ETCM DISCUSSION-2

Internet-related crime occurs every minute. Cyber criminals steal millions of dollars with near impunity. For everyone that is captured nearly 10,000 or not captured. For every one successful prosecuted in a court of law, 100 get off without punishment or with a warning. Why is it so difficult to prosecute cyber criminals?

Discussion should be between 250-to-300 words. And two Replies.

Reply is nothing but just additional 100-150 words on same topic but as a different paragraph. (I won’t send any replies to you and then you send info on that. NO)

Make sure APA format, citations are very key.

Time: 36 hours

PFA., for text book

Industrial Espionage in Cyberspace Question

Solve/Consider this hypothetical situation:

David Doe is a network administrator for the ABC Company. David is  passed over for promotion three times. He is quite vocal in his  dissatisfaction with this situation. In fact, he begins to express  negative opinions about the organization in general. Eventually, David quits and begins his own consulting business. Six months after David’s  departure, it is discovered that a good deal of the ABC Company’s  research has suddenly been duplicated by a competitor. Executives at ABC  suspect that David Doe has done some consulting work for this competitor and may have passed on sensitive data. However, in the  interim since David left, his computer has been formatted and reassigned to another person. ABC has no evidence that David Doe did anything wrong.

What steps might have been taken to detect David’s alleged industrial espionage?

What steps might have been taken to prevent his perpetrating such an offense?

Requirements:

Write your answer using a WORD document with approximately 400 to 500 words

APA format in-text citations & references

No plagiarism 

Security

 

  • If you could, what would you do to help create a national “security culture,” in which everyone is more knowledgeable and proactive about threats to information security?

Pratical connection – Data mining

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and been put into practice within their own career.

Assignment: Provide a reflection of at least 500 words of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have observed these theories and knowledge being applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited. 

Share a personal connection that identifies specific knowledge and theories from this course. 

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should NOT provide an overview of the assignments given in the course. Rather, reflect and write about how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Topic:

1)  Can you please  explain about  Data mining topic 

 2 ) i work in IT industry i work for VMware virtualization  , Networking and Storage technologies and AwS ,Azure cloud technologies   how can you apply  in  Data Mining industry  

Week 6_research paper

 

3) Research paper: Class,  If you have you been involved with a company doing a redesign of business processes, discuss what went right during the redesign and what went wrong from your perspective. Additionally, provide a discussion on what could have been done better to minimize the risk of failure. If you have not yet been involved with a business process redesign, research a company that has recently completed one and discuss what went wrong, what went right, and how the company could have done a better job minimizing the risk of failure.  Your paper should meet the following requirements:  • Be approximately 2-4 pages in length, not including the required cover page and reference page.  • Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

WS&F

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 3 – Prepare a two-page paper (double-spaced) that describes the device or system you will investigate and the intended tool you plan to use to conduct your forensics investigation. The interim paper should be in the form of an Executive Summary. Be sure to provide references in APA format. 

reflection

 

n the last week of class, we are going to complete a reflection activity.

 This discussion topic is to be reflective and will be using your own words and not a compilation of direct citations from other papers or sources. You can use citations in your posts, but this discussion exercise should be about what you have learned through your viewpoint and not a re-hash of any particular article, topic, or the boo on Information Governance.

Items to include in your initial thread: 

  • “Interesting Assignments” – What were some of the more interesting assignments to you? 
  • “Interesting Readings” – What reading or readings did you find the most interesting and why? “Interesting Readings”
  • “Perspective” – How has this course changed your perspective? 
  • “Course Feedback” – What topics or activities would you add to the course, or should we focus on some areas more than others? 

Grading Information 

Splitting and Joining Strings

Create an array of ten strings. Write a program to join and split these strings. Feel free to use any whitespace character. Explain how the program works, when to use Python arrays, and when to use tuples, dictionaries, and sets. Explain how the program works and how it can be utilized to support an organization’s requirements.

Requirements:

  • Maximum four to five pages in length is required.
  • You must include program code and results.
  • You must include an explanation about how the program works.
  • You must show your work for full credit.
  • You must include a minimum of three credible sources. Use the Saudi Electronic Digital Library to find your resources.
  • Your paper must follow Saudi Electronic University academic writing standards and APA style guidelines, as appropriate.

You are strongly encouraged to submit all assignments to the Turnitin Originality Check prior to submitting them to your instructor for grading. If you are unsure how to submit an assignment to the Originality Check tool, review the Turnitin Originality Check Student Guide

Data Base – Assignment

 

Research on the Internet each of the following topics: 

  1. Explore NoSQL database alternatives.
  • Document
  • Key-Value
  • Object
  • Graph 
  1.  Reporting and analytical databases.
  • Big Data
  • Datamart
  • OLAP vs. OLTP 

Select one topic from the four topics listed for your paper: 

  1. Database models for Big Data
  2. Alternatives to the Relational Database Model (describe at least four)
  3. Relational Database Models and data needs that support their use
  4. Database models for multimedia
  5. You may choose your own database-related topic if you get your instructor’s approval 

Your paper should be 3–5 pages, double-spaced, and in 12-point font. Be sure to provide an introduction and conclusion, and use appropriate section headers. Your paper should be free of spelling and grammar errors, well-written in Standard English, include a reference page and in-text citations, and be formatted in APA.