week 3 Security Architecture and Design

 Since we know that this particular  instance of the AppMaker implements a customer-facing store that  processes financial transactions, how does that influence which threat  agents may be interested in attacking it? 

Practical connection

How Cloud Computing course is related to your daily job? how do you use and what do you use in working software engineer/developer role?

digital forensic

  • 10:33
  • Using Chapter 10 as a reference, eExplain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?  Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

Digital Forensics Evidence

Preamble

In August of 1997, a Swiss couple, John 52 years old and Buntham 26 years old Graben Stetter, were arrested at the Hilton in Buffalo, New York, and accused of smuggling thousands of computerized pictures of children having sex into the United States. The couple were alleged by authorities to have sold wholesale amounts of child pornography through the internet and carried with them thousands of electronic files of child pornography to the United States from their Swiss home.

Allegations

  1. The couple were unproven to have agreed over the internet to sell child pornography to the United States (US) Customs agents posing as local US porn shop owners.
  2. The couple were suspected to have agreed to sell 250 CD-ROMs to US investigators for $10,000. According to reports, one CD-ROM had over 7,000 images.
  3. The couple were further alleged to have their 2-year-old daughter, traveling with them at the time of the arrest, who is also a victim.
  4. Authorities professed that photographs of the 2-year old daughter are on the CD-ROMs the parent were distributing.

Mitigation

Criminal’s MO is a learned behavior that continue to grow, develop, and advance tirelessly as the perpetrators turn out to be more experienced, sophisticated, and confident in the operation. Digital imaging technology and the internet allegedly help to unearth Swiss couple; John and Bentham’s prevailing MO, with intent of producing, marketing, and distributing child pornography materials to counterparts, and vulnerable innocent citizens of the world community.

          Underground communications, seizure of 250 CD-ROMs and arrest of the Swiss couple was made possible by efficient use of computer and internet technologies. The couple were targeting international buying communities, secured agreement to sell and distribute illicit materials. Furthermore, the illicit items were alleged to have been digitized for transport, ease of storage, and ease of duplication as soon as the couple arrive in the United States. Emergence of computer and internet technologies helped digital forensic investigation in process.

Questions

  1. The Swiss couple attempted to underestimate the United States custom agents and digital forensic investigator. Provide all-inclusive description on the importance of computer and the internet technologies.
  2. The couple were suspected to have agreed to sell 250 CD-ROMs to US investigators for $10,000. Provide comprehensive narrative on how to approach the Swiss couple with only allegation; yet, not officially charged.

700 words: Leadership

  1. Discuss Howell and Mendez’s three perspectives on followership.  Note how these behaviors influence work productivity.
  2. What is the big five personality model?
  3. What is the Myers-Briggs test?  How is it similar to the Big five model?  How is it different than the Big five model?

relational databases & SQL query language

 1. Each year, there are many emerging technologies and applications. What are the drawbacks -if any- of relational databases when used with the new technologies? Do you think a new database model should be proposed to keep up with the new technologies? 

2. What alternatives are there to SQL query language? Why these alternatives are not as popular as SQL? 

Computation

 

Continue the preparation of the glossary; add a new Excel worksheet to the glossary file used last week (see video “Adding a Worksheet.mp4” for steps how to add a new worksheet). The new sheet will contain the following terms:

Data Base

Relational Database

Data types

Records

Fields

Types of fields

Tables

Forms

Reports

 Sort Data

The new worksheet will continue the format from the previous week:

  • Concept
  • Translation
  • Definition
  • References

Data Science & Big Data Analytics

As a Software developer, Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of the “Data Science & Big Data Analytics” course have been applied, or could be applied, in a practical manner to your current work environment. 

Requirements:

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace. 

Infotech Global Economy

This week, you have read about entrepreneurship in a global economy. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or “other” organization if more applicable) that will address the following prompts:

  • Describe the organization’s environment, and evaluate its preparedness to go global, if not already, and it’s strategy for staying global if it is.
  • Research other company’s strategy for going global and explain if this will or will not work for your company. 
  • Make a recommendation for a global strategy in the organization, including a justification for your recommendations.

Submit your midterm research paper as a single document. Your paper should meet the following requirements:

  • Be approximately six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.