2 questions – Each question needs 3 answers – with 1 APA reference for each answer – Each answer atleast 200 words

2 QUESTIONS, EACH QUESTION WITH 3 ANSWERS, EACH ANSWER 200 WORDS WITH 1 APA REFERENCE FOR EACH ANSWER

Question 1:

 There have been many books and opinion pieces written about the impact of AI on jobs and ideas for societal responses to address the issues. Two ideas were mentioned in the chapter – UBI and SIS. What are the pros and cons of these ideas? How would these be implemented? 

Question 2:

 Explain how GDSS can increase some benefits of collaboration and decision making in groups and eliminate or reduce some losses 

Research paper and discussion

Part 1: Research paper (4-6 pages)

 please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Part 2: Discussion (500 words) and 2 responses

 expand on investigation and of digital forensic analysis and investigations. Organizations, especially those in the public, health and educational areas are bound by legal and statutory requirements to protect data and private information, therefore digital forensics analysis will be very beneficial when security breaches do occur. Using this weeks readings and your own research, discuss digital forensics and how it could be used in a risk management program.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

Part 3: Practical connection assignment (500 words)

 Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment.

Requirements:

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment.  
  • You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Part 4 : Discussion (500 words) and 2 responses

discuss the characteristics of the three predominate anomaly detection methodologies.: Model-Based vs Model-free, Label vs Score, and Global vs. Local Perspective.  

Discussion

 

There have been many books and opinion pieces writ-ten about the impact of AI on jobs and ideas for societal responses to address the issues. Two ideas were mentioned in the chapter – UBI and SIS. What are the pros and cons of these ideas? How would these be implemented?

Week 5

 

The CIO of your organization has asked you to create a 4- to 6-page risk management and mitigation plan for security vulnerabilities.

Select five vulnerabilities and align associated risks to a risk management framework, such as NIST SP 800-37. Include the following:

  • Consider the potential vulnerabilities or threats facing the organization. 
  • Describe of the risk each vulnerability or threat would have on the organization in terms of its people, network, data, or reputation. 
  • Explain each risk’s impact on the organization. 
  • Provide a defined mitigation for each vulnerability, such as an incident response plan, disaster recovery plan, or business continuity plan. Give a defined reason why a vulnerability or threat would not be mitigated, such as the use of a different risk control strategy, if appropriate.

Programming project in Java or C++

The city council in the town of Durburn has decided to improve road sign placement, especially for the numerous dead ends that are currently unmarked in various parts of the city. They have given you a road map, and you must determine where to put up signs to mark all the dead ends. They want you to use as few signs as possible.

The road map is a collection of locations connected by two-way streets.

The following rule describes how to obtain a complete placement of dead-end signs:

Consider a street S connecting a location x with another location. The x-entrance of S gets a dead-end sign if, after entering S from x, it is not possible to come back to x without making a U-turn. A U-turn is a 180- degree turn immediately reversing the direction.

To save costs, you have decided that you won’t install redundant dead-end signs, as specified by the following rule:

Consider a street S with a dead-end sign at its x-entrance and another street T with a dead-end sign at its y-entrance. If, after entering S from x, it is possible to go to y and enter T without making a U-turn, the dead-end sign at the y-entrance of T is redundant. INPUT

The first line of input contains two integers n and m, where n (1 ≤ n ≤ 5*105) is the number of locations and m (0 ≤ m ≤5 * 105) is the number of streets. Each of the following m lines contains two integers v and w (1 ≤ v < w ≤ n) indicating that there is a two-way street connecting locations v and w. All location pairs in the input are distinct.

OUTPUT

On the first line, output k, the number of dead-end signs installed. On each of the next k lines, output two integers v and w marking that a dead-end sign should be installed at the v-entrance of a street connecting locations v and

w. The lines describing dead-end signs must be sorted in ascending order of v-locations, breaking ties in ascending order of w-locations

Data Center Security

Write about Data Center Security in 700 Words  double spaced paper, written in APA format, showing sources and a bibliography  and also prepare PPT consisting of 10-12 slides about Data Center Security

Omnet++ Assignment

Wired Network Performance Consider a wired network model (OMNET++) using a Gigabit Ethernet (GbE) backbone switch linked to several Ethernet sub-switches (also called subnet) so that large number of wired nodes/clients can be accommodated to the network. For example, one subnet can support up to 20 nodes (for optimum performance). So, if you are simulating a network with 100 nodes in total, your network model should have 5 subnets linked to a GbE backbone. Simulation parameters: 

• Number of nodes/clients: 100 

• Simulation time: 3600 Sec (longer required for Video streaming)

• Traffic type: Video streaming

 • Packet type: UDP packet 

• Performance metrics: 

(a) Video Throughput; (b) Video End-to-end delays; (c) Video packet losses. 

[Hint: Video streaming uses UDP transport layer protocol, and hence UDPVideoStreamCli, UDPVideoStreamSvr can be used for video client and video Server, respectively.] Investigation: Effect of increasing the number of video clients on system performance You may use the following table to record your simulation results. 

Analyse the results (including model validation) and write your report (4-6 pages) by summarising your research findings. 

Hint: You can draw several graphs including number of clients versus video throughput, end-to-end delays, and packet losses.

General Report Format Cover page: Assignment title, student’s name, and ID Introduction: What, why and how? – Begin your report with a clear objective (What!) of your assignment. Explain why this assignment/research is needed and how you have completed it. Outline the structure of the rest of the report. Modelling the network: Describe the model that you have developed using appropriate screenshots for models and subnet (hint: avoid unnecessary screenshots). Results and Analysis: Summarise your simulation results using tables and/or graphs (Excel or Matlab graphs) and provide a comparative analysis. Model Validation: Discuss how you have validated your simulation results. Lesson learned: Write a paragraph or two, reflecting on your own learning. Conclusion: Summarise the main findings and future research directions. References: List at least 5 references that you have used in the report. Report Length: (Part 1: 4-6 pages; Part 2: 10-14 pages) Spacing: 1.5 Font: 11 Times New Roman.