Dissertation topic proposal

In 100 words, identify a proposed topic in your discipline.

Connection to program goals and core courses

If you do NOT have a CPT code then just discuss at the end of your Topic how the Topic related to your concentration in the Ph.D. program.

Journals must be from approved list

need out line and complete

 

complete a Detailed Research Outline based on the instructions provided

  • Refer to the CU Research Guide for Structure (file found under the Research Report Help section)
  • Refer to APA for format  (web link found under the Research Report Help section)

Information Governance Metrics

 In order to have a successful IG program, one of the eight (8) Information Risk Planning and Management step is to develop metrics and measure results. From your required readings, discuss the value that metrics brings to the organization, and identify critical measures of success that should be tracked. 

400 words 

Implementing IT across the globe

 Each student will write a short research paper for a peer-reviewed research paper that pertains to the week’s assigned reading.  This will be a detailed summary of the research paper and what you gained from the research.  Each week, you will find an article/peer-reviewed research paper that pertains to the week’s assignment.  If you have a difficult time, Google Scholar is a wonderful location to find these types of articles:

https://scholar.google.com/

Once you find the article, you will simply read it and then write a review of it.  Think of it as an article review where you submit a short overview of the article.

Your paper should meet the following requirements:

• Be approximately 2-3 pages in length, not including the required cover page and reference page.

• Follow APA6 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

*All outside sources must be referenced and cited in your paper.  All papers will be reviewed with plagiarism software. Any references not properly referenced and cited will result in a 0 on your paper. Multiple violations will result in a failure for the course!

4 discussion

Best Practices for IT Infrastructure Security Policies

Discuss at least four (4) best practices for IT infrastructure security policies in domains other than the User Domain. Pick one domain outside the user-domain to focus on. Address the following topics using your own words:

  • IT framework selection
  • When to modify existing policies that belong to other organizations versus creating your own policies from scratch
  • Policy flexibility
  • Cohesiveness
  • Coherency
  • Ownership

Explain your answers. 350-400 words must.

Digital Forensics

  

Many people think of the Internet as separate from the physical world. This is simply not the case–crime on the Internet is closely tied to crime in the physical world. There are a couple of reasons for this cautionary note. A crime on the Internet usually reflects a crime in the physical world, with human perpetrators. and victims and should be treated with the same gravity. To neglect the very real and direct link between people and the online activities that involve them limits one’s ability to investigate and understand crimes with an online component.

Students think about the impact of auction and check fraud in this modern era of digital shopping. This about how a combination of evidence from the virtual and physical worlds is used to apprehend a criminal.

MSDF-630: Case Study

Case Example inspired by a case in (Casey, 2011)

A buyer on Amazon complained to police that he sent payment to a seller but received no merchandise. The seller requested that the buyer also send a cashier’s check for shipping and additional costs. Over a period of weeks, several dozen similar reports were made to the Internet Fraud Complaint Center against the same seller. To hide his identity, the seller used a Gmail account for online communications and several mail drops to receive checks. Logs obtained from Gmail revealed that the seller was accessing the Internet through a subsidiary of AT&T. When served with a subpoena, AT&T disclosed the suspect’s Google account and associated address, credit card, and telephone numbers. Investigators also obtained information from the suspect’s bank with a subpoena to determine that the cashier’s checks from the buyers had been deposited into the suspect’s bank account. A subpoena to Amazon for customer order history and complaints and supporting evidence from each of the buyers helped corroborate direct connections between the suspect and the fraudulent activities. Employees at each mail drop recognized a photograph of the suspect obtained from the Department of Motor Vehicles. A subpoena to the credit card number and a search of real estate property indicated where he conducted most of his fraud. A 3rd company revealed the suspect’s Social Security the suspect’s name turned up an alternate residence the opportunity to uncover crimes in the physical Internet.

Question 1 – Following the Cybertrail

Comment on the interconnectedness of the digital world. To what extent does cyber-criminal have anonymity in their transactions? Be detailed in your response. 

Question 2 – Following the Cybertrail

By what means of your expertise in MSDF-630 provide a critical forensic investigation approach that will play a key role in protecting consumers in this scenario from digital fraud such as this?

Writing a program in COBOL.

Write the following program using COBOL programming language:

Grade Report

This is a program designed to hit you where you live! This program will compute your current average in a class, the minimum average that you could earn from this point forward, and the maximum average that you can earn. In addition to this, it prints the relative weights of each assignment category.

This program assumes that grades are computed out a fixed pool of points. For example, the course in which you currently find yourself has 1000 points. Your total average is computed by the formula:

grade = (points_earned * 100) / points_possible

So at any given point in the semester, you could compute your current average by totaling the points you have earned and dividing by the possible points on your assignments so far.

The minimum grade is what you would earn if you stopped handing in work. That is, you would forfeit all remaining possible points in the semester (not a good idea, usually!)

The maximum grade is what you would earn if you earned all remaining possible points in the semester.

This program will take as its input the name of a file. The file is a flat-format file of the following form:

The total number of points for the entire semester on a line by itself.

Zero or more assignment records, with each field being a fixed width. The format of these records are as follows:

Assignment Name (20 characters)

Category (20 characters)

Possible Points (14 characters)

Earned Points (14 characters)

Consider the file generated by a student whom we will call “Bill”. Bill has recorded his first few as shown:

1000

MS 1 – Join Grps    Group Project       5             5             

Four Programs       Programming         15            9             

Quiz 1              Quizzes             10            7             

FORTRAN             Programming         25            18            

Quiz 2              Quizzes             10            9             

HW 1 – Looplang     Homework            20            15            

Note that there is no separator between these fields! If they use the full width of the field, they run right up to the next one:

HW 3 – Struct & VarsHomework            20            20            

When Bill runs the program, it generates the following output:

File: Bill

Group Project        (5%)

==================================

MS 1 – Join Grps        5/5   100%

==================================

                        5/5   100%

Homework             (23%)

==================================

HW 1 – Looplang       15/20    75%

==================================

                      15/20    75%

Programming          (47%)

==================================

Four Programs          9/15    60%

FORTRAN               18/25    72%

==================================

                      27/40    67%

Quizzes              (23%)

==================================

Quiz 1                 7/10    70%

Quiz 2                 9/10    90%

==================================

                      16/20    80%

Current Grade: 74%

Minimum Total Grade: 6%

Maximum Total Grade: 97%

Here, neatness counts! Make the output line up in nice neat tables. Also note that category weights are the weight of how much the category counts toward the current average. At the end of the course, these would match the weights in the syllabus. Also, note that while Bill is earning a C, if he buckles down he can still get that A. Perhaps you could use this program to help you in your courses!

The contents of sample data files are given below:

File bill:

1000

MS 1 – Join Grps Group Project 5 5   

Four Programs Programming 15 9   

Quiz 1 Quizzes 10 7   

FORTRAN Programming 25 18

Quiz 2 Quizzes 10 9   

HW 1 – Looplang Homework 20 15

File cs-390 assignments:

1000

MS 1 – Join Grps Group Project 5 0   

Four Programs Programming 15 0   

Quiz 1 Quizzes 10 0   

FORTRAN Programming 25 0   

Quiz 2 Quizzes 10 0   

HW 1 – Looplang Homework 20 0   

COBOL Programming 25 0   

Quiz 3 Quizzes 10 0   

Mid Mid 200 0   

HW 2 – LL Enhanced Homework 20 0   

ALGOL 68 Programming 25 0   

MS 2 – Descr. Lang. Group Project 50 0   

HW 3 – Struct & VarsHomework 20 0   

Lua Programming 25 0   

Quiz 4 Quizzes 10 0   

HW 4 – Variable Typ.Homework 20 0   

MS 3 – Example ProgsGroup Project 45 0   

JavaScript Programming 25 0   

Quiz 5 Quizzes 10 0   

HW 5 – Smalltalk Homework 20 0   

MS 4 – Interpreter Group Project 100 0   

Ms 5 – Presentation Group Project 50 0   

Scheme Programming 25 0   

Quiz 6 Quizzes 10 0   

Prolog Programming 25 0   

Final Final test 200 0

Access Control Discussion

Describe Access Controls that you have utilized in your career or personal life.  APA formatting is expected for any references.  Initial posts due by Thursday end of day and two peer responses due by the end of the unit.