Router Security
Transport Layer Security
Closing research component
will send the link
Router Security
Transport Layer Security
Closing research component
will send the link
Hello,
i need this paper by 08/12 afternoon.
Strictly No plagiarism please use your own words.
https://www.youtube.com/watch?v=TkCSr30UojM
Review the material on routers.
It is sometimes said that information extracted from a router or switch does not necessarily provide specific evidence of a particular crime. What is meant by that? If true, what then is the most useful information collected from these devices in an investigation?
Write and post your answer in 300 words.
Strictly No plagiarism
make a PowerPoint presentation with speaker notes.
with designs, figures, and all if necessary.
Question 1
What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?
Question 2
List and briefly describe the nine-step process in conducting a neural network project.
-each question with at least 500 words and 2 references in apa format.
Your client is interested in how you will structure the website. Before you begin to write the HTML for your pages, it’s a good practice to create a storyboard that outlines your ideas for colors, font sizes, placement of images, hyperlinks, and sections on each page. Your storyboard and file structure should outline your homepage, inside pages, navigational scheme, and where you plan to add your form. This is a high-level design that you will be adjusting and changing throughout the quarter. You do not need to write this in HTML! In fact, it will save you time if you develop your storyboard in Word, PowerPoint, or Visio first, so you can make adjustments based on feedback.
Here are some online resources to help you think through the process:
Based on your storyboard, you will begin to create your file structure for your site. It is never a good practice to keep all your files in the same folder.
For example, if you are developing a site that sells clothing for men, women, and children, you might have one folder for all the pages that house men’s clothing, another for women’s clothing, and so on.
You can create this portion in Word, indicating where each of your HTML pages will be located, as shown in Section 2.4: Links in Your Text.
Create a professional look logo animation using Blender.
The topic of the logo animation should be something about Computer Science.
Submission instructions:
Include all files in Final Project as a ZIP file and then submit through the link under the Submissions tab. The files should include:
If you work in a team, only 1 submission is needed. You must include both members’ name initials in the animation.
Note: By default, Blender does not save images as part of the .blend file (this applies to background images or textures used as part of the scene).
To make those images part of the file they have to be packed.
You can pack all external files into the .blend file by going to File -> External Data -> Pack all into .blend.
After doing this you have to re-save the file.
For this assignment, you will identify any dataset in the course (see: ~content –> ~datasets) and prepare a PowerPoint presentation with data visualizations and graphics from RStudio. Using (6-8 slides) in PowerPoint describe a potential problem related to your chosen dataset. The target audience is a manager who you are trying to convince to initiate a project to investigate the potential issues.
Suggestions:
Reply Post
Reply to 2 – 3 posts on your classmates’ posting, providing your thoughts on the issues presented.
Provide your response on whether you (as a manager) would approve/disapprove of the project based on the results of the presentation.
The number of computer based forensic tools have been on the rise over the last 10 years. It is extremely difficult to select the right tool for the job. Cost is an additional factor as many of these tools are expensive and can break a budget. Research four computer forensic based tools. List each tool and the type of data that it searches for, its features, and costs. Which would you recommend? If you could only select one of these tools, which one would it be? Why? (50-70 words)
Compare and contrast the differences between the concepts of cyber security, information assurance, and risk management. Where in the security industry would each concept apply? What are the pros and cons of each? If your school or organization were to adopt one concept, which would it be? Why? (50-70 words)
Please answer the questions in paragraphs containing at least five sentences. Include the question and number your answers accordingly.
1. Describe Digital Literacy (how to know what is real on the web).
2. None of these people exist. What does this mean to you?
3. Why is Wikipedia more reliable than a paper encyclopedia?
4. How useful are crowd sources answers?
5. What are some drawbacks to crowd sourced answers?
6. Do people generally utilize the diversity of sources on the Internet effectively?
7. How reliant are we and how reliant should we be on getting our news from social media?
8. How do humans remain vigilant when we turn over authority to computers? Have you tried to navigate without gps?
9. If models are simplifications or reality, why do we rely on them?
10. Why was this model, used by Amazon for hiring, wrong?
11. Why did Skynet declare war on the human race?
Show the results (using screenshots) of executing each SQL statement against the database you created. Do not highlight your SQL statement in MySQL Workbench before taking the screenshot (this makes it difficult to read the output). For the VIEWs create in exercise-3, also show the results of executing a SELECT * … statement against the VIEW. All screenshots and text must be submitted as a single Word document.