49

9)Read the following articles:

https://thedailychronicle.in/news/2356877/digital-forensics-market-share-forecast-to-witness-considerable-growth-from-2020-to-2025-by-top-leading-vendors-accessdata-cellebrite-msab-opentext-guidance-software/

https://www.openpr.com/news/2149363/digital-forensics-market-to-eyewitness-massive-growth

What do you believe the future of digital forensics holds? 5 years from now?  10 years from now?[2pages]

4) Instructions

Identify what are the different types of hash values. Then tell me, what is the recommended hash value and WHY (and see if you can find case law supporting this!)

Value of this assignment

When you lead an investigation then it is important for you to be comfortable with the different types of hash values as well as knowing what hash value your tool (hardware or software) will provide.

Knowing all this is helpful as part of your courtroom experience and/or if you want to cross-examine the forensic specialist.[1 page]

Intrusion detection and fire safety.

  

with a special focus on intrusion detection and fire safety.

Scenario: The location is a courthouse, a government building with offices, records, and rooms for criminal and civil law proceedings. This courthouse is a very large, two-story building with one main entrance and dozens of small, private entrances. All sorts of people use this building, including professionals, civilians, and a security force. For each of these three groups of people, consider what physical space they are using. 

The first type of physical space includes offices for processing records requests related to criminal and civil proceedings. There are file rooms for physical records as well as computer systems for electronic filing, storage, and processing. There are both public areas for citizens making requests and private areas for the civil servants working with private records.

The second type of physical space includes courtrooms of various sizes and private rooms for meeting and negotiating. These spaces also have public and private areas. 

The third type of physical space includes large public areas used for informal gathering or waiting, a cafeteria with coffee machines, and the public restrooms.

There are public hours of operation, like 8 a.m. to 5 p.m., but professionals might be in the building very early or stay very late, and there are on-sight security personnel always. 

Also in this building is a built-in security force that includes bailiffs and police charged with keeping the building secure. They have already established the building design, access control, surveillance, and lighting.

Part I:

Your assignment is to focus first on alarms and intrusion detection. Using especially chapter 23 from the textbook, choose where to use intrusion detection systems and which systems to use.

· Perimeter Protection—what types of intrusion detection systems would you use on doors and windows? Will you use different types based on the type of physical space? Explain and justify your choices.

· Area Protection—what types of intrusion detection will you use and where? Explain and justify your choices.

· The above alarms might be more for after-hours or for unpopulated areas. What about alarms for populated areas, like panic alarms? Explain and justify your choices.

· How will you use the security staff to monitor and respond to intrusion or duress?

· Besides the security staff, who will be responsible for turning on or off the sensors or using the alarms?

Part II:

Now, focus on fire prevention, detection, and response. Use especially chapter 22 from the textbook.

· Discuss the fire classification most likely for this type of physical space. 

· Where would you put fire alarms? What maintenance is required for fire detection alarms?

· Would you use sprinklers? If so, where and why? Where would you locate fire extinguishers? What kind would you use and why?

· Discuss the maintenance required for any systems used for fire safety, and using the fire safety inspection section as a guide, discuss special areas of concern for fire safety in this type of location.

Python Programming

 

You will complete this assignment in Python 3.x. Make sure you have downloaded the software and it is installed correctly. You will download it from this site.  You should download the Python programming language editor and compiler. To download Python (Download version 3.4 or the latest version–view the video above ). 

 

Create a comment block (starts at line 1 of your code) with the following information:

Jerimiah Ginn

 ENTD200 D005 Fall 2020 

 Dr. Novadean Watson-Williams 

Week # 4

Date completed

2. Problem 1: Create a Python program to solve a simple pay calculation. Calculate the amount of pay, given employee name, hours worked, and hourly rate. (The formula to calculate payroll is pay = hourly rate * hours worked.) Display employee name, hourly rate, hours worked, and pay. (Do not add any rules such as overtime)

Problem 2: Create a Python program to calculate the average miles per gallon obtained on a trip. Input car name, the amount of gas used and the number of miles driven. (The formula to calculate miles per gallon is miles per gallon = number of miles driven / amount of gas used. ) Display car name, gas used, miles driven and MPG. Use your own values to test the. You can hard code the values or you can use the input() function. See announcement  for sample code.

Organ leader and decision making

Datatronics Case Study

Read the Customer Service at Datatronics Case Study on pages 246-250 in the textbook. Answer the Discussion Questions at the end of the Case Study. Your responses must be complete, detailed and in APA format. See the sample assignment for expected format and length.

4s week 7 assignment EH

In 300 words

Research the variety of enumeration tools available. Select one tool and explain what it does, how it works, and what type of information it extracts (example:  Softerra LDAP Browser is the industry-leading software for browsing and analyzing LDAP directories. It provides a wide variety of features for handy viewing of directory contents, getting information about directory infrastructure and objects.) 

Include references, no copy-paste strictly. use your own words. 

Operational Excellence

 

Article Find and Summary 1

Using the University online library (EBSCOhost, Proquest, etc.), research and locate an article relating to the integration of IT in business strategy. After reading the article, provide a brief summary of what you have learned. DO NOT quote the article–only describe what you learned from reading it. Your summary should be at least 150+ words. Provide a citation at the end of your summary and the full reference using APA 7 format. Write your paper using the APA 7 template. 

Discussion

Chapter 1 of your textbook explains that data visualizations have very few universal rules.  However, three key principles are discussed.  Please explain each of the three principles in your own words.  Then select one of the principles and provide some practical suggestions for complying with your selected principle.  

Respond to at least two classmate posts

Detection in Physical Security

  

10-12 pages research paper with PPT (not including title, TOC, references, and any appendices)

Double spaced APA style

At least 10 references

At least 5 of your references must be scholarly peer-reviewed articles