In 250 words. ‘Ping sweep tool’, Explain in detail how it works and how detects network vulnerabilities. Provide the site where you obtained your information and include that in your assignment write-up
6 CS PAPER
Please
Digital Forensics Tools and Tech – project abstract
Submit your project abstract here. 500 Words
TOPIC YOU SELECTED : CAR TRACKING
Paper will be evaluated through safe assign
Abstract reference
Computer Science
Your company is experiencing decline in business because of competition. Your manager thinks they may be able to turn the company around if they can get help from an IT professional on E-Commerce and Mobile Technologies. Assume your company is a traditional retail entity similar to Sears, Macy’s or K-Mart, suggest ways your company can use E-Commerce and Mobile Technologies to increase its visibility and sales. In your discussion, explain what is E-Commerce and Mobile Technology.
Please use APA throughout.
1 response with 300 words and 2 responses with 150 words each. All with references(don’t include references towards total words count)
exercise work (Cryptography)
Crypto Security Architecture Exercise
Scenario
You work for the Apex Trucking Company. This is a firm that moves materials for clients all over North America and Europe. The leadership of the company has no real knowledge of technology, but wants to use encryption to protect the information the company has. The information to be protected consists of future marketing plans for the company, financial data, employee records, customer records, and customer shipping date.
The company wants the capability to securely allow customers to track their orders in real time from their origin to their destination on-line over the Internet. The information that is to be supplied to customers is tracking number, location of shipment, size of shipment, value of shipment, and estimated time of arrival as well as the customer contact information for this shipment.
While this information can be made available from a central server, the marketing groups in Europe, Mexico and Canada need management access to the data to enter new shipments and change orders before they ship.
The company currently is using desktops running Windows XP and Windows based servers. There are only passwords used for security, and a firewall, but no encryption to protect the information.
The project is to provide the above capability securely using encryption, as well as providing additional security to the company via encryption. You will need to address new technology, the reasons and costs behind your choices, and what policy and legal implications there are to your encryption solution
There is at least one marketing group in Mexico, Germany, and Canada, as well as three in the US. The company is based in New York. It is important that customers can rely on the shipping data being accurate, and from the company.
You’re assigned this crypto architecture project.
Configuration
The current configuration has one server acting as a firewall and web server. This server is directly attached to the Internet.
There is a database server behind the firewall, as well as a separate server for HR and marketing. The marketing server needs to be securely accessed by the marketing teams. They also need to access the database server through an Internet connection to manage data and display reports.
All databases use MySQL and are currently not secured.
Constraints
Your tasking is crypto architecture. The normal replacement of computers is done on a rotating schedule. It is outside the scope of your project to plan for the replacement of computers. Your architecture should work with the computers you have. You may consider the replacement of equipment if an upgrade or new equipment would be critical to the crypto architecture.
Specific Tasking
You have been specifically tasked to do the following things and develop a complete and sound crypto architecture. Remember, the president is very knowledgeable about cryptography and wants lots of details about how you are going to implement the encryption.
- Describe in detail what new cryptographic systems you are going to propose, how they work, and how they will enhance security. Be specific about these systems weaknesses and how you plan to compensate for the weaknesses.
- Describe and explain the impact the new cryptographic security architecture will have on the current security features and how this impact will be mitigated.
- What new issues will arise as a result of implementing the new cryptographic solutions and what are the arguments on either side of these issues?
- Show a clear and detailed understanding of the existing encryption being used such as passwords, and operating encryption features not being used and whether you plan to use these or not, and if not why not.
- How well will all these new cryptographic features work together? Identify any areas of concern, and how you propose to resolve conflicts and issues.
- What if any current security features can be eliminated cost effectively by the new crypto architecture?
DM W 11 A
Please check the attached document for questions
ETCM DISCUSSION-2
Internet-related crime occurs every minute. Cyber criminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cyber criminals?
Discussion should be between 250-to-300 words. And two Replies.
Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO)
Make sure APA format, citations are very key.
Time: 36 hours
PFA., for text book
Industrial Espionage in Cyberspace Question
Solve/Consider this hypothetical situation:
David Doe is a network administrator for the ABC Company. David is passed over for promotion three times. He is quite vocal in his dissatisfaction with this situation. In fact, he begins to express negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s departure, it is discovered that a good deal of the ABC Company’s research has suddenly been duplicated by a competitor. Executives at ABC suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.
What steps might have been taken to detect David’s alleged industrial espionage?
What steps might have been taken to prevent his perpetrating such an offense?
Requirements:
Write your answer using a WORD document with approximately 400 to 500 words
APA format in-text citations & references
No plagiarism
Security
- If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security?
Pratical connection – Data mining
At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and been put into practice within their own career.
Assignment: Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have observed these theories and knowledge being applied to an employment opportunity in your field of study.
Requirements:
Provide a 500 word minimum reflection.
Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
Share a personal connection that identifies specific knowledge and theories from this course.
Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
You should NOT provide an overview of the assignments given in the course. Rather, reflect and write about how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
Topic:
1) Can you please explain about Data mining topic
2 ) i work in IT industry i work for VMware virtualization , Networking and Storage technologies and AwS ,Azure cloud technologies how can you apply in Data Mining industry