COM303 Week 2 Discussion 5

  

On page 39, the assigned reading offers several opinions about what the function(s) of culture is/are. Choose the function you least agree with and explain your choice and rationale. What are the faults or weaknesses of the function in your opinion?  Do you have experiences in your own life that support viewing that function as less than ideal? Which function do you believe is the most relevant?

security architecture 14 D

 As you meeting with a client, What are the top 3 points/topics that qualify as an assessor to perform a professional information security assessment? explain with examples  

D7.1

 

Chapter 14 – Information Governance for Mobile Devices

Chapter 14 – From the week’s chapter reading, we learn from the authors that, the use of mobile devices in our society today has indeed become ubiquitous.  In addition, CTIA asserted that over 326 million mobile devices were in use within The United States as of December 2012 – an estimated growth of more than 100 percent penetration rate with users carrying more than one device with notable continues growth.  From this research, it’s evident that mobile computing has vastly accelerated in popularity over the last decade due to several factors noted by the authors in our chapter reading.  

Q2: In consideration with this revelation, identify and name these factors, and provide a brief discussion about them?

Case Project 8-2

You are investigating a case involving an employee who is allegedly sending inappropriate photos via e-mail in attachments that have been compressed with a zip utility. As you examine the employee’s hard disk drive, you will find a file named orkty.zip, which you suspect is a graphic file. When you try to open the file in an image viewer, a message is displayed indicating that the file is corrupt. Write a 2-3 page report explaining how to recover the file, orkty.zip, for further investigation.

Assignment Week

You need to bypass security on a phone to gather evidence. Describe the forensic process used to allow bypassing user the PIN or other forms of security as a forensics analyst? Explain the process of SIM security?

2) You have a phone that has been retrieved during an arrest. You need to identify the type of phone. Summarize the process of phone identification. Compare and contrast the steps of triaging a phone in powered on versus powered off status.

Your response to the DQ must be a minimum of 400 words. You must provide references for your response (APA format). You will need to reply to two (2) other fellow student’s posts (See the syllabus). The responses must be made in the week due.

Object Oriented Programming in Microsoft Visual Studio.

Microsoft Visual Studio Program

Try to describe class according to individual task with several fields, properties and almost one method.

1. Describe the class of objects Square with value of side and implement property area. Implement a method to display the parameters of the Object.

2. Describe the class of objects Square with value of side and implement property Perimeter. Implement a method to display the parameters of the Object.

3.Describe the class of objects Equilateral Triangle with possibility to calculate own Area. Implement a method to display the parameters of the Object.

Conflict Managment Dis 2

Your state has a forthcoming referendum (a vote to adopt a enact a new law) concerning no smoking in public places including bars and restaurants. Do you agree with this referendum Yes or No?  You should give specific reasons for why you agree or disagree with the referendum.

Need a 350 word content excluding references on this

ISO

 

Lopes, M., Guarda, T. & Oliveira, P. (2019). How ISO 27001 Can Help Achieve GDPR Compliance. 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-6.  https://ieeexplore.ieee.org/document/8760937?arnumber=8760937 

Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43. 

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

InfoTech Import in Strat Plan 3

 The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies. 

Explain in Detail