CHECK ATTACHMENT!!!
Discussion
Operations Security –
IT Security Policy Implementation and Enforcement
- What type of support services should be available when an incident occurs?
- Are the same or different support services available when an incident impacts the operational performance of an organization?
- Discuss various ways to use support services when an incident occurs.
2 questions – Each question needs 3 answers – with 1 APA reference for each answer – Each answer atleast 200 words
Discussion 1: Examine Alexa’s skill in ordering drinks from Starbucks (i.e. What is the development of the skills? (From what to what level of features).
Discussion 2: Research Apple Home Pod. How does it interact with smart home devices? Alexa is now connected to smart home devices such as thermostats and microwaves. Find examples of other appliances that are connected to Alexa and write a report.
cs & ns
(4Q’s, NO PLAGIARISM, by Saturday(10/10)
1/4 – A digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail. Why do think all of these skills are necessary? Please explain. (Min 250 words)
2/4 – Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).
Your written assignment should be 3-4 paragraphs in your own words and should include a reference citation for your source of information. (Min 250 words)
3/4 – Essay on Packet Sniffing and Wireshark (Min 250 words)
4/4 – In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words in 2-3 paragraphs. (Min 250 words)
Network Forensics-1
In this module, we will discuss network forensics. We move away from cellular/smartphone discovery and look at the wired and wireless investigation. We will use the European Union Agency for Cybersecurity’s Introduction to Network Forensics guide.
The document is available at:
1) What types of network investigations are typical of those that fall under the topic of network forensics?
2) How is information acquired from the various types of networks?
3) Describe several tools for network forensics and how the tools function?
· No Plagiarism
· Each Answer Should be 400 words without References.
!!! NEED 2 ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM !!!!
Data Security Assignment
Write an essay of at least 450 words discussing discussing IAM in a federated cloud application.
Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign.
Write in essay format not in outline, bulleted, numbered or other list format.
Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.
Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google. Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.
Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).
It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.
Paper on “A Comparative Analysis of Stored Procedures used in Oracle 12c versus Stored Procedures used in IBM DB2”
Write a research paper on “A Comparative Analysis of Stored Procedures used in Oracle 12c versus Stored Procedures used in IBM DB2”.
Please follow the instructions in the uploaded file VERY CAREFULLY and write the paper.
Reach out to me through messaging here on homework market if you have any questions at any point of time.
Thanks,
Term Paper
1. DEFINITION
This study is an individual work.
In this assignment, you will research applications of experimental design. Through a review of relevant literature, you will find two articles that present practical applications of DOE in industry (i.e. manufacturing, healthcare, banking, entertainment, construction, energy). The studies may target the same or different industries. You will submit one report that addresses the following in your own words:
· Identification of the industry
· Brief problem summary
· Factors studied
· Responses observed
· Experiment design strategy used
· Findings
Each study must be described in a separate section of your report addressing all the items listed above. The articles must include a practical application example. In your search you should focus on more recent publications (published in the year 2012 and beyond are acceptable).
Note that studies with only simple statistical analysis, for example two sample comparisons, are not acceptable for this assignment. The studies you report on must include experimental design methods such ANOVA, factorial design, fractional factorial design, etc.
Your literature material may consist of the following:
1- Peer reviewed research papers (journal papers or conference proceedings) 2- Case study and/or white papers
There must be two publications discussed in your report, and at least one of them must be a peer- reviewed paper.
2. SUBMISSION REQUIREMENTS
· Use a word processing software to prepare your paper
· Provide complete references, use of Harvard citation style for your entries is strongly recommended, but APA citation style may be used if preferred.
· Submit all your documents including the articles referenced (includes reference papers)
3.
ASSESSMENT
Problem Statement (30%)
Design (30%)
Experiment
· Explain the problem(s) introduced in the reference papers clearly and concisely
· List and discuss the questions addressed
· Explain the methodology(s) introduced in the reference papers clearly and concisely
· Explain choice of factors and levels
· Describe the response variables
· Define the experimental design chosen
& Findings · Discuss findings/results presented in the reference papers
· Structure your paper in a clear, easy to follow format
· Include data important to your discussion within the text
· Provide references for any information in your work that is not yours
· Provide your paper in one document prepared using word processor
Written Report (10%)
software
· Visual Displays (tables, graphs, etc.):
o Use clear headings to identify purpose
o Label the plot (meaningful title, properly labeled axis including units)
o Include meaningful and easy to understand legend if needed
Include captions that are explanatory of information presented (table caption starts the word “Table” followed by table number; figure caption starts with “Figure” followed by figure number)
Discussion 4
After reading the articles this week, please answer the following two questions.
- What are some of the potential risks involved with cloud computing?
- Does the research and model in this article propose a viable solution to cloud-based risk management?
At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.
Technology to support Access Control
Discuss the benefits of technology to support Access Control.
500 words
APA format with References