Presentation Computer Science(( must complete in 6hrs ))

Instructions

Explain and provide example when it is possible that will cover chapter 4 subjects:

Data Link Layer

Media Access Control•

Controlled Access•                         Contention Access–                  ErrorControl•                                Prevention•                                     Detection•                                     Correction–                                      Protocols•                                            Async•                                                   SDLC•                                                Ethernet•                                                 PPP–Transmission Efficiency and Throughput

Additionals resources

https://www.csus.edu/indiv/m/millerd/Ch4%20Ed7%20Notes.ppt

Assignment

When law enforcement becomes involved, the need may arise to freeze systems as part of the evidence. There is also the likelihood that the incident will become known publicly. Do you think these issues play a significant part in the decision to involve law enforcement? Why or why not? Can you name some situations in which you believe that large organizations have decided not to involve law enforcement?

Assignment should follow all APA rules and include a min. of (1) citation/reference.

Assignment

 

Discuss  500 words or more discuss why Security as a Service is a good investment.

Use at least three sources.  Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Ethical Hacking

1.) Given the rich and diverse skills and mindset of an ethical hacker (technical, administrative, and physical measures), which characteristics do you believe to be the most important in this role? Please explain your choice. 

2.) Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.

Your assignment should be 3-4 paragraphs in length.

Choosing a Methodology

 

Read the Manage Your Health Inc. Case Study and complete the assignment below.

Consider the differences between Agile and waterfall.

Select 1 methodology to use for a project plan for this initiative.

Create a simplified project plan such as the examples listed in the “Tips” section below. Include, at least, the following criteria:

  • Name of task
  • Duration
  • Predecessors
  • Notes

After completing your simplified project plan, write a 175-word paragraph and complete the following:

  • Define which methodology, Agile or waterfall, is most appropriate for this project. Why? Cite at least 2 sources to support your rationale.
  • Describe the following roles for this project: project manager, project sponsor, business analyst, and scrum master or program manager.

You may create your simplified project plan using Microsoft® Excel® or another software application of your choice. 

discuss an important aspect of information technology

Discussion: This week we discuss an important aspect of information technology: ethics.  Please describe the term information system ethics and note some of the principles a company can establish to ensure they are acting ethically within their information systems.

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

discussion questions

1. Why is the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.

2.  What are the privacy issues with data mining? Do you think they are substantiated?

cyse paper 8

Some organizations prohibit workers from bringing certain kinds of devices into the workplace, such as cameras, cell phones, and USB drives. Some businesses require employees to use clear or see-through backpacks when carrying personal items. What other devices might not be allowed in certain facilities, and why would they be restricted? The video on Google’s Data Center may give you some ideas to write about for this assignment. 3 paragraphs

ITEC 8030

Create a program using the principles of inheritance based on the following scenario: Scenario: The teachers of a local school need a program to teach their students the basics about animals and their characteristics. The teachers want the program to contain a database of animals, from which the teachers can choose animals to add to a list. The list will be displayed on the students’ monitors so they can study the animals and their characteristics. Right now, the teachers want a program that handles only mammals and birds, but in the future they may want to add other types of animals. The teachers also expect the program to run smoothly and be thoroughly tested to handle extraneous input. Create a program that fulfills the specifications outlined in the scenario above. Use the concept of inheritance to allow for later additions to the program. Also use the TDD concepts from Unit 1 to test the program as you go.

AmazonEcho

  

Instructions

1. Please read these two articles: 

· Using forensics against a fitbit device to solve a murder:  https://www.cbsnews.com/news/the-fitbit-alibi-21st-century-technology-used-to-help-solve-wisconsin-moms-murder/

· How Amazon Echo could be forensically analyzed! https://www.theverge.com/2017/1/6/14189384/amazon-echo-murder-evidence-surveillance-data

2. Then go around in your residence / dwelling (home, apartment, condo, etc) and be creative.

3.  Identify at least five appliances or devices that you THINK could be forensically analyzed and then identify how this might be useful in an investigation. Note – do not count your computer or mobile device. Those are obvious!

4. I expect at least one paragraph answer for each device. 

Why did I assign this? 

The goal is to have you start THINKING about how any device, that is capable of holding electronic data (and transmitting to the Internet) could be useful in a particular investigation!