Security Risk Assessment

 Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format double space and have to include at least two references and 400 words. 

  • When should the architect begin the analysis?
  • What are the activities the architect must execute?
  • What is the set of knowledge domains applied to the analysis?
  • What are the tips and tricks that make security architecture risk assessment easier?

discussion

Discussion: Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics.

Computer Science Project

Please message me if you can do the following below

Assignment Instructions

Instructions for Your Final Project:

Build a comprehensive website with information about the job or profession you intend pursue when you graduate (Computer science related).  Your webpage content should include a Job Description, Knowledge/Skills required for the job, Training/Education required for the job, and Salary/Benefits expected from the job. Use the following sources to conduct your research: Occupational Outlook Handbook: https://www.bls.gov/ooh/ or similar references.  Make sure that you explain the content (the paragraphs of information about your topic) yourself.  Do not simply copy content from other web pages.  Include citations to give credit to the source where you found the information you include on your website.  Your website should contain at least 4-6 paragraphs of information, arranged in a logical manner (using headings and sub-headings appropriately), and it should consist of at least 3 HTML pages.  The home page of your website must be named “LastFirstHomePage.html” where “Last” is your last name and “First” is your first name.  For example, if your name is John Smith, you would name your file SmithJohnHomePage.html.  You may name your other two HTML pages anything you like.  Name your CSS file “LastFirstStyleSheet.css” where “Last” is your last name and “First” is your first name.

Important Note: All files created for this assignment must be new files that you have not submitted for grading in previous weeks.  No credit will be given if your HTML file(s) and/or CSS file(s) are identical to any files that you have previously submitted!

The HTML pages of your website must include all of the following:

  1. Contains the HTML 5 DOCTYPE declaration on each page
  2. Correctly uses html, head, body, and link tags on each page
  3. Includes charset, author, keywords, and description meta tags on each page
  4. Use title tags to give each page an appropriate title
  5. Link all pages to an external style sheet (.css file)
  6. Appropriate navigation between pages of your website, using local hyperlinks (coded with relative paths)
  7. Your webpage content should include a Job Description, Knowledge/Skills required for the job, Training/Education required for the job, and Salary/Benefits expected from the job.
  8. Include at least 3 images representing your job/profession of interest.
  9. Include a JavaScript function of your choice
  10. Include a hyperlink to a webpage with information about a certification to support your job/profession of interest.
  11. Include an HTML table summarizing information about your job/profession of interest.
  12. Include an HTML form with at least 6 different types of form inputs and appropriate content for the theme of your website
  13. Be sure to create relevant and informative content and to design your website attractively.

Your external style sheet (.css file) must include all of the following:

  1. Appropriate CSS for main elements in your page (body, headings, horizontal rules, images, etc.), such as page background color, text color, font types, font sizes, font colors, width, height, float, margin, etc.)
  2. Include a background color (other than white) or a background image representative of your job/profession of interest.
  3. Any additional CSS you wish to add to your website (optional).

Before submitting your web site:

  1. Validate all HTML files at https://validator.w3.org/#validate_by_upload, using the “Validate by File Upload” option, and fix any errors that the validator identifies before submitting your web site for grading.
  2. Validate your CSS file at https://jigsaw.w3.org/css-validator/#validate_by_upload, using the “Validate by File Upload” option, and fix any errors that the validator identifies before submitting your web site for grading.

mad research paper

  

Montasari, R., & Hill, R. (2019). Next-Generation Digital Forensics: Challenges and Future Paradigms. 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), Global Security, Safety and Sustainability (ICGS3), 205. https://doi.org/10.1109/ICGS3.2019.8688020

Sahinoglu, M., Stockton, S., Barclay, R. M., & Morton, S. (2016). Metrics Based Risk Assessment and Management of Digital Forensics. Defense Acquisition Research Journal: A Publication of the Defense Acquisition University, 23(2), 152–177. https://doi.org/10.22594/dau.16-748.23.02

Nnoli, H. Lindskog, D, Zavarsky, P., Aghili, S., & Ruhl, R. (2012). The Governance of Corporate Forensics Using COBIT, NIST and Increased Automated Forensic Approaches, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, Amsterdam, 734-741.

After reading the required articles this week, please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Reflection

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course “Enterprise Risk Management” have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.  

Threat agent

  

a. Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.[600 words] 

1. When should the architect begin the analysis?

2. What are the activities the architect must execute?

3. What is the set of knowledge domains applied to the analysis?

4. What are the tips and tricks that make security architecture risk assessment easier?

b. Make sure to explain and back up your responses with facts and examples. Your responses should be in APA format and have to include at least two references.[600 words] 

  1. What does an assessor need to understand before she or he can perform an assessment?
  2. How active is each threat agent? How might a successful attack serve a particular threat agent’s goals?

cryptographic hash

Assignment Content

  1. In this assignment, students will expand on the information provided in the course.

    Answer the following in a 2- to 3-page paper:

    • Define cryptographic hash function (CFH).
    • List and define the main properties of an ideal cryptographic hash function.
    • Give at least 2 applications or uses for a CFH (example: password verification) and a brief description of how it is used.

Write about OAuth.

Write  500 words or more explaining why this “OAuth” is important for your peers to understand. Be focused and specific. You should do a deep dive into a topic.

You MUST make a statement saying exactly what your topic is. 

Use at least five sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources.

Gap in Current Market

  

Determine where there is a gap in the current market. Next, determine what market you want to research (For example, gaming, networking, system security, etc.). You can choose any market you like.

Using APA 7th edition formatting In a Word document, submit a one-page research proposal, including the following information (The page count does not include the cover page and reference page):

  1. Identify the market you have chosen
  2. Include the name of your proposed company
  3. Explain why you feel there is a niche or area for you to       succeed in the market
  4. Research other companies in the same market and identify why       they fail to provide the goods or service you are offering and contrast       them to the goods or services your company is going to offer.