information control

Answer each these questions in a paragraph with at least five sentences: Include the question and number your responses accordingly. Provide a citation for each answer.

1. What kind of speech was the First Amendment written to protect?

2. Does the First Amendment apply only to spoken words?

3. What does it mean that laws regulating speech must be content neutral?

4. Why are common carriers prohibited from controlling the content of the material they carry? 

5. How does the Supreme Court determine whether material is obscene?

6. Why have attempts to censor the Internet failed in the US?

7. Why not just ban spam? 

8. Why did Facebook ban Alex Jones and Louis Farrakan?

9. Should websites that show how to 3d print guns be banned? 

10. According to the Supreme Court ‘anonymity is a shield from the tyranny of the majority’. What does that mean? 

assignment

 

Scenario

Your new manager comes to you and asks you that he keeps hearing about read/write blockers for forensic imaging. He’s not sure what that is. He also is confused because he’s heard that there’s two different types (software and hardware). Also, there’s commercial and open source tools. He knows you just took a course in digital forensics so he asks you to prepare a memo for him explaining all that.

Your assignment

  1. Research on what is a forensic read/write blocker and what is the difference between a hardware and a software version?
  2. Research on what tools are available e.g. commercial (you buy) or open-source (free) and what types are available.
  3. Identify some situations where it makes sense to use the hardware versions or when it makes sense to use software versions?
  4. Put it all together and summarize it for your manager! No more than 2 pages please.

What this teaches you

Being familiar with what tools the investigator used will help you. You gain credibility by asking what hardware or software tools they used, how they deployed it and why they went with a hardware or software version. 

Project related cyber attack

 Topics might include processes related to secure web technologies or a review of a specific web related cyber attack.

Short paragraph about topic.

Project Abstract – 1page abstract

Powerpoint – 15slides

ERM – Discussion 3

After reading this week’s article, and any other relevant research you locate, please discuss the following in your main post:.

  • Which case study in the paper was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Please provide more intext citations
  • Full references with indent hanging format
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

trade association : Journal Article 3

 Trade Association:

Using 300-350 words, write a brief discussion, in your own words of how the article relates to the selected chapter Key Term. A discussion is not rehashing what was already stated in the article, but the opportunity for you to add value by sharing your experiences, thoughts, and opinions. This is the most important part of the assignment.

APA format with references and citation

(2) C++

 Trace the C++ program below showing all output in the order that it is displayed. If anything happens that makes it impossible to accomplish an operation or the results of so doingare unpredictable, describe what happens and abort the program at that point. Assume the Stack class is fully defined in an appropriate header and implementation file. The effect of the functions (methods) is as follows: constructor – creates an empty stack empty – returns true if the stack is empty, false otherwise push – adds the specified element to the top of the stack display – displays every stack element on the specified stream, top to bottom order pop – removes the top element of a stack; attempting to pop an element from an empty stack causes an error condition and immediately terminates the program. top – returns the top element of the stack but does not remove it boolalpha – a flag that causes the words true or false to be displayed for a bool variable 

 #include

using namespace std;

#include “Stack.h”

int main(void)

{int jimmy_carter, bill_clinton;

 jimmy_carter=0;

 Stack george_w_bush;

 for (bill_clinton=17; bill_clinton>13; bill_clinton–)

 {george_w_bush.push(bill_clinton%3*2-2);

 jimmy_carter=jimmy_carter+george_w_bush.top();

 george_w_bush.push(george_w_bush.top()+2);

 jimmy_carter=jimmy_carter+george_w_bush.top();

 cout<<"Contents of george_w_bush "<

 george_w_bush.display(cout);

 cout<<"jimmy carter is "<

 }

while (!(george_w_bush.empty()))

 {cout<<"popping "<

 jimmy_carter=jimmy_carter-george_w_bush.top();

 george_w_bush.pop();

 cout<<"popping "<

 george_w_bush.pop();

 cout<<"Contents of george_w_bush: "<

 george_w_bush.display(cout);

 cout<<"jimmy_carter is now "<

 }

cout<<"at end jimmy_carter is "<

cout<

“<

 return 0;

}

4s week 12 assignment IA

In 300 words

Pick one of the many information security standards organizations and describe what they do and what type of standards they are responsible for. 

 

Include references.

No copy-paste, use your own words.