Cloud Computing and Digital Forensics

1.) In 500 words or more, consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.

Use at least three sources. Use the  Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes.Copying without attribution or the use of spinbot or other word substitution software will result in a grade of 0. Write in essay format not in bulleted, numbered or other list format. 

2.) Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness. Write a short paper, 200-300 words.

Homework Lab 4

Attached Assignment Questions in Week Assignment file 

Check the attachement 

Requirement—– NO PLAGIARISM 

NEED 2 Pages with APA Format

Cloud Computing : All Q's

Question1:

 D2 : 

Consider, in 500 words, how business processes as services can improve efficiency. This discussion is about business process as a service and security 

 Use at least three sources. Use the Research Databases available from the Danforth Library not Google.   Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes. 

Question 2 :

D3:

 In 500 words , consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics. 

 Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes 

Question 3: 

D4:

Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.  

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Question 4:

D5:

 Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC. 

 Use at least three sources.   Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes. 

Question 5:

D6:

Compare and evaluate in 500 words or more qualitative v quantitative risk assessment.  

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes. 

Question 6:

D2: Digital Foreniscs 

Do a bit of research on-line. Find a criminal case that involved Digital Forensics. 

Using WORD, write an ORIGINAL brief essay of 600 words or more describing the case and the how digital forensics were used  in the investigation. 

Case Study 1: The Curious Case of Gary McKinnon

 

Alleged computer hacker Gary McKinnon of the United Kingdom has publicly admitted to compromising computer systems belonging to NASA and the Department of Defense. Using information from your classroom, additional materials provided by your instructor, and your own independent research, discuss the impact of these widespread intrusions, and comment on McKinnon’s self-proclaimed motivations. Describe McKinnon in the context of the frameworks and theories of cyber-crime and cyber criminals discussed in the classroom. Are the efforts to extradite McKinnon to the United States simply a political stunt, or are they an important precedent in prosecuting international cyber-crimes? Finally, share what you know about computer security and best practices to make recommendations to prevent similar incidents in the future. Your submission should be a minimum of four pages in length, and it should conform to APA formatting and citation standards. A title page and reference list (APA style) are mandatory, but they will not count toward the four-page requirement.

 

CIS PROJECT

An annotated bibliography will be created and submitted to a Moodle forum for review by classmates. Demonstrate ability to research and analyze using modern computer resources

Scraping Numbers from HTML using BeautifulSoup In this assignment you will write a Python program

Scraping Numbers from HTML using BeautifulSoup In this assignment you will write a Python program similar to http://www.py4e.com/code3/urllink2.py. The program will use urllib to read the HTML from the data files below, and parse the data, extracting numbers and compute the sum of the numbers in the file. 

We provide two files for this assignment.  One is a sample file where we give you the sum for your testing and the other is the actual data you need to process for the assignment. 

You do not need to save these files to your folder since your program will read the data directly from the URL. Note: Each student will have a distinct data url for the assignment – so only use your own data url for analysis. 

Data Format 

The file is a table of names and comment counts.   You can ignore most of the data in the file except for lines like the following: 

Modu90
Kenzie88
Hubert87

You are to find all the tags in the file and pull out the numbers from the tag and sum the numbers. 

Look at the sample code provided.  It shows how to find all of a certain kind of tag, loop through the tags and extract the various aspects of the tags. 

...
# Retrieve all of the anchor tags
tags = soup('a')
for tag in tags:
  # Look at the parts of a tag
  print 'TAG:',tag
  print 'URL:',tag.get('href', None)
  print 'Contents:',tag.contents[0]
  print 'Attrs:',tag.attrs

You need to adjust this code to look for span tags and pull out the text content of the span tag, convert them to integers and add them up to complete the assignment. 

Sample Execution 

$ python3 solution.py
Enter - http://py4e-data.dr-chuck.net/comments_42.html
Count 50
Sum 2...

Turning in the Assignment 

Enter the sum from the actual data and your Python code below:
Sum:  (ends with 25)
Python code:

cyberbullying: an exploratory analysis of factors related to offending and victimization

Textbook Chapter 9: Cyberbullying, Online Harassment and Cyber Stalking.

1. To what area(s) of which chapter does the work most closely relate?

2. What does(do) the author(s) set forth as their thesis in the piece?

3. What subjects does the work regard: people, entities, industries, political bodies, demographic groups, etc.?

4. What journal was it published in, and when?

5. **Key** How can you apply their work to your academic and professional understanding of DF?

6. What did the author(s) get right? Wrong? How could they have expanded/focused their scope?

· No Plagiarism 

· Should be 400 words without References.

Cloud Computing

1. Write a 2-3 page paper where you compare and contrast the differences between Identity as a Service, Infrastructure as a Service and Identity Access Management. The submission needs to include a minimal of 3 scholarly resources in APA format.

2. Define and describe Platform as a Service. In the description be sure to list the benefits and potential disadvantages. Locate an article that supports the benefits of PaaS in an organization and/or the failures of PaaS implementation. Be sure to cite in APA format. 

No plagiarism

Footpriting

After responding to the weekly discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project. For this assignment, you are asked to develop your own crime scenario. Explain the incident that occurred, and then list the steps you would follow to solve this case (examples might include: a lost child, an unauthorized charge on your credit card, an unidentified charge made with your EZ PASS, etc.).