A9

Attached is the document contains the question. Include at least 4 APA formatted references (and APA in-text citations). The assignment is 4 pages in length. Go through the word document for further details.

Digital Forensics Tools and Tech – New England

 

Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

 

Using WORD, in you OWN WORDS, write an ORIGINAL brief essay of 300 words or more  :

World Views Make a Difference in Research

Select one “scenario” from each of the following procedures in Chapter 8: Analytic Procedures, Systems Procedures, and Actors Procedures. From a world view perspective, how are situations similar? How are they different?

450 words with in text and 3 references

Discussion

 

This is a required assignment worth 20 points (20-points/1000-points). Assignment must be submitted by the due date. No late assignments are allowed. Please discuss the following topics and provide substantive comments to at least two other posts.

Select from the following list four (4) topics and discuss. Use only 50-words max per topic to discuss and present your answer. The discussion questions this week are from Chapter 6   (Jamsa, 2013).

Chapter 6 topics:

  • Define and describe a SAN.
  • Define and describe NAS.
  • Describe how cloud-based data storage works.
  • Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.
  • Many users do not yet feel comfortable storing data within the cloud. Discuss some steps you can take to reduce their concerns.
  • Assume that you must select a cloud-based data storage solution for your company. List the factors you would consider when selecting a vendor.
  • List the pros and cons of cloud-based data storage.
  • List the pros and cons of a cloud-based database.

NOTE: You are required to use at least two-peer reviewed sources (besides your textbook) to answer the above questions.  The initial post is due by Wednesday at 11:59pm ET.  You must engage on at least three separate days (by Wednesday for the first post and two additional days of peer engagement).  Do not wait until Sunday to engage with peers, this should be an active conversation with your peers.  When replying to peers be sure to engage with substantial posts that add to the conversation.  

Review of the Journal

Abomhara, M., & Koien, G.M. (2015).  Cyber security and the internet of things: Vulnerabilities, threats,  intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 3 pages (800 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments  pertaining to other approaches to testing their hypothesis (logical  follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

Research Paper

The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

For your week 3 research paper, please address the following in a properly formatted research paper:

  • Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.
  • Are there other frameworks mentioned has been discussed in the article that might be more effective?
  • Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

microsoft excel graders

I have two graders that I have to get done by midnight.  They have to be done correctly and in the correct format .xsls The last guy did not do them right and I did not pass them.,

It636week1

1.  Prepare a one page (minimum) paper on the use of Data Mining in the retail industry. You may use the internet for additional sources. Please double space your paper and cite your sources. 

2.  Prepare a one page paper on chapter 2, the Development of a Data Mining Study by briefly explaining the phases of a data mining project. You may use the internet for more information. Please double space your paper and cite your sources. 

Methodology used on your topic

 Try to find a quantitative, a qualitative and a  mixed-method dissertation that may be closely related to   The role of intrusion/spyware analysis in risk management in the current world topic. Describe the method used, the sample, the population chosen, was there a survey involved, or a set of questions asked as in a qualitative study. Finally, can you identify the problem the dissertation tried to examine.