paper

 https://us-lti.bbcollab.com/recording/43bad645d5784320ade99e142ecb3352

 

After reading the required articles , please write a research paper that answers the following questions: 

  • What are mobile forensics and do you believe that they are different from computer forensics?
  • What is the percentage of attacks on networks that come from mobile devices?
  • What are challenges to mobile forensics?
  • What are some mobile forensic tools?
  • Should the analysis be different on iOS vs Android?

Your paper should meet the following requirements:

  • Be approximately five pages in length.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Active Directory & DNS (Windows Servers)

 

Describe the basics of Active Directory including domain, tree, and forest. What domain model would you recommend to an organization (make and list your assumptions)?

Discussion Question 2:

Describe in detail some of the aspects of DNS related to Windows Server 2016 including zones, records, commands, etc. Explain how DNS is installed and configured on Windows Server 2016.

Ethical hacking

Required Readings

The Benefits of Learning Ethical Hacking (Posted in Penetration Testing on August 29, 2018)

https://resources.infosecinstitute.com/the-benefits-of-learning-ethical-hacking/

When Ethical Hacking Can’t Compete

https://www.theatlantic.com/technology/archive/2015/12/white-hat-ethical-hacking-cybersecurity/419355/

Wk 1 Research Assignment

Review the required reading material and summarize one of the scholarly articles listed on the selected websites. In 2-3 paragraphs, and using your own words, explain why ethical hacking is necessary in today’s complex business environment.

Wk 2 Research Assignment

Go online and search for information that relates to ethical hacking (white hat or gray hat hacking). Choose one of these areas explain why a company might benefit from hiring someone to hack into their systems.

Your assignment should be 3-4 paragraphs in length.

Need help with Hadoop lab

Import the Device table from MySQL 

1. Open a new terminal window if necessary. 

2. Get familiar with Sqoop by running the sqoop command line

 $Sqoop help

3. List the table in Loudacre database:

 $ sqoop list-tables

   –connect jdbc:mysql://localhost/loudacre  

   –username training –password training 

4. Run the sqoop import command to see its options: 

 $ sqoop import –help 

5. *Use Sqoop to import the device table in the loudacre database and save it in HDFS under /loudacre:

Assignment 1 Dropbox

This is an individual assignment.Purpose: Whatever field you go into, you will likely be a part of selecting and/or purchasing computing equipment and/or software. This assignment will help you gain some insight into this process. Tasks:You are an IT consultant and you are attempting to snag your first client.  You must create specifications and a price quote for the purchase of three (3) computers from three (3) vendors. After collecting your information, you will end up with a 3×3 matrix (table), or a total of nine (9) price quotes.  You will attach the price information to the client proposal.  In the proposal, you will state the purpose of your proposal and give your recommendation to the client for one of each of the computers to include your reasoning as to why of the three computers in that category, the client should trust you to purchase and set up that particular model.Scenario:Mr & Mrs Nouveau Rich’s only daughter is heading off to CSU this fall. Mr. Rich made his money on TikTok producing videos of his wife. He sells a new line of exercise equipment and Keto-friendly drink mixes to people who have been forced to stay at home because of the coronavirus. These TikTok followers have seen their weight skyrocket due to Publix grocery stores selling buy-one-get-one free (BOGO) Oreo cookies, ice cream, doughnuts and pasta meals and now want to eat right, exercise and take the weight off.The Rich’s, being stuck at home with everyone else, need to prepare so send their daughter off to college while ramping up their work from home business.  Their side hustle has become a money train. They contacted you after viewing a YouTube video you produced for a class at CSU and liked your technical talent. They called and asked you to help them with the following:

  • Their daughter, Fonda B Rich, is headed off to college and needs a laptop.  Dad is partial to Microsoft and Dell products.  You know what kind of laptop the daughter is “Fonda” of – aren’t all college students?  So dad needs some options to prove to his daughter that there is more than one type of laptop out in the world that does NOT involve standing for hours at a bar for Geniuses to learn how to use a fruit…
  •  Mr. Rich (Known as Richey to his friends) is tired of creating and editing his TikTok videos on his iPhone 11.  He is getting older and his eyesight isn’t what it used to be and let’s face it, he has fat fingers. Richey Rich needs a souped up, powerful machine that he can load some sophisticated movie and music production software on and still have some power left over to play Solitaire. He also figures that his son and daughter, Ima B and Will B (nicknamed Willie), will use the desktop to play some Disney, Pokemon, and Super Mario games.
  • Mrs. Shirley B. Rich is the mastermind behind the entire Rich enterprise. With a keen head for business, she started the whole empire when she videoed herself taking the Laxed Siren Beat (by Jawsh 685) Challenge Dance in her workout active wear while making a Keto Protein Shake. When she posted it, It went viral and got over 100k followers in 48 hours. Shirley needs a business computer where she can run typical Office software and financial applications to keep up the business’ financial records as well track her Instagram and TikTok videos that Richey produces for her. She needs to be able to be on the Internet researching new recipes, new activewear looks and new TikTok dances and music. Oh, and email her fans that write asking for new Keto recipes and support on their weight lose journey. She has a weight loss blog called “Losers Win in the End.”

Use one of the Report templates in Microsoft Word or word processing software that can save files as .doc or .docx (Google Docs will work for this).Part 1 – Hardware

  1. Create a list of specifications for the three needed (3) computers. The computers will be used in the following scenarios:  
    1. A computer for a college student that can be used to take notes in class, do homework, complete assignments
    2. A computer to be used in an office for animated movies. This computer will be used to work on character design and animation sequences
    3. A computer for home business and personal use 
  2. Build a table to compare and contrast computer offerings from three (3) different vendors (Dell, HP, Apple, Toshiba, Microsoft, etc) for each of the three use cases. (For each person, you will select three options from the different vendors. For example, you might select a Dell, a Toshiba, and an Apple for Mrs. Rich, 2 different Dells and an HP for Mr. Rich, etc.). You will want to include the technical specifications for each selected computer as well as the price. You may add any peripherals you think might be needed (for example, if the computer doesn’t have a built in webcam, you will need to find and include the price for an appropriate webcam if one is needed by the client).   
    1. Hint: use the “Business” section of the vendor site for the office workstation
    2. You can choose among different “form factors” such as desktop, small form factor, tablets, all-in-one computers, traditional desktop, laptop, tower 
  3. Enter computer specs and prices into the Word document  
    1. Add hyperlinks to the vendor sites and computer specs you used
    2. specify the ““form factor” (desktop or laptop or all-in-one, etc.) you recommend and why you think this machine is a good fit for the customer

                4. Provide detail (technical description and price) for the following hardware:                           a. CPU       b. RAM       c. Hard drive (type and size)    d. Optical drive     e. Monitor     f. Operating SystemPart 2 – Software Research and recommend the appropriate productivity software that matches the computer you selected.  What software would each member of the Rich need loaded on their computer in order to do their particular tasks.  Include the software and the price – is it a one time purchase or is it a monthly or annual subscription.  

linux

 For this discussion board you will need to research some best practices in allocating hardware you virtual machines. In your initial post make sure to identify what your research showed as a best practice and if it is hypervisor specific be sure to include the hypervisor.   Your initial post needs to be at least 250 words  

 For this lab you will research and compare the features of the various commercial Type 1 hypervisors available on the market.   You will choose at least 3 Type 1 hypervisors and look at the features, hardware requirements and options and write up a comparison between them.  Ultimately after you have written up your comparison you need to make a recommendation as to which hypervisor you would use and explain why.  Write up your research including references and submit it for a grade