cloud computing

Jamsa (2013) specifies five advantages cloud-based providers may have with respect to security. Additionally, the author specifies five security disadvantages to hosting applications and their data within the cloud.

Using these 10 advantages and disadvantages as Level 1 headings in a paper, summarize each in your own words. Then, explain how you believe each of the five advantages could actually become risks if IT security personnel do not embrace them.

The following are required:

  • 1000 – 1200 words (excluding title page and references)
  • Use Jamsa (2013) as your ONLY reference
  • APA 7 
    • Headings
    • Title page
    • third-person
    • in-text citation
    • References List

essay

 Choose one of the aphorisms listed above.  Who first wrote/spoke the aphorism or where does it originate?  What does the aphorism mean?  What is the author’s truth?  Why do you agree or disagree with the aphorism and how if at all has it made you rethink what you thought about the topic before researching the aphorism?  How could you apply this “wisdom” to your life?   
 

 1. “The rich stay rich by acting poor.  The poor stay poor by acting rich.”

2. “If you want a friend get a dog.”

3. “It takes 20 years to become an overnight success.”

4. “Nothing is certain but death and taxes.”

5. “This too shall pass.”

6. “Trust but verify.”

7. “Genius is one percent inspiration and 99 percent perspiration.”

8. “Failure to prepare is preparing to fail .”

9. “If you want something done right do it yourself.”

10. “There’s nothing new under the sun.”

11. “Simplicity is the ultimate sophistication.”

12. “Less is more.”

13. “Buy land.  They’re not making it anymore.”

14. “Misery loves company.”

15. “Be careful what you ask for.  You might get it.”

16. “Work smart, not hard.”

17. “To everything there is a season and a time for every purpose under heaven…”

18. “Brevity is the soul of wit.”

19. “A rose by any other name smells as sweet.”

20. “Carpe diem.”
 

 For composition exercises two and three please write:
1. (format) a 500-word composition.  Use Courier New, 12-point font and double space. 

2. (content) Your composition needs a main idea, major points and specific details.  Respond to the topic/aphorism in your first paragraph.  Present your main idea in the first paragraph.  Then use the rest of your 500-word limit to support your main idea.  You must cite from the material you’ve read to support your ideas. As Abraham Lincoln wrote, “It is a pleasure to be able to quote lines to fit any occasion.”  Use two-three quotes from the sources in your composition to “fit” your interpretation of the aphorism.

3. (focus) Stay focused on the topic.  Everything you write should have a connection to the topic and your main idea. 

4. (clarity) When you proofread check for common errors like fragments, run-on’s, commonly confused words, tense shift, subject-verb disagreement, spelling, etc.  Try to adhere to the KISS Principle.  Keep your sentences short and simple and divide your composition into paragraphs. 

information-seeking

Present and discuss your methodology regarding the information-seeking from different databases that can be used to find the information in a selected domain in Computer Science or Information Systems. Present the fixed references by indicating from which databases you have obtained them.

Support your discussion with at least five references

Assignment-Application Security

 

Discuss the following, supplying citations to support any information that you provide.  Do not include your opinion, only what you can support with a citation.  Address the following topics.

  1. Describe operating system hardening
    1. Define it
    2. Why is it done?
    3. What steps are usually done in a Windows environment?
  2. Describe system restoration methods and procedures
    1. Define it
    2. Why is it needed?
    3. What tools and approaches are recommended?
  3. Describe network security controls
    1. Define it
    2. Why is it needed?
    3. What steps, tools, and policies are used to secure networks?
  4. Describe incident response teams and the role of evidence
    1. What are incident response teams and why do they exist?
    2. How does evidence collection relate to incident response teams?
    3. Discuss evidence
      1. Describe why evidence is collected,
      2. How it should be collected
      3. What can happen if it is collected or handled in an inappropriate way

For all writing assignments ensure that you do the following:

  • Write 1000 to 1500 words in APA format.
  • Utilize at least five scholarly references. 
  • Note that scholarly references do not include Wikipedia, .COM websites, blogs, or other non-peer reviewed sources. 
  • Utilize Google Scholar and/or the university library. 
  • Do not copy and paste bulleted lists.  Instead, read the material and in your words, describe the recommendation citing the source. 
  • Review the rubric to see how you will be graded.
  • Plagiarism will result in a zero for the assignment. 
  • The second instance of plagiarism will result in your failure of this class.
  • If you use a source, cite it.  If you do not, it is plagiarism.

4.2 Case Study

A murder in a downtown office building has been widely publicized. You’re a police detective and receive a phone call from a computer forensics investigator employed by the police department. His name is Gary Owens, and he says he has information that might relate to the murder case. Gary says he ran across a few files while investigating another case at a company in the same building. Considering the plain view doctrine, what procedures might you and he, as public officials have to follow? Write a one-page paper detailing what you might do.

No journal or book references, only websites, such as www.google.com as references. 

Written Assignment

Discuss  predictive patterns. 

Application area: 
To develop an algorithm using  Artificial Intelligence, or even implementing Artificial Intelligence to read users’ patterns like (typing speed, verb usage, accessing applications, mouse moments…) 
The idea is to claim the users’ login to be true. (Even if a hacker hacked in, this predictive analysis can trigger an alert for a manual audit on the login or send few more security questions on the screen before the logged-in user can swim around). Do you agree or disagree and provide an example?

digital project

 Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it. 

300 words

 

Each student will prepare a final project on a digital forensic topic or on a criminal investigation that involved digital forensics.. The primary deliverables for the project will be a paper and and also a presentation that will be presented by the student during the residency period.

  

Anonymous

Citizen Rights vs Security

Cloud Computing

Computer Forensics

Data Center Security

Disaster Recovery

Edward Snowden – Traitor or Hero

Encryption

Hardware and Software Security

I Love You virus

Keyloggers

Mobile Malware

Mobile Security

Pharming

Phishing

Presidential Election 2016

Quantum Computers – Impact on Encryption

Ransomware, malware, business security

Security and the Cloud

Smart Grid

SOFTWARE CRACKERS

Stuxnet Virus

Undersea Cable

United State Cyber Command

Web War I – Estonia Attack

White Hat Hacking

Wi-Fi Security: Wireless Network Encryption

Creating Exploits

Home Automation Security and Vulnerabilities

Car Hacking