answer.
Please be sure to list at least 2 references in APA format.
Going outside the classroom and researching can enhance the learning.
1. Can you think of a situation in which identification numbers would be useful for prediction?
2. Give at least two advantages to working with data stored in text files instead of in a binary format
3. Identify at least two advantages and two disadvantages of using color to visually represent information.
4. Discuss the advantages and disadvantages of using sampling to reduce the number of data objects that need to be displayed. Would simple random sampling (without replacement) be a good approach to sampling? Why or why not?
5. Describe one advantage and one disadvantage of a stem and leaf plot with respect to a standard histogram.
domain model class diagram
- Read the narrative on Acme Electric, LLC.
- Create a domain model class diagram for Acme Electric, LLC’s proposed Job Management Application.
- Using Lucidchart
- saved as PDF
Cryptography-Milestone2
In the second milestone writing assignment, you will analyze asymmetric and symmetric encryption. Evaluate the differences between the two of them and which one that you would determine is the most secure. The writing assignment requires a minimum of two written pages to evaluate the history. You must use a minimum of three scholarly articles to complete the assignment. The assignment must be properly APA formatted with a separate title and reference page.
password standard
Write a password standard for CSI documenting your password recommendations. Your paper should look like a real policy document and not an academic paper.
At the end of the standard, cite one reference for your recommendations. Remember in this exercise that CSI appears to be challenging the old-school 8-character complex password rule. If you wish to challenge that rule yourself, or reinforce that rule and continue to use it, you need to supply at least one reference, and more would make for a more effective argument. Your citation does not need to be in any formal citation style. Ensure that your citation is good enough to find the reference.
This must be an original work. Do not rely on publicly available templates to fill in. Because this is a concise and focused paper, some matching will be detected by the SafeAssign tool. It is common for subject headers to match previous submissions. You may get a match score in the 30% range. Don’t worry about that. I’ll be looking for original work in the body of the paper. Bottom line – you’re a creator, not an editor.
Read examples of password standards online. Some organizations may call them password policies, which is confusing, but that ‘policy’ will focus on specifics on how to put a proper password together. You also will find some authoritative recommendations from NIST (National Institute of Standards and Technology). Happy Googling.
Discussion
While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public. Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.
- Provide extensive additional information on the topic
- Explain, define, or analyze the topic in detail
- Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
- Make an argument concerning the topic.
Note* Use proper citations (APA) and references in your post.
Answer the following questions
- Demonstrate understanding of VBA’s functionality, applications, and differentiation from Visual Basic.
- Apply VBA to the development of automation macros, providing standardized, scalable, cost-effective, and error-free business solutions.
- Critique VBA’s use in automation for Web browsers to leverage the Internet to produce effective business solutions.
- Construct VBA automation solutions to maximize the functionality of Microsoft Office Applications to control functionality within the Office suite and automate repetitive jobs.
- Summarize how businesses can solve issues while remaining innovative, competitive and become more profitable by eliminating waste and performing a more complex and accurate analysis of data using VBA’s automation solutions.
Risk Management Plan & Risk Assessment Plan
Please find the attachment for more details
Malware
10.1 What are three broad mechanisms that malware can use to propagate?
10.2 What are four broad categories of payloads that malware may carry?
10.3 What are typical phases of operation of a virus or worm?
10.4 What mechanisms can a virus use to conceal itself?
10.5 What is the difference between machine-executable and macro viruses?
10.6 What means can a worm use to access remote systems to propagate?
10.7 What is a “drive-by-download” and how does it differ from a worm?
10.8 What is a “logic bomb”?
10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
10.10 List some of the different levels in a system that a rootkit may use.
10.11 Describe some malware countermeasure elements.
10.12 List three places malware mitigation mechanisms may be located.
10.13 Briefly describe the four generations of antivirus software.
10.14 How does behavior-blocking software work?
10.15 What is a distributed denial-of-service system?
Access Control Discussion
Evaluate a qualitative risk assessment framework versus a quantitative risk assessment framework with specific examples (e.g., FAIR, NIST, etc.). APA formatting is expected for any references. Initial posts due by Thursday end of day and two peer responses due by the end of the unit.