Assessment 3: Digital Forensic Report

 

Hello,

i have an Assessment 3: Digital Forensic Report [Word count: 4000 words]

please check the attached file for complete details.

if you are able to do this please place your bid.

I need A+ grade in this so do quality work.. and I need plagiarism free work.

i also have attached 2017 as an example

Thank you.

Please can you generate a topic on this within 24 hours because it needs to be approved by the lecturer

 In this assignment you are going to simulate data from an area chosen by yourself. It can be cyber related, healthcare, industrial, financial/credit card fraud, commerce – anything. However, run your ideas past me first before diving in. If you recall from the dplyr tutorials we were able to simulate small amounts of data based on several dataframes. We then linked the data we required using join() commands, etc. We then obtained summaries of the data and could use ggplot2 to highlight trends, etc.  
Carefully, choose your domain. Give a rationale for simulating it.
Define your data frames, generate them using sample_n and/or other commands. There is a package called charlatan you may find useful for generating personal names and other values. About 4-5 dataframes will suffice.
Think about seeding trends and patterns in your simulated data that you can “detect” later.
Use dplyr to extract the columns you need from the dataframes.
Use some sort of analysis such as summaries to get statistics on your data. Break it down by a category variable such as e.g. time, gender, fraudulent V normal, etc.
In the write-up, I will expect to see an introduction section, methods, and then sections for Simulation of data and transforming data, Analysis of data; marks for plots should of course be in the Analysis section.
 Part 1: Analysis of the Data (70 marks)
You will need to develop R code to support your analysis, use dplyr where possible to get the numeric answers. Regarding ggplot2, be careful as to what type of plot you use and how you use them as you have many records and want the charts to be readable. You should place the R code in an appendix at back of the report (it will not add to word count).  Section each piece of code with # comments and screenshots of outputs.
Simulation of data (20 marks)
Transforming data (10 marks)
Analysis of data and plots (20 marks)
Write-up of the data analysis (similar format of my R tutorials) (20 marks)
Part 2: Scale-up Report (30 marks)
The second part will involve writing a report. Now assuming your Part 1 was an initial study for your organisation, what are the issues when you scale it up and start using it in practice?
Discussion of Cyber security, big data issues, and GDPR issues (20 marks)
Structure of report, neatness, references. Applies to both Part 1 and Part 2 (10 marks)
Penalties: Do not go over word limit of 3,000 (other than ±10%) as loss of marks will occur according to the university guidance on penalties.

ns-d-12

explain the difference between an access control list (ACL) that is used in routers to block traffic and firewalls.  What similarities do they share? 250 words

software engineering report

its a group assignment about dorm management system

1 need 1 page report only due in less than 15 hrs about analysis of similar systems weaknesses , strengths, problems) for https://popartdorms.com/en/ , https://www.ciu.edu.tr/dormitories,https://www.emu.edu.tr/dormitories)

paper

 

Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?

Your paper should meet the following requirements:

• Be approximately four to six pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Analytics

Part1) 

   a) Why are the original/raw data not readily usable by analytics tasks? What are the main data preprocessing steps? List and explain their importance in analytics. 

   225 Words + 2 References

Part2) 

   a) How do you describe the importance of data in analyt- ics? Can we think of analytics without data? Explain.

   b) Considering the new and broad definition of business analytics, what are the main inputs and outputs to the analytics continuum?

   c) Where do the data for business analytics come from? What are the sources and the nature of those incoming data?

   d) What are the most common metrics that make for analytics-ready data?

   Min 200 words answer for each question.

Checklist:

APA Formatting

Part1 and Part2 needs to attached as two separate docs

Atleast 2 references for each part

Plagiarism report

practical report

  

(CWK2) – Practical Report: It contains 2 tasks: 1) Implementation (coding), 2) Presentation/demo

Module Learning Outcomes are assessed in in the research report, practical report and demo: 

  

LEARNING OUTCOME

ASSESSMENT   STRATEGY

 

Critically analyse   architectural styles of software systems and evaluate the role of software   architecture in the design and evolution of software.

Submission of research report.   To include in-depth background analysis.

 

Apply the   principles of software architecture construction particularly using component   and service oriented programming.

Submission of research report.   To include detailed analysis of component oriented architecture against other   architectural styles.

 

Evaluate the   benefits of software architectures and their corresponding programming   paradigms in terms of software quality factors such reusability, maintenance,   extendibility. 

Submission of the research   report. To cover the benefits of component software architectures in term of   software quality factors.

 

Critically discuss legal, social and   ethical issues associated with software construction.

Submission of the research   report. To cover the ethical, social and professional issues.

 

Apply technical proficiency in component   and service oriented analysis and design

The analysis and design part of   the practical report.

 

Evaluate the strengths and weaknesses of   service oriented and component technologies. 

Service and component   technologies evaluation part of the practical report.

 

Build a complex business application that   satisfies an architectural design using a service oriented component   technology.

The implementation part of the   practical report and the demonstration/presentation (practical exam).

CWK2: One zipped file named surnames_CWK2_Practical_Report which contains the code, presentation/demo, associated with CWK2, and README file containing the name of the student and their specific contributions, and any specific instructions for installation/configuration/ that might be needed.

Submission details: The second part of the coursework should be submitted as a single zipped file to canvas, and it should contain the code and the presentation.

Module Learning Outcomes assessed in this piece of coursework

· Build a complex business application that satisfies an architectural design using a service oriented component technology.

· Evaluate the strengths and weaknesses of service oriented and component technologies. 

1. Assignment Brief: Analysing and Building a Banking System Software Using Component and Service Oriented Cloud Architecture (Part 2).

Aim

The aim of the second part of the coursework is to demonstrate the knowledge and awareness of service oriented and other latest software development technologies in a given scenario. This should involve the following:

1. Apply technical proficiency in component, service and modular programming.

2. Implementation the demo system using a service oriented architecture and frameworks of your choice.

3. Produce a presentation/demonstration to discuss the used technologies and show a working prototype.

The Problem

In order to remain competitive and be able to expand its business ABC Banking Group must update its services to reflect the recent advances in information and communication technology. This will require the design and implementation of an adaptable technology migration strategy. Currently, ABC Banking Group system is a LAN based, able to be reached over the web using legacy software. Thus, the Group needs a migration strategy from a LAN based system to Cloud based system, however such a migration requires the consideration not only of the underlying Cloud service oriented architecture, and its benefits, but also should reflect the main business activities of the Group. 

At the core of the Group’s business activities is its transaction processing system. The system is used to define accounts and transactions. Accounts refer to things like customers’ bank accounts, while transactions are things like deposits and withdrawals which are essentially time-stamped records. Each account keeps track of the transactions that affect it. It also has a set of attributes such as customer’s name, address, balance, overdraft, running totals (of deposits and withdrawals) computed from the transactions etc.

Once an account is set up, it is used by creating transactions and by querying the attributes of the account. Transactions can come from other systems, like direct debits, or from different branches and they can be created by program control or can be created by a user filling out an input screen. Customers can access their account and conduct transactions using their desktops, mobile phones etc.

Your task is to design new service based architecture of the system. It is up to you how to go along the task. However, you have to take into account the distributed nature of the problem and the possibility of accessing account details, on the server, using different clients and different graphical user interfaces. These interfaces are programmed so that they communicate with the server. 

You define how an account handles transactions that are posted to it, one way of handling transactions, is by putting them in a list in order of their date. Queries can be from a simple interface, from reports such as bank statements or from programs that are creating transactions. All interactions with the system are achieved by creating transactions and querying attributes.

The system should be able to perform a number of operations including creating account for every customer, holding the customer’s name and address, allocating a numeric code (account number) for every customer, balance, cost for overdrafts, returning the statements etc. The system also should be able to add, delete customers and work out the total number of customers. 

Coursework Documentation/Report

You are asked to address the aims and business requirements by producing a practical report which covers:

Implementation (80%)

You are asked to implement and construct your application using a programming language and programming environment that supports component/service oriented paradigm.

Presentation/demo (20%)

This should include a brief discussion of of the deployed technologies  and a working prototype of your program which should demonstrate good knowledge of fundamental service/component oriented and modular concepts.

2. Feedback (including details of how and where feedback will be provided)

You will receive the feedback electronically using the feedback form (check the summary table for deadlines)

Marking scheme

Implementation: Coding Fundamentals ( /30)

  

**

VG

G

F

P

VP

 

Use of   OO Concepts

 

Use of   classes

 

Use of   method invocation

 

Use of   storage

 

Use of   interaction and selection

 

Variables/Header   box/Comments/

Implementation: Services/Components Integration ( /50)

  

**

VG

G

F

P

VP

 

Functionality   

 

Completeness   

 

Use of service orientation

 

Use of Components

 

Use of   Interfaces

Presentation/demo ( /20)

  

**

VG

G

F

P

VP

 

Quality

 

Presentation

 

Technology

 

Traceability:   from design to code

             

Overall mark  ( /100)

** VG: Very Good, G: Good, F: Fair, P: Poor, VP: Very Poor

Assignment

 

create a portfolio related to a specific topic from the list below. Make sure to explain and backup your responses with facts and examples.

  • A case study assessing risk and proposing security for some chosen organization (real).
  • Review of a security incident or threat, describing it in-depth and proposing a controls for future use
  • Technology review, reviewing some security product or control technology
  • Survey of technology, theory, or practice building on and expanding some topic covered

This assignment should be in APA format and have to include at least two references (Only peer reviewed articles/Technical white papers).  Minimum of 1000 words