Project paper – COmputer Science

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

1-2 pages, Essay on union find, I need it done in 5 hours

 Read the instruction and write an 1-2 pages essay. All instructions are attached. In the “union find assignment.pdf” there’s all the instruction. In the zip file, there are 9 programs I made. In the HW1. pdf, I drew a graph to indicate the results of each program, they show how each program unions. There are three big programs called quickfind, quickunion and weightquickunionfind. Each of these three programs has three different algorithms. Engineers first require to compare the efficiency and asymptotic bounds of each algorithm. Then, they compare the results from all kinds of algorithms in quickfind, quickunion and weightquickunionfind. The measure would be focusing on time efficiency and asymptotic bounds. Please write more about comparing. 

cyber kill chain

 

Pick a breach from the list provided and then explain in a 1,200- to 1,500-word report where the policy failed and/or where management failed to implement the policy. Make sure to address the following:

  1. What portion of the policy first allowed the Kill Chain to be effective?
  2. How can the implementation of policies be strengthened so a breach is not repeated?
  3. Were laws broken when the policy was not followed or even developed?
  4. What were the financial costs that occurred for the company?
  5. In the Bible, the story of David killing Goliath (1 Samuel 17:4) shows that Goliath has advanced bronze armor, but this armor is futile against a stone and sling. This gives us a lesson that our trust in technology to save us is not always warranted. Examine the application of the Christian worldview within the context of security breach and how it can be prevented.

Data Breaches

  1. Yahoo. Date: 2013-14.
  2. Adult Friend Finder. Date: October 2016.
  3. eBay. Date: May 2014.
  4. Equifax. Date: July 29 2017. …
  5. Heartland Payment Systems. Date: March 2008.
  6. Target Stores. Date: December 2013.
  7. TJX Companies, Inc. Date: December 2006.
  8. JP Morgan Chase. Date: July 2014.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance. 

MIS Paper 2

Pick one of the topics listed below, write a 4-page paper describing the topic and recent developments (past 3 years).  

Mobile Marketing, Mobile Entertainment, Data Visualization, Supply Chain / Logistics Automation

 Provide a minimum of three scholarly reference in your paper (cited and referenced in APA format).

– Double space your paper
– The paper must use APA format (6th edition)
– Minimum of 4 pages, plus 1 cover (title) page, plus 1 page for references.
– Work must be original, no cut and paste.
– No word changing software such as Spinbot, Rephraser, etc. allowed

Healthy Care Community HIT Installation Plan

This week you continue your work on the Healthy Care Community (HCC) HIT system upgrade project. You have been tasked with drafting the installation plan for the HCC Medication Synchronization portion of the project. The installation plan for this portion of the project will create a model for the installation phases of the other recommended HIT system components of your HCC HIT upgrade plan. 

Part 1 – HIT Architecture and Pharmacy Medication Synchronization Diagrams 

Revise your proposed HCC HIT Architecture Diagram from your Week Two Healthy Care Community Security and Privacy Plan individual assignment with instructor feedback (coming soon).

Create a separate Microsoft® Visio® system diagram of the Pharmacy Medication Synchronization component. Use one of the cloud-based Pharmacy medication synchronization solutions you recommended in the Week Three Supporting Activity: Healthy Care Community Medication Synchronization Vendor Recommendation.

Include the following in your diagram:

  • The HIT system components with the new pharmacy system interface
  • Security requirements and standards for the new pharmacy system
  • Hardware and software elements required for the new pharmacy system 

Part 2 – HIT Installation Plan 

Develop a 3- to 4-page Healthy Care Community HIT Installation Plan, in Microsoft® Word, specific to the medication synchronization cloud-based solution you selected in Part 1 of this assignment. The plan should explain what your solution is, how you arrived at your recommendation, and how you plan to implement it. 

Include the following elements in your plan:

  • The medication synchronization-related business requirements considered and addressed
  • The minimum hardware operating requirements that the vendor must adhere to
  • Two vendors you considered for this project
  • Your final vendor recommendation and rationale
  • The list of hardware components that will be required for this solution and whether they will be installed onsite or within the vendor’s environment
  • A high-level task list and schedule for implementing the cloud-based medication synchronization solution, including:
  • Review and confirmation of vendor specs to business requirements
  • Hardware and software installation order and dependencies
  • Performance testing
  • User testing
  • Estimated go-live date

***ALL REFERENCE DOCS WILL BE INCLUDED ONCE CONFIRMED***

Discussion-6 ME

 

For this Discussion Question, complete the following.

1. Review the two articles about bank failures and bank diversification that are found below this. Economic history assures us that the health of the banking industry is directly related to the health of the economy. Moreover, recessions, when combined with banking crisis, will result in longer and deeper recessions versus recessions that do occur with a healthy banking industry. 

Bank Diversification, Economic Diversification?

https://www.richmondfed.org/~/media/richmondfedorg/publications/research/economic_quarterly/2005/winter/pdf/walter.pdf

2. Locate two JOURNAL articles which discuss this topic further. You need to focus on the Abstract, Introduction, Results, and Conclusion. For our purposes, you are not expected to fully understand the Data and Methodology.  

3. Summarize these journal articles. Please use your own words. No copy-and-paste. Cite your sources.

Final Exam

 

Answer the four questions noted below.  Please use at least one reference and ensure it’s in APA format (as well as the in-text citation).  Also, ensure to NOT COPY DIRECTLY from any source (student or online source), rather rephrase the author’s work and use in-text citations were necessary.

Describe the CIA triad and the defense in depth principle? Why are those concepts important when designing your network security strategy?

What are the steps for an incident response plan? How does network security play into an incident response plan? 

What are some major differences between open source and commercialclosed source software and solutions? Should you consider one over the other? 

What are firewalls? What are VPNs? What are some alternatives to a traditional firewall? What are some alternatives to traditional VPNs? How does the alternatives improve the traditional version of both?

Note: The essay should include an APA cover page and at least two reference (academic or professional literature) in APA v7 format.

emerging threats and counter measures

 

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately three in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.