In term Paper

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

Week 3 – Prepare a two-page paper (double-spaced) that describes the device or system you will investigate and the intended tool you plan to use to conduct your forensics investigation. The interim paper should be in the form of an Executive Summary. Be sure to provide references in APA format.

Data science and Big data discussion 13

This week we explored the concept of Tokenization.  Three important protocols discussed were Secure Multi-Party Computation (SMPC), Policy-Backed Token (PBT) and Open Asset Protocol (OAP).  Compare and contrast these three protocols and explain which industries can benefit the most from each of these protocols.

  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

Wk 4 – Intrusion Detection

 

Non-Profit

  1. After reviewing your latest submission, the CIO has found some areas of concern and would like you to provide a little clarity on one subject. He is meeting with upper management to persuade them to purchase a new suite of intrusion detection software for the network. Currently, the organization has antivirus software and uses firewalls. Provide justification for adding intrusion detection software (IDS), as well.  

    Research various IDS that would benefit the company.

    Create a 2-page table for the CIO to share with upper management. Include the following:

    • Reasons why IDS would benefit the company and the larger cyber domain
    • Descriptions of the categories and models of intrusion detection and prevention systems
    • A description of the function of antivirus software, firewalls, and IDS
    • Examples of commercial software that could provide the solution
    • Include citations as necessary in APA format.

Crypto Discussion

Write 500 words that respond to the following questions:  

  • Explain you vision of using the Diffie-Hellman key exchange as a simple public-key algorithm in securing online communication in real live.
  • How can we make the Diffie-Hellman algorithm effective with respect to the difficulty of computing discrete logarithms?

  • Be in APA format including your references.
  • Be 500 words long (not including title and references).
  • Do not re-state the questions.
  • Include two sources (i.e. two references).

DQ

After reading chapter 13, analyze the advantages and disadvantages of digital signatures.

create website

  

PART I and PART II (Listed in word.doc)

Introduction to creating your own web site using modern tools:

This does not require programming. You need about the same technical ability as creating a PowerPoint. You can use any website building tool you wish. Two examples of free website building tools that other students have successfully used include https://www.wix.com and https://www.weebly.com 

Ok, so exactly what do I need to do in week one? Here is a step-by-step guide:

1. Select one of these or any free website building tools.

2. Create a new login.

3. Create a new website and your own url web site address.

4. Add a few words for a title and select a background / template. You will begin developing wonderful, rich content starting next week.

5. Publish and test your url. It is wise to try it out in a separate browser than you created it to verify it works.

6. Copy and paste your URL into BB under the Week One project assignment

7. Congratulate yourself and celebrate! (especially if this is your first site)

Paper

The primary goal of operational security is to protect & secure the operations of an enterprise, while securing the technologies needed to maintain network and resource availability.  Your residency project will include research & analysis on the below: 

Write a ten to fifteen (10 – 15) page paper in which you:

  1. Compare & Contrast access control in relations to risk, threat and vulnerability.
  2. Research and discuss how different auditing and monitoring techniques are used to identify & protect the system against network attacks. 
  3. Explain the relationship between access control and its impact on CIA (maintaining network confidentiality, integrity and availability).
  4. Describe access control and its level of importance within operations security.
  5. Argue the need for organizations to implement access controls in relations to maintaining confidentiality, integrity and availability (e.g., Is it a risky practice to store customer information for repeat visits?)
  6. Describe the necessary components within an organization’s access control metric.

Your assignment must follow these formatting requirements:

  • Use at least ten – twelve (10 – 12 ) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are NOT included in the required assignment page length.

Writing

Heinrich Koch is a second-year college student. Last semester his best friend had his laptop stolen. The laptop was an old computer that he planned to replace soon, but the greatest loss was his data: he had not performed a backup and all his data was lost. Heinrich himself does not perform data back-ups but knows that he needs to do that on a regular basis. He has decided to use an online backup service that will auto-matically back up his data whenever it changes. Evaluate and compare reviews of online backup services. Consider iDrive, Carbonite, Acronis True Image, BackBlaze, and others you might find in your research. Recommend a service that you consider the best solution for Heinrich. Discuss your reviews and mention speed, security, and features in your recommendation.

Requirements:

  • APA format, 3-4 pages in length (excluding cover page, abstract, and reference list)
  • Minimum of 2-3 peer reviewed resources
  • The paper must be 3-4 pages long. double space, and must have an introduction with a clear thesis statement, a body discussing the three main points and a conclusion
  • Conduct research to find relevant information using reliable sources to support your views; Use at least 2-3 peer review resources
  • Use APA Style for in-text citations, and references