Discussion 4 CISS 301

Class Discussion Topics
  1. Discuss the pros and cons of the various process management algorithms presented in this chapter. Given a choice, which algorithm would you prefer to implement and why?
  2. Discuss the different criteria for designing a process scheduling policy. Do you think that it is possible to optimize the design of a process scheduling policy to suit any system? If so, how? If not, why? Provide some examples to support your ideas.
Additional Resources
  1. History of operating systems:  http://www.osdata.com/kind/history.htm
  2. Dual-Core vs. Quad-Core CPUs: http://www.pcmag.com/article2/0,2817,2406293,00.asp
  3. Intel® Core™2 Quad Processors: http://ark.intel.com/products/29765/Intel-Core2-Quad-Processor-Q6600-8M-Cache-2_40-GHz-1066-MHz-FSB
  4. Multi-core Enterprise Technology at Dell®: http://www1.euro.dell.com/content/topics/topic.aspx/emea/topics/products/pedge/en/multi_core?c=uk&cs=ukbsdt1&l=en&s=bsd

Digital Forensics

 

Mr. Fahad Naseem, and Mr. Ronald Joseph FBI Agent.

 Mr. Fahad Naseem was arrested in connection with the kidnapping and killing of journalist Daniel Pearl and admitted sending ransom e-mails using his Laptop. The laptop and handwritten versions of the e-mails were found in his possession. 

  • On the Contrary-A, Naseem later retracted his confession and the defense attorney asserted that logs from Mr. Naseem’s Internet Service Provider (ISP) indicated that Mr. Naseem’s account was not active and connected to the Internet at the time the e-mails were sent. 
  • On the Contrary-B

Naseem’s defense attorney claimed that the compromised Laptop produced in court had a different serial number from the one that was initially recorded in police records; hence, documentation relating to the computer and evidence in the case was inconsistent. 

  • On the Contrary-C

Documentation presented in court indicated that the Federal Bureau of Investigation (FBI) agent, Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002. In contrast, documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002, and the court denied the appeal, including the following explanation.

  • On the Contrary-D

The lead investigator Mr. Shaikh Naeem recovered the Laptop labeled (connection No. 66) retrieved from the accused, Mr. Fahad Naseem, on November 2, 2002, was provided to Mr. Ronald Joseph, FBI agent, who examined, conducted the forensic investigation, formulated his report, and conveyed evidence to the Consulate General of the United States of America. 

  • The report’s content asserted that the Black Soft Computer came with “Proworld” written on the exterior of the Laptop, and upon opening the case, a Dell Latitude Cpi laptop was discovered. 
  • The Laptop was identified in the report produced by this witness to be of model PPL with Serial number ZH942 located inside the Laptop as an IBM travel star hard driver [sic], confirmed to have been removed from the Laptop.
  • During examination, the label on the hard drive was identified as a system with 4.3 GB storage capacity, and serial number OKLA24302 on the outside of the laptop.  
  • After examining Exhibits, Mushernama who recovered the Laptop asserted that without a doubt whatever, the compromised Laptop is the same equipment that was seized from the accused, Mr. Fahad Naseem on November 2, 2002. 
  • On the Contrary-E

The forensic investigation report confirmed that the same Laptop was recovered on April 2, 2002 by the defense team. Availability of the Laptop at the American Consulate on April 2, 2002 is not unnatural and impossible because Marianne Pearl filed a complaint with the police on April 2, 2002, hours when the case was in the at the hands of the Investigating Agency.

Questions 1. As an Aspirant and Hopeful Digital Forensic Investigator:

1:1. Submit concluding evidence to the public and the court substantiating that Mr. Fahad Naseem is guilty of kidnapping and killing Mr. Daniel Pearl, the journalist.

1:2. Submit concluding evidence to the public and the court demonstrating that Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002, whereas documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002.

1:3. Submit concluding evidence to the public and the court attesting that Mr. Naseem’s Laptop’s availability at the American Consulate on April 2, 2002, is unnatural and unrealistic occurrences. 

PCI Compliance

 

Assignment Content

  1. Your father has a private retail pharmacy in a small rural town. He accepts credit cards and holds customer information on a small database server. He wants to know if he should be concerned about PCI compliance, as well as HIPAA, and has asked you for a summary so he can decide if he wants to hire an outside consultant to help him comply with government regulations.

    Write a 3- to 4-page summary in Microsoft® Word of the important aspect of PCI and HIPAA regulations to help him make his decision. In your summary:

    • Accurately describe what PCI is and why it is important to a small business.
    • Explain why a small business needs to comply with PCI. Provide at least two reasons.
    • Outline the ramifications of noncompliance to a small business. Provide two examples.
    • Concisely describe who is covered under HIPAA.
    • List the information protected under HIPAA.
    • List the administrative requirements under HIPAA.
    • Cite all sources using APA guidelines. 

       

Wk 4 – Apply: Mobile Security

Assignment Content

  1. Mobile devices are always in the workplace and being used for both personal and company business. You have been asked to create an informative poster to display throughout the office that highlights ways to secure mobile devices and safety precautions. This poster will be seen by the entire company in hopes of empowering employees to protect themselves and the company from mobile breaches.

    Create a visual infographic to display in the company’s break room.

    Include the following information:

    • At least two mobile device threats
    • List of ideal mobile security settings to defend against threats
    • Brief instructions for setting up at least two security settings
    • An explanation on what happens mobile devices are not secured from these threats
    • Appropriate images and graphics
    • Two resources for more information on mobile security, with appropriate citations

Research paper on emerging technologies

Please write a research paper of 3000 – 3500 words on Describe and contrast the operational challenges faced by the following startups: (a) consumer Web services startup, (b) iPhone application company, and (c) electronic device company.provide at least five appropriate, properly cited sources. project (paper) must be formatted according to APA guidelines as a Word document, double spaced, Times New Roman, 12-font, with one inch margins. do not do plagiarism. this is a research paper for the course emerging technologies.

Presentation

Create a PP 12 slides with below topics related to telecommunications and networking with applications for every parameters mentioned below. APA formatted.

overview of OSI model

Client-Server Network

TCP/UDP

Methods of Communication

Analog & Digital Transmission

Media Access Control

LAN/WLAN Components

Ethernet/Wireless Ethernet

Dedicated-Circuit Networks

VPN Networks

Network Security

references

assignment

  

· Pick two (2) charts of different chart type (Categorical, Hierarchical, Relational, Temporal and Spatial) [Do not choose bar, pie and line charts)

· For each use a tool that can be used to create the selected chart. Use a different tool to create each chart.

· For each chart, write how to read the chart and what to look for.

Delivery: A word file with the following information:

1. 2 Charts

2. 2 Screenshots of the charts in development with the tools selected.

3. Paragraphs detailing how to read each chart and what to look for.

DOS Attack

Defending Against DDoS.

  

· Find a DoS attack that has occurred in the last six months.

· You might find some resources at www.f-secure.com.

· Note how that attack was conducted.

· Write a brief explanation of how you might have defended against that specific attack. 

Requirements:

Approximately 400 words with in-text citations and APA format including page numbers. No plagiarism.