Category: Information Systems

Physical security

Hi 

Please write one page on this.

Discuss the importance of internal and external security lighting at datacenter facilities.  Provide a synopsis of at least one scholarly peer-reviewed article focusing on security lighting.

(Reminder: All citations must be in APA format.)

Thanks

Writing assignments

Exercise 3

You work as a forensic investigator. A recent inquiry from a local company called TriGo has caught your attention. On a routine file audit of their servers, TriGo has found some files that appear to be corrupt because each file uses the .xde extension. When TriGo personnel try to access the files, they show as garbage. Search the Internet for this file extension and summarize your findings.

Write a one-page report detailing your results. Include at least one tool or best practice you would recommend to this client.

Case Study 1: Forensic Tool Selection

Your supervisor has asked you to research current forensic acquisition tools and to compile a list of recommended tools for the new forensics lab. Using the Internet and the tools listed in Chapter 3 as a guideline, create the following:  

1. Create an Excel spreadsheet or an open-source equivalent that specifies vendor name, name of acquisition tool, raw format, validation methods, and overall description of tool. 

2. Create a report to accompany the spreadsheetthat recommends two tools based on your research. Justify your answer.

3. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formattingrequirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Identify the computer forensics investigation process

. Outline system forensics issues, laws, and skills.

Use technology and information resources to research advanced issues in computer forensics.

Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions.

Case Study 2: POS Attacks

Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry.

Read the article titled, If you shopped at these 16 stores in the last year, your data might have been stolen located at Choose 2 stores from the list and research the specific attack or breach.

Write a paper in which you:

1. Summarize the attacks, providing details on the effects of the breach. 

2. Identify the common purpose of attacks on point-of-sale (POS) systems.

3. Assess why and how these POS systems have become a prime target for hacking groups.

4. Examine the forensics challenges that exist for investigations on POS systems.

5. Use at least two (2) quality resources in this assignment other than the article linked above. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date.

The specific course learning outcomes associated with this assignment are:

Outline system forensics issues, laws, and skills. Describe and analyze practices in obtaining digital evidence.

Use technology and information resources to research advanced issues in computer forensics. Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions.

Case Study 3: Apple Vs the FBI

Read the article titled, The Secret History of the FBIs Battle Against Apple Reveals the Bureaus Mistake located athttp://fortune.com/2018/03/27/fbi-apple-iphone-encryption-san-bernardino/

Write a report in which you discuss:

1. Based on this article or other topic research, explain whether you agree with the FBI or you agree with Apple. Justify your stance with supporting information. 

2. Describe a possible compromise to the solution for future cases that would allow the investigation to continue. 

3. Take a position on whether you believe technology is moving too fast for the judicial system. Suggest at least two improvements that the courts can make in order to catch up and / or keep up with the advancements in technology issues and crimes.

4. Use at least two quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. 

The specific course learning outcomes associated with this assignment are:

Outline system forensics issues, laws, and skills.

Compare and contrast the various types of computer forensic tools

. Use technology and information resources to research advanced issues in computer forensics.

Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions.

Assignment 1: Email Harassment

Suppose you are an internal investigator for a large software development company. The Human Resources Department has requested you investigate the accusations that one employee has been harassing another over both the corporateExchange email system and Internet-based Google Gmail email.

Prepare a report in you:

1. Create an outline of the steps you would take in examining the email accusations that have been identified.

2. Describe the information that can be discovered in email headers and determine how this information could potentially be used as evidence in the investigation.

3. Analyze differences between forensic analysis on the corporate Exchange system and the Internet-based Google Gmail email system. Use this analysis to determine the challenges that exist for an investigator when analyzing email sent from an Internet-based email system outside of the corporate network.

4. Select one (1) software-based forensic tool for email analysis that you would utilize in this investigation. Describe its use, features, and how it would assist in this scenario.

5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date.

Term Paper: Digital Forensic Cases

You have been asked to conduct research on a past forensic case to analyze how digital data was used to solve the case. Choose one of the following digital forensic cases: 

S. v. Doe (1983), Doe U.S. (1988), People Sanchez (1994),  Michelle Theer (2000), Scott Tyree (2002), Dennis Rader (2005), Corey Beantee Melton (2005), James Kent (2007), Brad Cooper (2008)

Using the Stayer Library or the Internet, search for the case notes and reports for the case and answer the following:

1. Summarize the case, the pertinent actors, evidence, and facts. 

2. Outline the specific digital evidence that was used in the case.

3. Describe how the investigators found and documented the evidence, if any.

4. Describe the procedures and tool(s) used for acquiring potential evidence. 

5. Describe the obstacles faced in the investigation.

6. Outline the most significant improvement to digital forensic investigations/tools that assisted with efficiency and reliability. 

7. Provide the links to two modern tools that could have assisted with the collection of evidence. 

8. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. 

3-2 Essay: Rule-Based Classifiers vs. Decision Tree Models

Topic:  Rule-Based Classifiers vs. Decision Tree Models

Overview:  The purpose of this assignment is to determine which method is more appropriate in certain scenarios for building classification models relative to data mining practices.

Classification is a pervasive data mining problem which has many applications, such as medical analysis, fraud detection, and network security. Various types of classification approaches have been proposed to address research problems. Classification is generally divided into two steps. First, construct a classification model based on the training dataset. Second, use the model to predict new instances for which the class labels are unknown. Hence, classification divides data samples into target classes. The classification technique predicts the target class for each data point. For example in the medical industry, patients can be classified as high risk or low risk patient based on their disease pattern using data classification approach. It is a supervised learning approach having known class categories.

  • Compare and contrast Rule-Based Classifiers vs. Decision Tree Models. For example, a training dataset is not required with rule-based classifiers, but this method is difficult to work with due to all the rules that must be listed.
  • In what situations is it better to use Rule-Based Classifiers rather than a Decision Tree model? Are they mutually exclusive techniques?
  • Please provide a real-world example to support your inferences.

Please ensure you refer to the rubric for specific details on the requirements for this assignment!

Assignment 1 CIS 558

Assignment 1: ERM Roadmap

The following material may be useful for the completion of this assignment. You may refer to the documents titled Embracing Enterprise Risk Management: Practical Approaches for Getting Started and Developing Key Risk Indicators to Strengthen Enterprise Risk Management, located at .

Imagine you are an Information Technology Manager employed by a business that needs you to develop a plan for an effective Enterprise Risk Management (ERM) program. In the past, ERM has not been a priority for the organization. Failed corporate security audits, data breaches, and recent news stories have convinced the Board of Directors that they must address these weaknesses. As a result, the CEO has tasked you to create a brief overview of ERM and provide recommendations for establishing an effective ERM program that will be used as a basis to address this area moving forward.

Write a three to four (3-4) page paper in which you:

  1. Summarize the COSO Risk Management Framework and COSOs ERM process.
  2. Recommend to management the approach that they need to take to implement an effective ERM program. Include the issues and organizational impact they might encounter if they do not implement an effective ERM program.
  3. Analyze the methods for establishing key risk indicators (KRIs).
  4. Suggest the approach that the organization needs to take in order to link the KRIs with the organizations strategic initiatives.
  5. Use at least three (3) quality resources in this assignment (in addition to and that support the documents from the COSO Website referenced in this assignment). Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Very URGENT , Physical Security assignment. Very Strict Professor

 

For this assignment, you will research and expound on the following questions as they relate to physical security?

  • What is risk management?
  • What is Vulnerability assessment?
  • What is the difference between security and safety?
  • What is the relationship between risk management and vulnerability assessment?

Assignment Requirements

  • You must write a minimum of two paragraphs on each question
  • Each paragraph should have a different in-text citation throughout the assignment (Do not duplicate)
  • Every paragraph should have at least four complete sentences (This is the minimum)
  • Every question should have a sub-header (Bold and Centered)
  • Every paragraph must be indented
  • Do not continuously cite at the end of each paragraph. 
  • You are required to write and cite according to APA 6th Edition format. 
  • Your SafeAssign Score needs to be no more than 30%. 
  • Please ensure that you use the Individual Project Header for this and every Individual Project (IP) assignment 
  • Please proofread your work and correct all grammatical, punctuation, and spelling errors before posting your assignment
  • The use of contractions and personal pronouns is prohibited
  • You should NEVER use a conjunction to start a sentence
  • All citations must be from credible sources
  •  Failure to comply with these requirements will result in a low or zero grade.

Enterprise Risk Management Week 2

Part I: Discussion

From a broad perspective, illustrate the four elements of Risk Management that were used by the LEGO Group. As with all methods and tools, there are strengths and weaknesses. Identify a strength and a weakness of the four elements of Risk Management.

Part II: Assignment

You have now had the opportunity to look at the pros and cons of the four elements of Risk Management that were illustrated by the LEGO Group. For this assignment, you are to take the four elements, apply them to a different company, whether real or theoretical, and identify whether they are for damage control or they are proactive. Justify why you have identified them as damage control or proactive.

SEPARATE REFERENCES FOR BOTH PARTS!!!

SEPARATE REFERENCES FOR BOTH PARTS!!!

SEPARATE REFERENCES FOR BOTH PARTS!!!

Enterprise Risk Management

strategic risk management with the LEGO Group. What exactly is strategic risk management? What are some examples of strategic risk? How can we measure and manage strategic risk? Are there a framework which an organization can use to navigate strategic risk management? Give specific examples of how other organizations implemented strategic risk management within their organizations and if it was successful or not. 

Data Visualization

  

CONTEXTUAL THINKING ABOUT DIFFERENT SCENARIOS

This exercise involves you using imagination and logical reasoning to occupy the mindset of a visualiser facing the task of formulating a brief for different scenarios. Imagine you are given the challenge of creating a visualisation/infographic in each of the following made-up scenarios relating to the subject of Oil Spills

Scenario A: A broadsheet newspaper reporting on the regions and communities affected by oil spills

Scenario B: Analysts at the International Tanker Owners Pollution Federation (ITOPF) providing business intelligence reporting to support operational colleagues

Scenario C: Presentation to shareholders of BP (British Petroleum) demonstrating the reduction in spill-related losses

Website reference:

Compile a document outlining your assumptions, definitions and ideas about the context and vision for each of the scenarios presented above. Get into the mindset of the potential creators and audiences. If you were them what do you think you might be faced with in terms of requirements, constraints, needs and possibilities? 

(Context) CURIOSITY: Outline what you think might be the essence of the trigger curiosity behind each scenario?

(Context) CIRCUMSTANCES: Work through the list shared in the book of the main circumstantial headings and list or describe your creative and critical judgment about the inevitable, assumed, or self-defined factors you think might be relevant or existent in each scenario. Consider the reasons behind your judgments

(Context) PURPOSE: How might you describe or articulate what you imagine the purpose of the work associated with each scenario would be: how might success, impact or effectiveness be expressed and measured? What is the right kind of experience and tone of voice that would reflect the best fit creative direction (could be a singular location or a journey across the dimensions of the map).

(Vision) IDEAS: Sketch out your instinctive ideas about what you think the visual work for each scenario looks like in your minds eye: what colours, forms, keywords, layouts, thoughts come to mind when you think about the subject at hand? What other work can you find through research or past experience that may offer inspiration, influence or reference for your thinking?

There is no need to do any data extraction or analysis, just use your imagination for what data could exist and could be available. There is no perfect answer, no right and no wrong: it is about using a degree of practical imagination and empathy (your ability to occupy the mindset of others). You will need to make many assumptions and take the initiative to define things yourself.

assignment

Write an essay on the following video, Link is below:

Title: Introduction to Basic Cryptography: Hashing

In this essay, you will provide a real-world example of how cryptography/hashing can be used in order to secure data transmission across a network. Provide a scenario and explain how data is secured using the plaintext and ciphertext process that was discussed last week.. In addition to the video, choose one other scholarly reference to support your discussion.

Requirements:

  • Submit in a Word document.
  • Include cover page
  • Must be a minimum of two pages (excluding references and cover page)
  • Appropriate APA format is required.
  • Properly cite and reference any borrowed resource(s)

2-3 Page paper — Must follow directions mentioned in the question

**** Need it by 01/25/2020 7 PM EST****

APA Format NEEDED

In-text Citations

NO PLAGIARISM

SUBJECT: Information Security & Risk Management

Be sure to read and/or listen to the Project Overview (attached) BEFORE doing the assignment.

Using your reading in Chapter 4 (attached) as a guide and the threats that were listed in the Project Overview, 

write a 2 – 3 page paper that addresses the Threats and Vulnerabilities that a health insurance company may encounter. 

Note that you may have to look at what health insurance companies encounter and apply those to the scenario. 

Also, address any compliance issues that the company may encounter. 

Keep in mind that they are in the middle of a merge and what unexpected things may appear.

Use APA format

No executive summary or abstract is needed at this point

Cite your sources