Review Article

 review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

Address the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. 

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Improving risk management capabilities

Discuss actions required to develope an effective risk management capability.

Forum rules:

  • Post your answer to the forum questions by 11:59pm EST on Saturday
    • Your answer must be substantive, which usually requires 300 words or more
    • Your answer must be well written and well organized
    • Your answer must include one properly formatted APA in-text citation to a scholarly reference. The full reference must be provided at the end of your answer with a link if one is available. 

Post two replies to your classmates by 11:59pm EST on Sunday 

  • Your replies should be meaningful, which means they should engage your classmate in discussion focused on the forum questions. Usually this requires 150 words or more.
  • No forum posts made after 11:59pm EST on Sunday will be graded 

Security Alternatives

According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (2-4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. Be sure to use your own words.

49

9)Read the following articles:

https://thedailychronicle.in/news/2356877/digital-forensics-market-share-forecast-to-witness-considerable-growth-from-2020-to-2025-by-top-leading-vendors-accessdata-cellebrite-msab-opentext-guidance-software/

https://www.openpr.com/news/2149363/digital-forensics-market-to-eyewitness-massive-growth

What do you believe the future of digital forensics holds? 5 years from now?  10 years from now?[2pages]

4) Instructions

Identify what are the different types of hash values. Then tell me, what is the recommended hash value and WHY (and see if you can find case law supporting this!)

Value of this assignment

When you lead an investigation then it is important for you to be comfortable with the different types of hash values as well as knowing what hash value your tool (hardware or software) will provide.

Knowing all this is helpful as part of your courtroom experience and/or if you want to cross-examine the forensic specialist.[1 page]

Intrusion detection and fire safety.

  

with a special focus on intrusion detection and fire safety.

Scenario: The location is a courthouse, a government building with offices, records, and rooms for criminal and civil law proceedings. This courthouse is a very large, two-story building with one main entrance and dozens of small, private entrances. All sorts of people use this building, including professionals, civilians, and a security force. For each of these three groups of people, consider what physical space they are using. 

The first type of physical space includes offices for processing records requests related to criminal and civil proceedings. There are file rooms for physical records as well as computer systems for electronic filing, storage, and processing. There are both public areas for citizens making requests and private areas for the civil servants working with private records.

The second type of physical space includes courtrooms of various sizes and private rooms for meeting and negotiating. These spaces also have public and private areas. 

The third type of physical space includes large public areas used for informal gathering or waiting, a cafeteria with coffee machines, and the public restrooms.

There are public hours of operation, like 8 a.m. to 5 p.m., but professionals might be in the building very early or stay very late, and there are on-sight security personnel always. 

Also in this building is a built-in security force that includes bailiffs and police charged with keeping the building secure. They have already established the building design, access control, surveillance, and lighting.

Part I:

Your assignment is to focus first on alarms and intrusion detection. Using especially chapter 23 from the textbook, choose where to use intrusion detection systems and which systems to use.

· Perimeter Protection—what types of intrusion detection systems would you use on doors and windows? Will you use different types based on the type of physical space? Explain and justify your choices.

· Area Protection—what types of intrusion detection will you use and where? Explain and justify your choices.

· The above alarms might be more for after-hours or for unpopulated areas. What about alarms for populated areas, like panic alarms? Explain and justify your choices.

· How will you use the security staff to monitor and respond to intrusion or duress?

· Besides the security staff, who will be responsible for turning on or off the sensors or using the alarms?

Part II:

Now, focus on fire prevention, detection, and response. Use especially chapter 22 from the textbook.

· Discuss the fire classification most likely for this type of physical space. 

· Where would you put fire alarms? What maintenance is required for fire detection alarms?

· Would you use sprinklers? If so, where and why? Where would you locate fire extinguishers? What kind would you use and why?

· Discuss the maintenance required for any systems used for fire safety, and using the fire safety inspection section as a guide, discuss special areas of concern for fire safety in this type of location.

Python Programming

 

You will complete this assignment in Python 3.x. Make sure you have downloaded the software and it is installed correctly. You will download it from this site.  You should download the Python programming language editor and compiler. To download Python (Download version 3.4 or the latest version–view the video above ). 

 

Create a comment block (starts at line 1 of your code) with the following information:

Jerimiah Ginn

 ENTD200 D005 Fall 2020 

 Dr. Novadean Watson-Williams 

Week # 4

Date completed

2. Problem 1: Create a Python program to solve a simple pay calculation. Calculate the amount of pay, given employee name, hours worked, and hourly rate. (The formula to calculate payroll is pay = hourly rate * hours worked.) Display employee name, hourly rate, hours worked, and pay. (Do not add any rules such as overtime)

Problem 2: Create a Python program to calculate the average miles per gallon obtained on a trip. Input car name, the amount of gas used and the number of miles driven. (The formula to calculate miles per gallon is miles per gallon = number of miles driven / amount of gas used. ) Display car name, gas used, miles driven and MPG. Use your own values to test the. You can hard code the values or you can use the input() function. See announcement  for sample code.

Organ leader and decision making

Datatronics Case Study

Read the Customer Service at Datatronics Case Study on pages 246-250 in the textbook. Answer the Discussion Questions at the end of the Case Study. Your responses must be complete, detailed and in APA format. See the sample assignment for expected format and length.