Questions

Please provide each answer in two separate word documents

1. 500 words 

Write a 2 Page description of the types of threats that could be launched, or have been launched, against your organization. Describe what measures you would recommend for cloud security and disaster recovery.

Use APA (7th Edition) format.  In addition, include a Cover Page and a Reference Page.  Please use a minimum of three References.

2.  500 words

Provide a reflection of how the knowledge, skills, or theories of Organizational Leadership have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Emerging threats_3.1

 Question:

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Cryptography in Internet of Things

I am looking for total of  12-13 pages of the content and APA format with ppt slides.

The format for the research paper should be with table of contents, introduction, abstract, body and references

discussion 6

Graphic File Evidence”

  • Using the Internet, search for three steganography tools. Describe the tools’ primary uses, strengths and weaknesses. Also describe competing products, costs, and system requirements. Share the links with your classmates.
  • Evaluate the importance of graphic files to a digital investigation. Provide a scenario in which a graphic file would be considered an invaluable piece of evidence.

PhD Interview questions

  

DOCTORAL CANDIDATES SHOULD PROVIDE AN AUTHENTIC PERSONAL STATEMENT TO EACH OF THE FIVE FOLLOWING QUESTIONS/PROMPTS REFLECTING ON THEIR INTERESTS. IN THE EVENT THAT ANY OUTSIDE RESOURCES ARE USED, RESOURCES SHOULD BE CITED IN APA FORMAT. SUBMISSIONS SHOULD BE A MAXIMUM OF 500 WORDS OR 125 WORDS PER QUESTION/PROMPT. IT IS BEST TO RESPOND TO EACH PROMPT/QUESTION INDIVIDUALLY FOR CLARITY OF THE REVIEWER. WRITING SAMPLES SHOULD BE SUBMITTED IN MICROSOFT WORD FORMAT AND INCLUDE THE CANDIDATE’S NAME.

 1. PROVIDE A BRIEF INTRODUCTION FOCUSING ON YOUR EDUCATION, CAREER, AND DECISION TO APPLY TO UNIVERSITY OF THE CUMBERLANDS.
 

2. IN RELATION TO YOUR DOCTORAL PROGRAM APPLICATION, WHAT AREA OF RECENT RESEARCH IN THE FIELD WOULD YOU WANT TO STUDY, AND WHY?
 

3. HOW DOES YOUR CURRENT VOCATION RELATE TO YOUR APPLICATION TO THE DOCTORAL PROGRAM?
 

4. HOW WILL YOUR EXPERIENCES AND PERSONAL SKILLS HELP YOU TO BE SUCCESSFUL IN YOUR PROGRAM?
 

5. WHAT LONG-TERM GOALS DO YOU HAVE FOR APPLYING YOUR LEARNING FROM YOUR DOCTORAL PROGRAM?

​Timeline Assignment

 Timeline AssignmentInstructions

  1. Do you have the two Dr. Evil E01 images downloaded to your computer? If not, please do this.
  2. Did you already download and install Autopsy on your workstation? If not, please do this. Also, don’t forget to watch the video on using Autopsy if you are not familiar with it. Note – the tool is very intuitive so you should not have problems with it.
  3. Ingest (load) the two E01 images into Autopsy by selecting File à Add Data Source. If you are not sure what is the data source– then select the Disk Image data source and you can browse to the E01 images. 
  4. Autopsy will then process the images. This should take about 10-20 minutes.

  1. Now click on the Timeline button on top of the Autopsy GUI and then familiarize yourself with the environment before answering these questions for total of 50 points. This timeline functionality is extremely powerful so click everywhere. Check out the different options. Right click a file and see what options are existing. I think you will be able to immediately grasp the possibilities of how you can pivot to a very specific MINUTE. See sample screenshot.

Questions (100 points)

  1. What website was searched on 8-25-2004?
  2. What was search query used on that website on 8-25-2004. Please provide screenshots.
  3. What websites were visited on 8-27-2004?. Please provide screenshots.
  4.  There was email activity on 07-27-1992. What was that email activity? Please provide screenshots.
  5. You want proof that Dr. Evil used Ghostware and you think it was done in August 2004. When exactly was this? Please provide screenshots.
  6. What software / driver is keys.text associated with? Please provide screenshots.
  7. Please send me a snapshot report.

cloud computing

Assignment 1: Avoid Plagiarism – A Refresher

Create a MS PowerPoint brief on the topic of Academic Integrity.  

  • Cover (Course, Student Name, Date)
  • Ideas/Concepts –
    • Add graphics or screen captures if desired.
    • One slide is dedicated to locating and listing at least three (3) UC resources that the university provides regarding writing assistance, avoiding plagiarism
  • Conclusion
    • A brief personal statement about your pledge to avoid academic dishonesty and what that means to you and the university (standards, morals, character, etc.)

Search UC website(s), Course Announcements for appropriate resources.  You may use the UC Library and other websites for this assignment. 

Suggested Format:

Slide 1: Cover page

Slides 2-7:  Ideas/concepts – discuss academic integrity, e.g. the effects of dishonesty on the violator, the school, the original author, society, etc.

Slide 8: A brief personal statement about your pledge to avoid academic dishonesty and what that means to you and the university (standards, morals, character, etc.)

Slide 10: List 3 resources that the University of the Cumberlands or other websites which provide information to help you avoid plagiarism.