Prepare a list of what items should be included in an initial-response field kit to ensure the preservation of computer evidence when the warrant is carried out

 As a computer investigator for your local sheriff’s department, you have been asked to go with a detective to a local school that received a bomb threat in an anonymous email. The detective already has information from a subpoena sent to the last known ISP where the anonymous email originated, and the message was sent from a residence in the school’s neighborhood. The detective tells you the school principal also stated that the school’s Web server has been defaced by an unknown computer attacker. The detective has just obtained a warrant for the search and seizure of a computer at the residence the ISP identified. Prepare a list of what items should be included in an initial-response field kit to ensure the preservation of computer evidence when the warrant is carried out.  

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Business_Intelligence_week5

Discussion

 Carefully review and use either of the book options below as a reference for various aspects of analytics.

  • Sharda, R., Delen, D., & Turban, E. (2015) Business intelligence and analytics: Systems for decision support (10th ed.). Boston: Pearson. Print: ISBN-13: 978-0-13-305090-5
  • Sharda, R., Delen, D., & Turban, E. (2020) Analytics, data science, & artificial intelligence: Systems for decision support (11th ed.). Boston: Pearson. Print: ISBN-13: 978-0-13-519201-6
  • Important Note:  All students are welcome to use outside research in aspects of analytics.

After reading and analyzing content from book references and or from outside research, select “one” of the research options below and respond.

  • Go to www.IBM.com and find at least three customer case studies on Big Data and write a report where you discuss the commonalities and differences of these cases.
  • Go to www.cloudera.com and find at least three customer case studies on Hadoop implementation, and write a report where you discuss the commonalities and differences of these cases.
  • Go to www.google.com/scholar, and search for articles on stream analytics. Find at least three related articles. Read and summarize your findings.
  • Go to www.google.com/scholar, and search for articles on data stream mining. Find at least three related articles. Read and summarize your findings.
  • Go to www.google.com/scholar, and search for articles that talk about Big Data versus data warehousing. Find at least five articles. Read and summarize your findings.

Discussion Expectations

Please make sure to proofread your post prior to submission. They should be well written and free of grammatical or typographical errors.

Knowledge and skills paper:

 

Graded Assignment:  Knowledge and Skills Paper

Paper Section 1: Reflection and Literature Review

Using Microsoft Word and Professional APA format, prepare a professional written paper supported with three sources of research that details what you have learned from chapters 7, 8, 9, and 10.  This section of the paper should be a minimum of two pages. 

Paper Section 2:  Applied Learning Exercises

In this section of the professional paper, apply what you have learned from chapters 7, 8, 9, and 10 to descriptively address and answer the problems below.  Important Note:  Dot not type the actual written problems within the paper itself.

  1. Survey and compare and possibly test some text mining tools and vendors. Start with clearforest.com and megaputer.com. Also consult with dmreview.com to further identify some text mining products to explore and even test?
  2. Survey and compare and possibly test some Web mining tools and vendors. Identify some Web mining products and service providers that could potentially be useful in a work environment you may want to be part of.
  3. Investigate via a Web search how models and their solutions are used by the U.S. Department of Homeland Security in the “war against terrorism.” Also investigate how other governments or government agencies are using models in their missions.
  4. Search online to find vendors of genetic algorithms and investigate the business applications of their products and even possibly test them where applicable. What kinds of applications are most prevalent and why?
  5. Important Note:  With limited time for a college class, perfection is not expected but effort to be exposed to various tools with attempts to learn about them is critical when considering a career in information technology associated disciplines.

Important Note:  There is no specific page requirement for this section of the paper but make sure any content provided fully addresses each problem.

Paper Section 3:  Conclusions

After addressing the problems, conclude your paper with details on how you will use this knowledge and skills to support your professional and or academic goals. This section of the paper should be around one page including a custom and original process flow or flow diagram to visually represent how you will apply this knowledge going forward.  This customized and original flow process flow or flow diagram can be created using the “Smart Art” tools in Microsoft Word.

Paper Section 4:  APA Reference Page

The three or more sources of research used to support this overall paper should be included in proper APA format in the final section of the paper.

Paper Review and Preparation to submit for Grading

Please make sure to proof read your post prior to submission. This professional paper should be well written and free of grammatical or typographical errors. Also remember not to plagiarize!!!!!!!!!!!!

Important Reminder:  Assessment of discussion boards and other writing assignments account for 75% of overall grading and below are how grades will be assessed for this assignment:

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Internet of things Article – Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things:

 For this assignment, review the article:

Abomhara, M., & Koien, G.M. (2015). Cyber security and the internet of things: Vulnerabilities, threats, intruders, and attacks. Journal of Cyber Security, 4, 65-88. Doi: 10.13052/jcsm2245-1439.414

and evaluate it in 2 to 3 pages (600 words), using your own words, by addressing the following:

  • What did the authors investigate, and in general how did they do so?
  • Identify the hypothesis or question being tested
  • Summarize the overall article.
  • Identify the conclusions of the authors
  • Indicate whether or not you think the data support their conclusions/hypothesis
  • Consider alternative explanations for the results
  • Provide any additional comments pertaining to other approaches to testing their hypothesis (logical follow-up studies to build on, confirm or refute the conclusions)
  • The relevance or importance of the study
  • The appropriateness of the experimental design

When you write your evaluation, be brief and concise, this is not meant to be an essay but an objective evaluation that one can read very easily and quickly. Also, you should include a complete reference (title, authors, journal, issue, pages) you turn in your evaluation. This is good practice for your literature review, which you’ll be completing during the dissertation process.

Your paper should meet the following requirements:

  • Be approximately three pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Signature Assignment: Backup Policies

Securing company data is not as simple as backing up to another hard drive. It is important to have backup tools, processes, and policies for both business continuity and disaster recovery plans.  

In the final section of your Playbook, create a 3- to 4-page outline of backup policies for when the data center is inaccessible.  

Complete the following in your outline: 

  • List the tools used for backup purposes. 
  • Explain the following: 
  • Where employees should work from that day 
  • How employees can get to their data 
  • The communication methods about updates 
  • Outline step-by-step instructions to recover your databases and telecommunications. 
  • Provide a step-by-step guide to recover and provide any additional company assets. 
  • Discuss policies for backup media storage. 
  • Discuss policies for encryption of backup data. 

Note: Numbered or bulleted steps or guidelines make the document easy to for others to follow under potentially stressful situations. Paragraphs can be used to help support the steps or guidelines. 

Cite at least 2 resources to support your assignment.

Format your assignment according to APA guidelines. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Rewrite the programming example in chapter 4. (Cable company BILLING.)

1. Write a pseudo code before starting your program (you may not use SWITCH, replace it with IF structures)

1.1 Draw a flow chart for your program based on your pseudo code 
2. Identify your constants
3. Your input will come from the text file of a least 15 customers
3.1 Input file format – customerType accountNumber premiumChannels
 (I.e residential example: R12345 5, business example B12345 16 8)
 residential customers 
RaccountNumber numOfPremChannels
 
Business customers
BaccountNumber numOfBasicServConn numOfpremChannels
4. Precision should be two decimal places
5. Calculate the running average for residential and business customer spending 
6. Print all customer’s bill to a single file and the end of the file you should have the average summary for each customer type.
6.1 pay attention to details when you formatting your output

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Assignment 1: Network Infrastructure Design Diagram

 

Background: Kamehameha Institute is an organization that provides educational offerings to non-traditional students. The organization has tailored its unique educational offerings into the groups shown in Table 1 below:

Table 1. Kamehameha Educational Offerings.

GroupOfferingKamehameha BrandedFocused on the general public/provides services directly to its studentsCo-BrandedProvides the same services as Kamehameha Branded but resold by a third party and labeled as “…. Kamehameha Strong”White Label BrandedWhile the service offering is the same, these services are labeled solely with the third parties’ information

The State of Hawai’i regulates the educational sector, driving the need to ensure Kamehameha follows the State’s strict security and regulatory requirements. Kamehameha’s leadership is also very concerned with the threat posed by the online theft of their unique intellectual property. Additionally, the number of Hawai’ian entities breached by threat actors is on the rise. Thus, security, privacy, and compliance are all important considerations for the Kamehameha network architecture.

Your boss, the Kamehameha Institute’s Chief Operating Officer (COO) has tasked you to design a network infrastructure for three facilities located in the Hawaiian Islands of Honolulu, Hilo, and Lihue. The COO stipulated that you must separate the three group offerings in Table 1 and provide for strengthened defenses to protect Kamehameha’s cultural heritage. After meeting with the COO, the two of you drafted the following set of requirements for your network design:

· Each of the facilities has three floors:

· The first and second floor of each building requires 150 network connections each

· The third floor of each building houses a data center and requires 75 network connections

· The Honolulu location requires additional network connections for failover purposes

· The Hilo location will be the primary data center and house redundant database servers

· The Lihue location will serve as a failover data center and house the primary web servers (including the primary application and primary database servers)

· A constant connection between the three locations, carrying at least 75 Mbps of data

· All servers at all locations must have redundancy

· Protection from intrusions is required and should be documented

· A plan to verify security and failover measures is required

· Submission: Using the free tool, daw.io available at https://draw.io (no sign-in or registration required), create a network diagram (drawing) specific to the organization that encompasses the three facilities and also depicts ant necessary interconnections. Figure 1 shows the draw.io ‘new network diagram’ dialog window:

Figure 1. Draw.io New File Dialog Showing the Network Diagramming Templates

Your diagram should include enough detail to show the topology interconnections. The viewer should be able to understand the Kamehameha Institute’s network environment and be able to implement the architecture you develop. Ensure that you properly cite any external sources.

One of the keys to producing a viable network diagram is labeling the objects consistently and descriptively. Think about what you would want to know about a network device if you logged into it with little prior information. Consider location, floor number, or other pertinent information. At a minimum, include the following elements:

· IMPORTANT: Your network diagram must include an identifying label (e.g., callout box) that includes your class and section, assignment title, your name, and the date. Edit the items in italicsYour assignment will not be accepted if this element is missing:

Table 2. Example Network Diagram Callout Box.

CMIT 350 6980 Project #1 Network Diagram Student Name: Name Date: 6/22/2010

· Any necessary hardware

· Site-to-Site (WAN) connections (e.g., leased line connectivity, satellite, etc.)

· Annotate the following values for each of the Sites:

· Network ID

· Useable Range

· Subnet Mask

· CIDR Value

· Broadcast Address

· All devices require hostnames complying with the following naming conventions:

· Routers: Rx; where x is the site number incremented by a value of 1 for each router

· Switches: Sx; where x is the site number incremented by a value of 1 for each switch

· Servers: SRVx where x is the server number incremented by a value of 1 for each server

· For each site router, implement a private ip addressing scheme using a range suitable for corporate infrastructure and include the following:

· management vlan

· production vlan

High availability

When finished, export the diagram as a PDF document (Note: You will need to use this diagram again in Project 3, so ensure you save the xml source file!) and submit it to the Assignment folder. Figure 2 demonstrates how to export your draw.io diagram as a PDF document:

Figure 2. Draw.io ‘Export’ as Function to PDF

How Will My Work Be Evaluated?

1.1.3: Present ideas in a clear, logical order appropriate to the task.

2.2.2: Evaluate sources of information on a topic for relevance and credibility.

10.1.1: Identify the problem to be solved.

10.1.2: Gather project requirements to meet stakeholder needs.

10.1.3: Define the specifications of the required technologies.

13.1.1: Create documentation appropriate to the stakeholder.

13.2.1: Evaluate vendor recommendations in the context of organization requirements.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Excel

  • post using technologies such as Kaltura, PowerPoint, or any other tool to explain the concepts learned during the week.
  • Minimum of 1 scholarly source

Initial Post Instructions

Excel is such a powerful application and we are barely touching the surface of what it can do during this class. Even so, it can still be considered challenging for a new user. What did you learn this week? What aspects do you consider the most challenging or helpful? How do you think Excel could be used in your personal or professional life? If you already use Excel, how do you use it?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion 6- Project Risk & Quality

Chapter 8: Project Risk Analysis and Identification  Initial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  • Please research and provide a two page, referenced discussion on the logic of identifying and eliminating risk for a project and be sure to include an explanation on how an organization comes to conclusions as to how much revenue and time to commit to this process.

Text

Title: Managing Project Risks 

ISBN: 9781119489733 

Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards 

Publisher: John Wiley & Sons 

Publication Date: 2019-08-13

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Need help with Discussion board.

  1. Is a cyberattack ever morally justified in response to an enemy conventional attack?
  2. Is a cyberattack ever morally justified in response to an enemy cyberattack?
  3. Is a conventional attack ever morally justified by an enemy cyberattack?
  4. Is a cyberattack ever morally justified in cases where the enemy has launched neither a cyberattack nor a conventional attack? (With United Nations sanction, preemptively, preventively, or for some other reason.)
  5. Once a war (cyber- or conventional) has begun what kinds of cyberattacks are morally justified?

Pick two of the questions above and provide a one- or two-paragraph response to each. It is okay to provide your philosophies and beliefs regarding the question, but use evidence or scholarly support to enhance the justification and defense of your response. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Reply to discussion board.

 Requirement for discussion board: 

Response and respond to at least one other post, offering one or two paragraphs of additional insight and details. This could be additional support for their point of view, or it could be arguing a counterpoint. 

Discussion Board of other student is below:

# – Is a cyberattack ever morally justified in response to an enemy conventional attack?

For the discussion topic on ethical considerations for cyber operations, I chose to answer questions 1 and 5.  According to Dipert (2010), cyber warfare and conventional warfare share commonality based on the uncertainty of the outcome of an attack, as well as any side effects that may occur as a result (p 385).  He also believes that the evidence you have to justify an attack should be weighed against the moral conditions for going to war in the first place (p 400).  Therefore, I believe a cyber-attack is morally justified in response to a conventional attack, especially if the war outcome is devasting and the cyber-attack is used prevent further destruction from happening.  My reason is based on Dipert’s (2010) description of cyber tactics in warfare using an electromagnetic force to disrupt a target’s radio communications, machinery, and infrastructure (p 397).  In conventional warfare the attacker is probably already known, and the evidence needed to justify deploying a cyber-attack is likely valid.  My decision to deploy a cyber-attack would be based on what might happen as a result of not stopping the attack.

# – Once a war (cyber- or conventional) has begun what kinds of cyberattacks are morally justified?

Dipert (2010) says that we should think about proportionality and likelihood of success when considering to what extent a cyber-attack is morally justified once a war has begun (p 392).  Based on this theory, proportionality means that however you decide to respond to a conflict, your response should be less harsh than what was inflicted on you (Pope, p 29).  Therefore, under the proportionality criteria the saying ‘eye for an eye’ may not be justified in response to war because it would suggest that I am trying to enforce equal treatment on target solely in retaliation.  I understand why proportionality should be considered in this case because, if not, it could lead to unnecessary casualties and economies being without resources, like food, housing, and utilities for a long period of time.  However, once the war has begun, the kinds of cyber-attacks that could be deployed morally would really depends on the severity or likelihood that the situation will only get worse if nothing is done to stop it.  For instance, I think dismantling electronic devices to prevent communication and machinery to keep it from functioning as it normally would, would be a morally justified cyber-attack.  I would consider taking down any resources that keep an enemy in power.  While I would also be concerned with noncombatant immunity and ensuring that innocent people do not endure inhumane conditions (Pope, 15), I would likely be less concerned with noncombatant immunity of a target if no other options existed for a cyber-attack to be morally justified. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now