Semi-literate children in a remote village were given access to a computer and taught themselves molecular biology. Discuss in 500 words what this says about governments responsibility to break the digital divide. Include at least one quote enclosed in quotation marks and cited in-line.
week 4 discussion
Virtual Machine Forensics”
- Go to the Forensic Focus website to read the article titled “Virtual Forensics: A Discussion of Virtual Machines Related to Forensics Analysis,” dated 2008, located at http://www.forensicfocus.com/downloads/virtual-machines-forensics-analysis.pdf.
- Determine what you perceive to be the greatest challenge when dealing with virtual machines from a system forensics perspective. Provide a rationale for your response.
- Describe how virtual machines can be used in a forensics investigation. Using the Internet, provide a link to a set of tools that is considered a forensic imager that could be launched using virtualization.
A self-protecting control application base on microserevice
3000 words
only part 1 and part 2
Internet of Things (IoT)
Internet of Things (IoT)
response required project
Please readh the below project proposal post and provide two responses in 75 to 100 words
Post#1
Cloud computing is the service availability of the computer system, especially cloud storage, without direct active management by the user. The term is generally used to describe data centers available to users over the Internet. Cloud computing offers a variety of benefits but it has some Vulnerabilities also. There are some Possible Vulnerabilities are mentioned like: Data Breaches, Targeted Attack, Simple Human Errors, Application Vulnerabilities, Poor Security Policies, Natural Disasters, Simple Human Errors, Hard Drive Failures, Power Failures, Malware Infection, Weak Network Architecture, Insecure Network Protocol, Vulnerable Application, Vulnerable Systems and APIs, Weak API Credentials, Key Management, Operating System Bugs, Hypervisor Bugs, Unlatched Software. “Many cloud computing providers such as Google, Microsoft, Yahoo, IBM and Amazon are moving towards adoption of cloud technology leading to a considerable escalation in the usage of various cloud services” (Birje, 2017).
Data breaches are a major issue in cloud computing. Because some attackers and unauthorized web sides try to steals data without user permission. It is only because of poor services. It allows us to enter an unauthorized network in the source network and steals private data. Hackers are easily found the data in private services also. Cloud computing runs software, the software has vulnerabilities and tries to exploit those vulnerabilities. In cloud computing, Consumers have reduced visibility and control. When transitioning assets/operations to the cloud, organizations lose some visibility and control over the operations. When users are using external cloud services, then it becomes the responsibility of some of the policies.
The main issue in cloud computing is lost Stored Data. Data stored in the cloud can be lost for reasons other than malicious software attacks. Accidental deletion of data by the cloud service provider or a physical disaster, such as a fire or earthquake, can lead to the permanent loss of customer data. The burden of avoiding data loss does not fall on the provider’s shoulders. The employee of the organization encrypts its data before uploading it to the cloud but loses the encryption key, the data will be lost.
Increase Cyber security Risk is due to a lack of understanding. Organizations transfer the data into the cloud often without understanding the full scope of doing so, the security measures used by the cloud computing services, and responsible to provide security measures. Employees or user decides to use cloud services without fully understanding how those services must be secured. “Virtualization technologies allow multiple tenants to share physical resources with a degree of security and isolation that cannot be guaranteed by mere containerization” (Pietro & Lombardi, 2018).
Many organizations operating in the cloud in every service when already know about the cyber security risk. Cloud computing service failure, because the customers do not understand the security, depends on which points and meetings. The organization chooses cloud service as security that should be awarded by all threats also and update all the employees and users as well and should be followed all the steps for security. “With cloud computing emerging as the latest technological advancement, it also brings various unexplored threats which raise critical security questions about data security on the cloud” (Bhattacharya, 2017).
Post#2
Net neutrality defines the principles of the internet for the service provider companies that they must treat all types of internet communications equally. The companies must not charge for the different internet services differently which can be defined on the basis of user content, types of the types of equipment used, destination, and the source address. With the presence of net neutrality, internet service provider companies may not charge money for some specific content or service, slower down the internet connection, or intentionally block some of the internet content to charge extra for the service. When net neutrality was not present, internet service provider companies would charge the customers for various tiers of services and intentionally block some of the websites and services used by the users. “The most basic definition of net neutrality is to prohibit payments from content providers to internet service providers; this situation we refer to as a one-sided pricing model, in contrast with a two-sided pricing model in which such payments are permitted” (Greenstein, 2016).
Net neutrality applies to cloud computing also as this also a service that is provided by the service provider companies. The rules of net neutrality that applies to cloud computing are:
The service provider company provides software as a service that cannot restrict or block the access of the users to cloud computing and storage services. The service provider companies providing software as a service cannot differentiate between its customers taking the same service from the company. They cannot favor one customer in the areas such as accessibility, storage capacity, storage elasticity, responsiveness, and many other types of services provided by the companies to the users. The service provider companies cannot provide special services at selective offers to some of the specific customers who have opted for the same services at the same expense. “The interpretation is that if a cloud platform is owned by the Internet access provider, the cloud is just a part of the network and under the NN regulation” (Kantola, 2019).
Net neutrality helps in determining the efficiency of cloud technology. It helps in managing the provider’s service to be provided to customers equally worldwide when they are paying equal in every term. Net neutrality helps in maintain the clouding services and upgrades the response time for every company equally. The small businesses that are using cloud computing services to become big and compete with the big giants are treated equally in terms of clouding space and software as a service. “One of the “fathers” of the Internet, Vincent Cerf (who, with Robert Kahn, developed the TCP/IP protocols, used in the early days of ARPANET, the Internet’s precursor, and which are still used today) pointed out in his Communications of the ACM column that “the Internet has always been open,” and “what we should not and must not tolerate is the arbitrary shutting down of pathways that can link together our increasingly global societies” (Austin, 2018). Net neutrality affects clouding technology as the security of the data saved is hampered. When the company integrates cloud into their existing company, it requires a proper assessment of the resources and business needs to develop a cloud security strategy. There is also a view that the security technology is already developed in a way that net neutrality won’t affect the working in the clouding technology but it will define the guidelines of the service provider and the user of the services (Austin. 2018).
Annotated Biblography
You will provide an annotated bibliography for each article in one page and discuss how these articles identify a gap in the literature that you wish to address in your dissertation
Computer Automation and Artificial Intelligence :
https://inis.iaea.org/collection/NCLCollectionStore/_Public/25/029/25029353.pdf?r=1&r=1#:~:text=Recent%20development%20in%20computer%20technology,techniques%20with%20an%20improved%20efficiency.&text=Automation%20refers%20to%20the%20act,process%20more%20automatic%20than%20before.&text=Automation%20involves%20the%20integration%20of%20tour%20types%20of%20devices.
Journal of machine learning research :
Provided attachment
Reference
case study
Discussion Points
1. Some virtual teams at Boeing have discussions focused on military
aircraft. Do some Internet research on UC security mechanisms and
identify and briefly describe several that Boeing should have in
place to ensure the privacy and integrity of such discussions.
2. To what extent do the UC benefits experienced by Boeing mirror
those of other firms that have deployed UC capabilities over
converged IP networks?
3. To date, Boeing has not implemented the full range of capabilities
available through UC systems. If you were the CIO at Boeing, what
additional UC capabilities would you implement? What benefits
would you expect Boeing to derive from deploying these
capabilities?
Sources
[MICR10] Microsoft Case Studies. “Boeing Expects to Lower Costs andImprove Productivity with Messaging Solution.” March 16, 2010. Retrieved
online at:
http://www.microsoft.com/casestudies/Case_Study_Detail.aspx?casestudyid
=4000006703.
[MICR11] Microsoft Case Studies. “Boeing Promotes Knowledge Sharing forGlobal Workforce with Communications Solution.” April 29, 2011. Retrieved
online at: http://www.microsoft.com/casestudies/Microsoft-Lync-Server2010/Boeing/Boeing-Promotes-Knowledge-Sharing-for-Global-Workforcewith-Communications-Solution/4000009654.
[REED08] Reed, B. “AT&T snags big Boeing voice/data contract.”NetworkWorld. August 12, 2008. Retrieved online at:
http://www.networkworld.com/news/2008/081208-boeing-att-contract.html
Project with presentation
I will develop a fictitious company, make yourself officers, and create a privacy policy document for said company.
Your fictitious company must create a privacy policy document (6-7 pages). The document shall include an introductory section, such as an “Executive Summary,” a “Preamble,” or an “Introduction.”
The document will include policy statements. The policies need to focus on governing your company and its employees. This is where the work comes in. You need to give evidence in the policy section of your knowledge gained. That document provided in this folder is not meant to be an exact template. Rather, it is designed merely to reflect what a successful policy document might look like in any given workplace. Do not restrict yourself to this exact format, but do utilize a cohesive format and create a document that is easy to follow. You will see in that document that I simply tried to explain more about what the Project should include by using a format that may help you understand how to organize your paper, and understand what features this governance document should include.
That includes its organization, page count, and grammar, and spelling. The form and format are important because if a policy document is disorganized, contains typographical errors, or is hard to read otherwise, employees will not respect or even use it as the guidance it is meant to be.
Complete the Unix scripts
| Firewall // 1pt
Open the following ports and services: 443, http
| Account Management // 3 pts
From the csv, use the OS as the filter to complete the following tasks.
– Add each username and make sure to place it on the correct base dir. You can check the /etc/passwd to ensure it is correct.
roary001:x:1000:1000::/home/__OS__ /__COUNTRY__ /roary001:/bin/bash
– Each username must be part of the right primary group. See filter below
roary001:x:1000:1020::/home/__OS__ /__COUNTRY__ /roary001:/bin/bash
– Each home folder must contain the corresponding files. See filter below
– Add the right content to the about file.
* All text must be lower case
* Single space characters
* No extra characters at the end of the document
| MAC
– Base directory = /home/mac/
– Primary group = color
$ ls /home/mac/canada/roary001/
.DS_Store
about
$ cat /home/mac/canada/roary001/about
first last
dob
| WINDOWS
– Base directory = /home/windows/
– Primary group = fruits
$ ls /home/windows/mexico/roary002/
Thumbs.db
about
$ cat /home/windows/mexico/roary002/about
last first
shell
Ubuntu // 4pts
| Firewall // 1pt
Open the following ports and services: 21, 22, 53, 143, 443
| Apache2 // 3pt
Install Apache on the server
$ apt-get install apache2
From the csv, use the permission as the filter to complete the following tasks.
– Create a base directory under the /var/www/html for each permission
→ /var/www/html/permission/ // all, create, delete, drop, execute, insert, select, update
– From the CSV, filter all users that match each permission and create a new directory for each month of the year for which your users were born.
fh7058,forrester,hochstein,m,august 9 1998,ghana,plum,bananas,mac,/bin/tcsh,execute
gm1513,greydon,merrick,m,september 21 1992,bahrain,medium_aquamarine,grapes,mac,/bin/csh,select
iw7165,iriana,weick,f,august 20 1987,cyprus,medium_purple,plums,windows,/bin/tcsh,select
→ /var/www/html/select/september
– Inside of each folder above, create an index.html file and add all matching users data int the following order: country,color,fruits,os,shell,username,first,last,gender
→ cat /var/www/html/select/september/index.html
bahrain,medium_aquamarine,grapes,mac,/bin/csh,gm1513,greydon,merrick,m
Fedora // 2pts
// scripts
All scripts must be placed on the /root folder.
Scripts can not be executed prior to submission. This will cause issues.
Make sure to test your scripts before turning in the assignment.
* Ensure that all file references in your scripts are absolute paths.
| useradd
Create a script named useradd.sh. This script will complete the same steps outlined on CentOS, but will run them on demand.
| httpd
Create a script named httpd.sh. This script will complete the same steps outlined on Ubuntu, but will run them on demand.
* Keep in mind that to install apache2 on Fedora you need to use the command below. The folder structure for the web server is the same.
$ dnf install httpd.
etc13
Web server auditing can go a long way in enforcing tighter security and ensuring business continuity. The power of log data is tremendous. Web server logs record valuable information pertaining to usage, errors, and other important security events. Using a specialized auditing tool can be extremely helpful during the audit of web servers. In your discussion this week, please discuss the methods of identifying weak web server configurations and how to mitigate them for a secure web server. Possible concepts to include are SSL certificates, HTTPS usage, attack surface, SQL injection, vulnerability migration, and least privilege. In at least one of your peer responses, provide an overview of how to audit the web server’s security and implement best practices.