Assignment Week

You need to bypass security on a phone to gather evidence. Describe the forensic process used to allow bypassing user the PIN or other forms of security as a forensics analyst? Explain the process of SIM security?

2) You have a phone that has been retrieved during an arrest. You need to identify the type of phone. Summarize the process of phone identification. Compare and contrast the steps of triaging a phone in powered on versus powered off status.

Your response to the DQ must be a minimum of 400 words. You must provide references for your response (APA format). You will need to reply to two (2) other fellow student’s posts (See the syllabus). The responses must be made in the week due.

Object Oriented Programming in Microsoft Visual Studio.

Microsoft Visual Studio Program

Try to describe class according to individual task with several fields, properties and almost one method.

1. Describe the class of objects Square with value of side and implement property area. Implement a method to display the parameters of the Object.

2. Describe the class of objects Square with value of side and implement property Perimeter. Implement a method to display the parameters of the Object.

3.Describe the class of objects Equilateral Triangle with possibility to calculate own Area. Implement a method to display the parameters of the Object.

Conflict Managment Dis 2

Your state has a forthcoming referendum (a vote to adopt a enact a new law) concerning no smoking in public places including bars and restaurants. Do you agree with this referendum Yes or No?  You should give specific reasons for why you agree or disagree with the referendum.

Need a 350 word content excluding references on this

ISO

 

Lopes, M., Guarda, T. & Oliveira, P. (2019). How ISO 27001 Can Help Achieve GDPR Compliance. 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-6.  https://ieeexplore.ieee.org/document/8760937?arnumber=8760937 

Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43. 

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source  that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

InfoTech Import in Strat Plan 3

 The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin, Ether, and other currencies. In this discussion, please describe at least two cryptocurrencies with applicable examples. Discuss some similarities and differences. Lastly, discuss if you have any experience using any cryptocurrencies. 

Explain in Detail

discussion1_dsbda

 the concept of 3-F Method is introduced.  Discuss the purpose of this concept and how it is calculated.  Also perform your own research/analysis using these factors and provide your assessment on whether the United States need to introduce top talents in the field of big data and cloud computing by using bibliometrics. 

Project paper , Due date 26th September

 Provide an outline for your Chapter 2.  Also write the Introduction to the Topic of your dissertation centered on the Problem for your research. 

Based on below topics

Dissertation  Topic

1.)  Information Systems

2.)  Database

 Note: Minimum 600 words not including title and reference page. References should be taken from peer revived   

Research paper and discussion

Part 1 : Research paper 

write a research paper discussing the concept of risk modeling. Please also evaluate the importance of risk models. Lastly, construct an approach to modeling various risks and evaluate how an organization may make decisions about techniques to model, measure, and aggregate risks.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Part 2 : discussion ( 500 words including 2 responses ) 

 The readings this week discusses broad context of risk and investigative forensics. Part of risk management is to understand when things go wrong, we need to be able to investigate and report our findings to management. Using this research, or other research you have uncovered discuss in detail how risk and investigate techniques could work to help the organization. ERM helps to protect an organization before an attack, where as forensics investigate technique will help us after an attack – so lets discus both this week.

Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

Part 3 – discussion ( 500 words including 2 responses )

 discuss the appropriate application of Graph-Based Clustering Sparsification Techniques.  

Design and Applications of Solaris Operating System

Prepare a 3 page report and a short powerpoint presentation on the topic mentioned above. More details given below.

Imagine that a company wants to know all the important things about the design/structure/architecture (* important – not just user interface features) and the applications in  solaris operating system, and that company has assigned you the task of writing a report and presenting your findings to the managers and technical staff of that company.  Concentrate on the “big picture” first, that is, the most important things about whatever system(s) or approach you are studying. Don’t let your audience/readers get bogged down  in unimportant details. Only if fine details serve to help to understand the big picture, would you use those fine details as examples to illustrate how the important things work.  

How the topic study will be evaluated:  

The topic study will be evaluated according to:  

(a) The quality, clarity, and completeness of the report and presentation.   

(b) Whether the most interesting and most important facts about the topic were emphasized and clearly presented in the report and presentation.

The format for the references in the topic study, should be similar to the format of the references in the paper i have attached.