Spr1.1

Assignment 1

“A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. For this week’s discussion question, please view the Periodic Table of Visualization at the following link:

http://www.visual-literacy.org/periodic_table/periodic_table.html

Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. Provide a brief description of your choices and explain why you made your choices. Also, describe what advantage your choices have over the others.

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. 

· Include at least two citations (APA) from academic resources

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 2

Security experts recommend using a multilayered defense strategy. A multilayered defense puts multiple controls in place to protect computer system, networks, and other resources.

Answer the following question(s):

Does a multilayered defense guarantee that attacks will not be successful? Why or why not?

Requirement: 

· ****Separate word document for each assignment****

· Minimum 300-350 words. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style. 

· Sources: 2 References to Support your answer

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $5 max. Please bid if you agree.

Assignment 3

Project Part 1.

Refer to the “Project Part 1-Active Directory Recommendations (1)” word document for questions and instructions. 

Requirement: 

· ****Separate word document for each assignment****

· Minimum 3 pages. Cover sheet, abstract, graphs, and references does not count.

· Add reference separately for each assignment question.

· Strictly follow APA style.

· No plagiarized content please! Attach a plagiarized report.

· Check for spelling and grammar mistakes!

· $15 max. Please bid if you agree.

Python Data Analytics Project

THE PROCESS

1. SELECT a domain area of research (COVID-19 related) *Please chat with me for pre-approval

2.  FORMULATE a problem statement & hypothesis. describe the problem in details you wish to explore.

3. FRAME the question(s) according to your domain

a. Understand A Business

b. Understand A Stakeholders

4. OBTAIN data for your project 

a. Describe the Data: Information about the dataset itself, e.g., the attributes and attribute types, the number of instances, your target variable. 

5. SCRUB the data, this includes cleaning and preparing the data for analytic purposes

6. ANALYZE the data, looking for patterns and insights (EDA & Analytics) *Use Jupyter Notebook

7. SUMMARIZE your findings

Security Architect and Design: Individual Assignment

Length:   Minimum of 700 words

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

System architecture is the descriptive representation of the system’s component functions and the communication flows between those components.

My definition immediately raises some important questions.

• What are “components”?

• Which functions are relevant?

• What is a communication flow?

Discussion

Operations Security – 

IT Security Policy Implementation and Enforcement

  • What type of support services should be available when an incident occurs?
  • Are the same or different support services available when an incident impacts the operational performance of an organization?
  • Discuss various ways to use support services when an incident occurs.

2 questions – Each question needs 3 answers – with 1 APA reference for each answer – Each answer atleast 200 words

 Discussion 1: Examine Alexa’s skill in ordering drinks from Starbucks (i.e. What is the development of the skills?  (From what to what level of features). 

 Discussion 2: Research Apple Home Pod. How does it interact with smart home devices?  Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report. 

cs & ns

(4Q’s, NO PLAGIARISM, by Saturday(10/10) 

1/4 –  A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail. Why do think all of these skills are necessary? Please explain. (Min 250 words)

2/4 –  Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).

Your written assignment should be 3-4 paragraphs in your own words and should include a reference citation for your source of information. (Min 250 words)

3/4 – Essay on Packet Sniffing and Wireshark (Min 250 words)

4/4 –  In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs. (Min 250 words)

Network Forensics-1

In this module, we will discuss network forensics. We move away from cellular/smartphone discovery and look at the wired and wireless investigation. We will use the European Union Agency for Cybersecurity’s Introduction to Network Forensics guide. 

The document is available at:

https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/documents/introduction-to-network-forensics-handbook.pdf

1) What types of network investigations are typical of those that fall under the topic of network forensics?

2) How is information acquired from the various types of networks?

3) Describe several tools for network forensics and how the tools function? 

· No Plagiarism 

· Each Answer Should be 400 words without References.

!!! NEED 2  ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM !!!!