Research Paper

 

This paper must directly address the applications and implications of a law or regulation discussed in this course to the conduct of your duties as an Information Technology professional and contain all of the following elements;

  • a title page.
  • an introduction of the content of the paper.
  • a brief review of the recent literature related to your selected law or regulation.
  • a brief analysis of the applications of that law or regulation.
  • a conclusion that summarizes the content of your paper and discusses future research opportunities related to your topic.
  • a reference page(s).

To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper. Remember that your paper, including your list of sources, must be in APA format, and you MUST cite your references in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/

This assignment must be YOUR OWN WORK!  This is an individual assignment. Plagiarism detected in your work will be addressed as discussed in the plagiarism section of the syllabus. 

Here are a few details about the overall research paper Please look at the attached rubric for details on how the paper will be graded. 

  • Your paper must include both a Title page and a Reference page.
  • Your paper should NOT include an abstract.
  • Your paper must include a minimum of 7 peer-reviewed resources (articles or papers)
    • Cited sources must directly support your paper (i.e. not incidental references)
  • Your paper must be at least 1000 words in length (but NOT longer than 1200 words; Scholarly writing should be efficient and precise. Be clear in the information that you are conveying and with the evidence used to support it. Here is a good resource to help with writing concisely:https://academicguides.waldenu.edu/writingcenter/scholarlyvoice/writingconcisely)
    • Title and reference pages are NOT included in calculating the paper length.

short answer

 

  • Data validation can occur on the client or server within the client or server model. Identify the major advantages of using JavaScript to perform validation on the client computer. Describe a scenario when validation needs to be performed on both the client and the server.
  • If you believe that form elements can help with validations, describe the form elements in detail. If you do not believe that form elements can help with validations, recommend numbers and other guidelines that you can follow to help with validations.
  • Flesh out your thoughts and interact with your classmates. Post your initial response by Wednesday each week and then return on a couple of other days to see what’s going on with the discussions. The more you interact, the more you learn from your peers, and the more you share with them about what you know. You will also be showing your instructor what you have picked up.

Discussion

 

Most hackers start their careers breaking into computer systems as teenagers. 

What can we as a community of computer professionals do to reduce the temptation to become a hacker?

Contracting & Service Level Agreements

 

Discuss in 500 words or more the top 5 details that should be included in your cloud SLA.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Write in essay format not in bulleted, numbered or other list format. 

ETCM-Research-4

Evaluate it in 3 pages (900 words) exclude Title page and references from 3 pages:

Due Date: In 4 days. Friday End of Day USA time. 

For this assignment, review the article (Attached below):

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 3 pages (900 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Cyber Security Lab – Shellshock

Please narrate and stake screenshots while doing lab like it says in instruction in PDF

This lab will be done in the SEED lab VM. (Lab pdf, notes, and c code file attached.)

  • Shellshock
  • Environment variables
  • Function definition in Bash
  • Apache and CGI programs

Note: You may need to change void main() to int main() in the C code.

The submission is a lab report that includes screenshots of the steps and a narrative of what is happening.

There are two submissions in case anything goes wrong with the first.

CS 8

 

Please read the Alibaba case study (see HBS Coursepack) and answer the following questions with substantive answers in a cohesive essay. Your paper should be at least 3 pages in length. Use proper grammar, spelling, citations, etc.

1. How does blockchain-based remittance fit into Alibaba’s cloud offerings?2. What unique value does blockchain technology provide in Alibaba’s remittance offering?3. What are other areas of application for blockchain in Alibaba’s cloud business?4. What is Alibaba’s strategy to overcome the “chicken and egg” problem of insufficient transaction liquidity and eventually achieve network effects with its remittance service?

Compose your essay in APA format, including the introduction and conclusion, and in-text citations for all sources used. In addition to your 3 page (minimum) essay.

Material:

  https://hbsp.harvard.edu/import/714113 

Project paper – COmputer Science

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

 You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

 Week 7 – Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information: 

  • Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.

Information technology 1010…….2

 We want you to read at least one article or view a video about hardware (not software). Then write a brief summary (or create a short presentation) summarizing the article using MS Word or PowerPoint. Brief means no less than 10 sentences but not more than one page. Make sure to cite your source properly. 

valuable in collecting both live memory images and images of various forms of media

 

Go online and research some tools that would be valuable in collecting both live memory images and images of various forms of media. Put together a shopping list for your manager that includes tools needed to be purchased. Include a price if applicable.

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.