Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. Explain your answer (whether you believe all data should or should not be encrypted). 300 words
Analysing and visual data 12/09
Find and read excerpts/articles/blogs from the internet related to “best practices for coding (in R, Python or other programming languages)”. Provide a page essay on this with citations and references.
Cryptocurrency Paper
Prepare a 3-5 page paper on cryptocurrencies and security and dispute resolution and support your findings with research. How have cryptocurrencies taken a dominant role in this area? Explain.
Your paper should be 3-5 pages long (excluding the title and reference pages) and formatted according to APA.
Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3-5 page essay, you must include an APA-style title page and reference page.
Points Possible: 75
TCP/IP protocol
You will type a three to five page paper on the TCP/IP Protocol suite, its history and application. You may use the textbook in addition to researching the internet for additional sources. Please submit your APA-formatted paper in a Word document. Your paper must be double spaced and include a cover page and a reference page for your cited sources. Please note that the reference page and cover page do not count towards your paper’s three to five pages in length.
Practical Connection Emerging Threats
Assignment:
Provide a reflection of at least 550 words (or 2 pages) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.
Requirements:
- Provide a 550 word (or 2 pages double spaced) minimum reflection.
- Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
- Share a personal connection that identifies specific knowledge and theories from this course.
- Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
- You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.
- Any use of outside sources, including your own prior work, will result in a zero on the activity and a report being filed with Academic Affairs regarding plagiarism (even if self-plagiarism).
Discussion 66
Murder Case
Preamble
An organization system administrator was labeled as the key suspect in a homicide case. The accused claimed that he was at work at the time of the murder.
Police Intervention
The police asked his employer to help them verify his alibi. Unpredictably, the same organization, occasionally trained law enforcement personnel to investigate computer crimes and was eager to help in the investigation.
Collaborative Strength:
The organization worked with police to assemble an investigative team, seized the suspect computers in his office and residence, and backup tapes on a file server managed by his employer. All of these evidence were stored in a room to where only members of the team had access.
Harsh Situation
At the initial stages, the operation appeared reasonably well documented, but the reconstruction process was a disaster. The investigators made so many omissions and mistakes that one computer expert when reading the investigator’s logs, suggested that the fundamental mistake was that the investigators locked all of the smart people out of the room. The investigators, in this case, were unaware of the situation and unwilling to admit the slip-up.
As a result of the investigators’ omissions and mistakes, the suspect’s alibi could not work together. Digital evidence to support the suspect’s alibi was identify later but not by the investigators. If the investigators had sought expert assistance to deal with a large amount of digital evidence, they might have quickly confirmed the suspect’s alibi rather than putting him through years of investigation and leaving the murderer to go free.
Lesson Learned
- The case amplifies forensic investigators’ requirements to obtain fundamental knowledge of computers, compatible operating systems, and application software programs.
- Forewarning forensic investigators to seek the assistance of the system administrator during the criminal investigation.
Scenario
- You have been retained as a Deputy Technology officer at the University and charged with the responsibility of developing an Acceptable User Policy for the department of computer science based on this murder case.
- Question 1
- Use the AUP to amplify the advantages and disadvantages of investigators’ quarterly training on most currently used operating systems such as Microsoft Windows, Macintosh, UNIX, Linux, Sun System, and more.
Scenario 2
- The investigators, in this case, were unaware of the situation and unwilling to admit the slip-up. As a result of such omissions and mistakes, the suspect’s alibi could not work together. Digital evidence to support the suspect’s alibi was identify later but not by the investigators. If the investigators had sought expert assistance to deal with a large amount of digital evidence, they might have quickly confirmed the suspect’s alibi rather than putting him through years of investigation and leaving the murderer to go free.
- Question 2 “Investigators allowed the Murderer to go free.”
2:1. Defend the impasse of the investigator’s unwillingness to admit the slip-up?
2:2 Use the Acceptable User Policy to amplify why the murderer was allowed to go free and penalties for violations.
USE The Following attached file, called Technology Acceptable User Plolycy
report paper
i need a report paper 8 pages in length double-spaced, using font size 11 point. The report can be of one of the three forms:
1. a survey;
2. description of your design and implementation of a security approach (original ideas preferred);
3. your practical experience on a particular security topic.
the report should be about security and ethics including a references. be sure to summarize, rephrase instead of directly “copy”
Try to make your report organized; you can divide your articles into several sections such as overview, design and implementation, discussion, related work and conclusion.
CC-16
Write an essay of atleast 500 words on what you would like to learn for future study in Cloud Computing.
Write in essay format, not outline or bulleted.
Use the five paragraph format. Each paragraph must have at least five sentences. You need to refer to 3 sources and include them in the references.
Network Management
Instructions:
Part one:
–Create a network drawing for a mock company that has two sites in different geographic locations (at least 40 miles apart).
–The drawing would be drawn similar to the topology you see each time you open a Packet Tracer lab except that you will be drawing how the components connect together.
–The minimum requirements are as follows:
—Each site must have a router that connects to the other site, to the Internet, or to a shared cloud between the two sites.
—At least one site must have a connection to the Internet.
—At least one site must have a firewall that could possibly be part of the router that connects the company site to an external network or to the Internet.
—At least one switch at each site that creates a LAN of at least two PCs.
—The switch should connect to a router or be a Layer 3 switch for those of you that really get into networking.
—One site must have at least one server.
—Appropriate cabling and connectivity between the two sites.
—Labeling to make the drawing professional.
–In a minimum of two paragraphs, describe the mock company, the networks, and type of connectivity to the other site, as well as the Internet that is in your drawing. Describe the network components that will be monitored and/or managed using an NMS(Network Management System).
Part Two:
-The minimum requirements are as follows:
—An executive summary of the implementation plan
—Professionally formatted comparison table of NMS products you considered including costs and features (you may have a bit of a time getting cost, but try or estimate and ensure you note if it is an estimation)
—Other recommended network management or monitoring applications/techniques recommended
—At least 10 recommended scorecards and/or metrics for monitored circuits and devices
—A list of which network devices will be monitored
—Security recommendations
—IT personnel structure diagram and responsibilities within that structure for the NMS implementation and monitoring
—Labeling to make the drawing professional
Course Assignment (course – Bussiness Continuation Plan & Disaster Recovery Plan )
Administrative and Technical Recovery Plans .
Explore the school library to identify some useful peer-reviewed, scholarly accepted articles for this assignment. Ensure your citations and references adhere to the school recommended APA format.