1)  Describe in 500 words discuss the scope of a cloud computing audit for your business.

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.

2)  In 500 words or more, compare DNS failover and cloud failover. 

Use at least three sources. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.

3)  Define several forms of metadata that can be useful to an investigation. How are valuable to an investigator? 

 

Instructions

Choose two countries (excluding the United States), and prepare a presentation that explains their basic Internet infrastructure. Discuss the origins and key technologies behind the Internet for your chosen countries. Include their public and commercial infrastructures and their backbone connectivity to the Internet. Create a graphic illustrating a common or best practices Internet infrastructure, and utilize it in your presentation.

You must elaborate on the information provided on each slide. To do so, you can either utilize the speaker notes function within PowerPoint to summarize and/or explain the slides contents, or you can record voice narration for each slide. You are not required to do both, but you must choose one of the two options above to receive full credit.

Your PowerPoint presentation must contain eight to 10 slides; the title and reference slides do not count toward meeting the minimum slide requirement.

Below, you will find helpful resources created by the CSU Writing Center on developing APA-style PowerPoint presentations. If you need additional help, contact the CSU Writing Center.

 

One important aspect of data science is reframing business challenges as analytics challenges. Understanding this concept is necessary for understanding the application of the data analytics lifecycle.

Review this week’s required reading. Construct an essay that incorporates the following information:

a. Briefly describe an industry that is of interest to you

b. Using your chosen industry as an example, describe a business challenge

c. Describe how the business challenge you described can be reframed as an analytics challenge

Specifications:

  • Minimum word length: 550
  • Minimum documented sources: 2
  • Essay formatted per APA specifications including both in-text and final references

 In no less than 300 words, describe a hacking tool that is used to gain access to a network.  Explain how the tool is used, how it works and how a netwoprk administrator can prevent this tool from access the network.

including references.

No Copy paste please. 

 

  • 10.1 What are three broad mechanisms that malware can use to propagate?
  • 10.2 What are four broad categories of payloads that malware may carry?
  • 10.3 What are typical phases of operation of a virus or worm?
  • 10.4 What mechanisms can a virus use to conceal itself?
  • 10.5 What is the difference between machine-executable and macro viruses?
  • 10.6 What means can a worm use to access remote systems to propagate?
  • 10.7 What is a drive-by-download and how does it differ from a worm?
  • 10.8 What is a logic bomb?
  • 10.9 Differentiate among the following: a backdoor, a bot, a keylogger, spyware, and a rootkit? Can they all be present in the same malware?
  • 10.10 List some of the different levels in a system that a rootkit may use.
  • 10.11 Describe some malware countermeasure elements.
  • 10.12 List three places malware mitigation mechanisms may be located.
  • 10.13 Briefly describe the four generations of antivirus software.
  • 10.14 How does behavior-blocking software work?
  • 10.15 What is a distributed denial-of-service system?

including references.

No copy paste please.

In 350 words

Some common biometric techniques include:

  1. Fingerprint recognition
  2. Signature dynamics
  3. Iris scanning
  4. Retina scanning
  5. Voice prints
  6. Face recognition

Select one of these biometric techniques and explain the benefits and the  vulnerabilities associated with that method in 3-4 paragraphs.

Including References.

No copy paste please.

in 300 words

Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a persons eye and stores that image in a database. Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not? 

including references. No copy paste please.

 Grading Rubric for Assignment #1

  • Comprehension of Assignment (Addressed the question completely and thoroughly): 40 percent
  • Clearly presents well-reasoned ideas and concepts: 40 percent
  • Mechanics, punctuation, sentence structure, spelling, APA reference formatting: 20 percent

Question

      Using search engines and find two different recent articles involving data mining. Describe the role of “data mining” in the story using and why the data mining is important your own words (at least 200 words for each URL).  Be sure to cite your sources.

Here is an example of an article:

12:00 AM, January 07, 2018 / LAST MODIFIED: 12:00 AM, January 07, 2018

– Social media users to face stringent watch; police can detect users quickly ~~~~

Link- (This is just an recent example. We need to provide other two recent articles involving data mining)

 

 

Write an essay of at least 500 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context. 

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations). Write in essay format not in bulleted, numbered or other list format. 

It is important that you use your own words, that you cite your sources, that you comply with the instructions regarding length of your submission Do not use spinbot or other word replacement software. It usually results in nonsense and is not a good way to learn anything. I will not spend a lot of my time trying to decipher nonsense. Proof read your work or have it edited. Find something interesting and/or relevant to your work to write about.  Please do not submit attachments unless requested.

locate any company privacy policy. Some of the more popular ones might include GOOGLE, APPLE, or MICROSOFT, but you may elect to review another agency. In 3- 4 paragraphs, explain what you find to be the most interesting information contained in that privacy policy. At the end of your report, please include a LINK to the policy you have reviewed.