Cyber Security

Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).

Discussion

 A detailed statement discussing  how you obtained this CPT employment(Java Developer) as well as how this CPT employment is directly related to  major area of study(Masters in Information Technology).

OE Discussion#3 – Post + Replies

Here is a questionnaire for you to take on your “Change Readiness”. Provide feedback on how it relates to you and your style.

*** Assume your self as a software engineer/developer and take the questionnaire. Based on the results write the discussion initial post. 

http://www.ecfvp.org/files/uploads/2_-change_readiness_assessment_0426111.pdf

You will be writing three or more discussion posts per week. Your main post must be two to three substantive paragraphs (250+ total words) and include at least one APA-formatted external citation/reference. Please follow up with two subsequent replies to colleagues. Each reply should consist of a relevant paragraph containing 50 words or more.

Your posts should be substantive, demonstrate independent thought relevant to the topic, and encourage continued discussion. Please avoid simply repeating previous posts and agreeing. Provide supporting evidence for your ideas and opinions through the use of personal or work examples, relevant articles or websites, or concepts covered in the week’s readings.

Cybersecurity Planning and Management Creating Company E-mail/WIFI/Internet Use Policies

  

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Assignment

 

1). Download and install the “R” Programming tool (CRAN) onto your computer. First install the “Basic” version of “R”, then (2) install the “R” Studio. (3). Download and install the MySQL plug-in for Excel onto your computer. (4). Download and install the Python programming tool onto your computer. Verify successful installation of all tools by attaching one screen shot of each that display your completion of each software installation. A total of  four screen shots (2 for “R”, 1 for MySQL, and 1 for Python) is expected. Save the screen shots as a MS Word document (*.docx).

Either click the “Write Submission” link below and directly paste your screen shots into this forum OR add the screen shots as a Microsoft Word document attachment (Mac users, please remember to append the “.docx” extension to the filename.). Also, please summarize in 1 -6 lines (in the Comment box) how the installation went for you. That is, what problems, if any, did you have and how were they solved?  What things went right for you during the installation?

Options Menu: Forum

global discussion7

 

Chapter 11 – Andringa (2015), stated that the combination of these phenomena leads to a formal definition – the Bureaucratic Dynamic – this is where the prevalence of coercive formalization scales with what the author refers to as “institutional ignorance” – a measure of how well workers understand the consequences of their own actions both within the organization as well as the wider society…

Q1: The author argue that most people may agree with the notion that “All human activities benefit from some form of formalization, and that formalization allows automating routine tasks, to agree on how to collaborate, determine when and how tasks should be executed, and when they are finished.” The author offers key reason(s) why procedures should not be changed too often.

  • what are those reasons? 
  • provide a brief narrative “why procedures should not be changed too often” to support your response,
  • provide substantive feedback to three of your colleagues’ DF work,
  • DO NOT Copy and Paste Responses Directly from the textbooks and any other digital Internet sources, it’s Verbatim!
  • 1.25 points earned for correctly addressing ALL of the above.

4403WK7B: Chapter Discussion Forum. Options Menu: Forum

Q2: Moore (2000) identifies that Public Value Management as an emerging new management paradigm that is not so much a response to an existing paradigm but a formulation of the role of nonprofits in modern society (Stoker 2006).  In view of both the authors, Moore (2000) and Stoker (2006), public value management is a succinctly formulated public value scorecard in which an organization should target to balance three components:  What are these components?  

  • identify and name the three components? 
  • provide a brief narrative for each to support your response,
  • provide substantive feedback to three of your colleagues’ DF work,
  • DO NOT Copy and Paste Responses Directly from the textbooks and any other digital Internet sources, it’s Verbatim!
  • 1.25 points earned for correctly addressing ALL of the above.

What are the factors that influence the selection of access control software and/or hardware? Discuss all aspects of access control systems.

What are the factors that influence the selection of access control software and/or hardware? Discuss all aspects of access control systems.

initial posting to be between 200-to-300 words. The replies to fellow students and to the professor should range between 100-to-150 words. All initial posts must contain a properly formatted in-text citation and scholarly reference.

BUILDING SIMPLE ALU

Prompt

In this project, you will design and build a simple CPU on Logisim and write programs that can run on it. If you haven’t yet, you can download Logisim by following this link: http://www.cburch.com/logisim/download.html

Your design will go through four phases. In the first phase, you will design and build the ALU using Logisim. In the second phase, you will design the instruction set that implements the instructions you designed in phase one. In the third phase, you will design and implement a control unit for this ALU using Logisim. By connecting the CU to the ALU, you will get a functional CPU. In phase four of the project, you will write assembly language programs for the CPU you built.

Phase One

Start by building an 8-bit ALU using Logisim. This ALU can implement 16 instructions on 8-bit operands. We would suggest the following minimum list of instructions:

· Arithmetic addition

· Increment

· Decrement

· Comparison (with 3 outputs: one for equals, one for less than and one for greater than)

· Logic bitwise Not

· Logic bitwise And

· Logic bitwise Or

· Register right logic shift

· Register left logic shift

In addition to these nine instructions, please suggest five more instructions that the ALU can implement for a total of 14 instructions (we are reserving 2 instructions for branching). Justify the importance of the five instructions you added in a Word doc to submitted as part of this assignment. Label these instructions as ‘Phase One.’

After you’ve suggested and justified your five suggested instructions, please build at least the nine above-mentioned operations as blocks in Logisim.

Phase Two

In phase two of the project, you are required to design the instruction set of the ALU/CPU as follows:

· Create the opcode table for the ALU by giving a binary code and a name for each instruction you built in Logisim in phase one.

· Decide how many operands you want your instructions to handle and justify your choice. We suggest either one operand with accumulator or two operands with the result stored in one of the input registers.

· In Logisim, add a multiplexer to the circuit you built in phase one that chooses one of the available operations. The simplest way to create this part of the CPU is to connect the outputs of the multiplexer to the inputs of AND arrays connected to the output of the operation blocks.

Please record your answer to phase two in the same Word doc and label it ‘Phase Two.’

Phase Three

In phase three, you are required to use Logisim to implement the control unit for at least the following three operations:

· addition

· logic bitwise AND

· right logic shift

In order to finish this phase, you need to add operand registers according to the decision you took for the number of operands in phase two and, if needed, a flag register.

Please record your answer to phase three in the same Word doc and label it ‘Phase Three.’

Phase Four

In order to be able to write assembly language for the CPU we need to add to instructions (without implementation):

· branch to an address (name it JMP)

· conditional branch to an address (name it CJMP and suppose that the jump takes place if the comparison operation result is ‘equals’)

Now, write the following programs using the assembly language you designed in the previous phases of the project as well as these two branching additional instructions:

· Write a program that adds two operands.

· Write a program that adds operands until the new value to be added is 0. You do not need to implement the input operations to modify the contents of the registers. Just assume that by the end of each iteration, the register content is modified.

· Write a program that increments by 2 the content of a register 10 times.

· Write a program that shifts the content of a register until the least significant bit is 0. Think of a way to stop shifting if the content of the register is 11111111 and add it to your program.

· Please record your programs in the same Word doc and label them under the section ‘Phase Four.’