Week 9 Discussion – The Importance of Reports
To successfully complete this discussion, you will need to use the Strayer University Library and/or the Internet to research strategies and tools to assist with forensic analysis documentation.
You will need to cite at least two quality, academic and/or professional resources, written within the past five years, in your post. Your textbook may be one of your resources. Wikipedia and personal blogs do not qualify as quality resources.
Please respond to the following in a post of at least 200 words:
Explain in your own words the importance of documentation in forensic analysis.
Identify what you consider to be the most difficult aspect of writing a system forensics report.
Be sure to provide the rationale for your selection.
Evaluate whether software-generated reports can assist with the aspect of report writing you find most difficult.
Be sure to provide the rationale behind your answer.
Provide your classmates with a link to a website or online resource that could assist with forensic analysis documentation.
Provide full citations and references, formatted according to Strayer Writing Standards, in your post.
The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.
Category: Internet technology (IT)
-
The Importance of Reports in Forensic Analysis Documentation plays a crucial role in forensic analysis as it provides a detailed record of the investigation process and findings. It serves as a vital tool for communication between forensic analysts, legal professionals, and other stakeholders involved
-
Title: Ethical Guidelines for System Forensics Company Employees As a director for a system forensics company, it is important to establish and enforce ethical guidelines for employees to ensure the integrity and professionalism of the company. These guidelines should be
Week 10 Discussion – Ethical Dilemmas
To successfully complete this discussion, you will need to use the Strayer University Library and/or the Internet to research ethical standards governing system forensics companies.
You will need to cite at least two quality, academic and/or professional resources, written within the past five years, in your post. Your textbook may be one of your resources. Industry-related professional organizations will be good sources of information on ethical standards. Wikipedia and personal blogs do not qualify as quality resources.
For the purpose of this discussion, assume you are a director for a system forensics company.
Please respond to the following in a post of at least 200 words:
Develop a list of ethical guidelines you would publish for your employees based on the research you have conducted.
Justify why the items in your ethical guidelines need to be included in the company’s ethics code.
Provide full citations and references, formatted according to Strayer Writing Standards, in your post.
The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions. -
Title: Step-by-Step Guide: Using Screenburst PowerShell and Python Page 1: Step 1: Introduction Welcome to the Step-by-Step Guide for using Screenburst PowerShell and Python. In this guide, we will walk you
In a new document, answer the questions throughout this exercise.
Based upon your Screenburst PowerShell and Screenburst Python output, create a 10-page step-by-step instruction guide using the Step-By-Step Template. You should include 3 screenshots per page and your instructions should be suitable for anyone to complete the tasks in this assignment. -
Virtualization and Cloud Computing: Enhancing Business Strategy for Packages Plus Delivery “Exploring the Benefits and Constraints of Virtualization and Cloud Computing Environments”
Scenario
The company you work for, Packages Plus Delivery (PPD), currently houses its physical computing environments on site. Packages Plus Delivery is growing, including the number of packages delivered and the number of employees hired each quarter. As a result of this growth and to better meet the needs of the clients, organizational leadership recently made the decision to virtualize all computing environments.
Leadership is deciding between internal virtualization and the use of an external vendor. They are also considering a move to cloud-based architecture but want to know more about the risks and cost benefits of moving to a cloud environment.
As a virtual solutions analyst at Packages Plus Delivery, you serve on a Virtualization Transition Committee. This group has been asked to create a presentation that emphasizes how the decision to move to virtualization will improve business strategy, and what the options are if the company considers moving the infrastructure to a cloud environment. Your presentation will ensure that leadership makes an informed decision.
Directions
You have been asked to create a presentation that supports the company’s decision to move to virtualization. Within the presentation, you will need to address each of the following topics in order to inform leadership:
Describe how the company’s decision to move to a virtual computing environment will impact its business strategy. If you use sources, be sure to provide a citation.
You must include:
The benefits of your company’s decision to move to a virtual computing environment
The constraints of the decision to move to a virtual computing environment
An explanation of how moving to virtualization will impact the scalability of the business
The costs of moving to virtualization
The hardware and software, and other technologies involved
In order to provide the most detailed information, you need to compare the implications of the organization moving to a virtual environment using its hardware servers in-house with the implications of using a third-party vendor to virtualize. You may create a visual (such as a Venn Diagram) or write a passage to explain these concepts. You will need to compare the following factors and describe the advantages, disadvantages, and risks associated with each:
Cost: equipment such as hardware and software, maintenance (i.e., upgrades and backups), licensing, security (i.e., shared responsibility, on premises)
Capacity
Agility
Service availability
As the company moves toward virtualization, you want to inform leadership of cloud-based architecture by describing the cloud service models that are available.
You must describe:
IaaS
PaaS
SaaS
For each cloud service model, you must:
Explain how it supports virtualization
Advantages for organizations
Disadvantages for organizations
Describe different types of cloud deployment models that the company can deploy.
You must include:
The benefits of each cloud deployment model
The constraints of each cloud deployment model
An explanation of how each cloud environment impacts the scalability of the business
The costs of moving to that type of deployment model
The training involved in moving to that type of deployment model
What to Submit
To complete this project, you must submit the following:
Presentation
Your presentation should be submitted on a file that your instructor can easily access (.ppt)
Your presentation must include:
The evidence that supports your company’s decision to move to virtualization
A comparison of creating a virtual environment in-house compared to using an external vendor
Information on the various cloud service models
Description of cloud deployment model options
Project One Rubric
Criteria
Exemplary (100%)
Proficient (85%)
Needs Improvement (55%)
Not Evident (0%)
Value
Benefits and Constraints of Virtualization
Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Describes the benefits and constraints of moving to a virtual computing environment Shows progress toward proficiency, but with errors or omissions; areas for improvement may include describing various benefits and constraints of moving to virtualization Does not attempt criterion
15
Scalability of Virtualization
Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Explains how scalability of moving to a virtual computing environment will impact the business Shows progress toward proficiency, but with errors or omissions; areas for improvement may include explaining the costs, and hardware and software involved Does not attempt criterion
10
In-House Vs. Third-Party Vendor
Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Compares in-house virtualization to using an external vendor Shows progress toward proficiency, but with errors or omissions; areas for improvement may include comparing costs, capacity, agility, and availability of internal and hosted virtualization Does not attempt criterion
20
Cloud Service Models
Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Describes the available cloud service models Shows progress toward proficiency, but with errors or omissions; areas for improvement may include describing multiple cloud environments Does not attempt criterion
20
Cloud Deployment Models
Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Describes the benefits and constraints of different cloud deployment models Shows progress toward proficiency, but with errors or omissions; areas for improvement may include describing various benefits and constraints of each type of cloud deployment model Does not attempt criterion
15
Scalability of Cloud Environments
Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Explains how a cloud environment impacts the scalability of a business Shows progress toward proficiency, but with errors or omissions; areas for improvement may include explaining the costs and training of deploying a cloud environment Does not attempt criterion
10
Articulation of Response
Exceeds proficiency in an exceptionally clear, insightful, sophisticated, or creative manner Clearly conveys meaning with correct grammar, sentence structure, and spelling, demonstrating an understanding of audience and purpose Shows progress toward proficiency, but with errors in grammar, sentence structure, and spelling, negatively impacting readability Submission has critical errors in grammar, sentence structure, and spelling, preventing understanding of ideas
5
Citations and Attributions
Attributes sources where applicable using citation methods with very few minor errors Attributes sources where applicable, but with consistent minor errors Attributes sources where applicable, but with major errors Does not attribute sources where applicable
5
Total:
100% -
“Building a DNS Server in Python: Exploring Domain Name Resolution and Implementation”
The work concerns the development of a dns server in python. The detailed instructions for the assignment are in the pdf I have attached. I have also attached an attached file with automated tests for the task. Along with the deliverable program, I also need a detailed explanation/description of the way the code was written, its structure and in general how it works because in addition to the delivery of the program there is also an oral examination.
-
Title: The Role of ICT in Surviving and Thriving During the Pandemic: Challenges and Opportunities for Digital Businesses
Information and Communication Technology (ICT) has become significantly important for digital businesses and has become even more imperative during the current pandemic. This is evident through the widespread use of cell phones, smart phones, emails, web conferencing, Internet, and Cloud etc. However, it is not all the good news. There are challenges as well.
You are required to write a report on the following FOUR topics:
Collaboration in workplace has significantly gained importance in recent times, especially during pandemic. Identify any TWO collaboration tools and evaluate how they have helped businesses to survive the pandemic reducing the physical contact among the participants.
Cloud computing, cloud storage and ecommerce are becoming the new normal even in industries that, before the pandemic, seemed decades away from digitalisation. Evaluate advantages, disadvantages, suitability, and applications of cloud storage and computing in improving digitalisation.
As the global pandemic upended work and home routines, cyber attackers pounced. The year 2020 holds valuable lessons for cyber security as many workers enter hybrid arrangements, with home office becoming at least a partial fixture. No matter, what post-pandemic world looks like, protecting people – wherever and however they work – will be an ongoing challenge. Identify privacy and security challenges and explore what possible measures could be taken and justify the suitable measures.
In the initial months of the beginning of conflict between the Russia and Ukraine, Russia has been trying to develop their own internet, disconnecting from the global Internet, and controlling their local network on their own. Compare and contrast private and public networks.
This assessment addresses LO1, LO2, LO3 and LO4:
LO1: Understand the key terms and considerations associated with using the internet.
LO2: Take responsibility for personal security and privacy when using the internet
LO3: Develop online research skills
LO4: Develop digital communication skills
Further points:
· It is expected that you use current peer-reviewed journals and articles to ensure that you have an in-depth understanding of your topic particularly for the Literature Review.
· There must be sufficient linkage between theory and practice.
· Harvard style of references should be used.
Formatting and Layout
Please note the following when completing your written project:
1. Writing: Written in academic English using appropriate business/ technical terminologies.
2. Focus: Focus only on the tasks set in the assignment.
3. Length: 3000 words [with +/- of 10%]
4. Document format: A standard report with tile page, abstract, table of contents, introduction, literature review, Analysis, conclusion, references.
5. Ensure a clear title, course, and ID number is on a cover/title page.
Research: Research should use reliable and relevant sources of information on the online or offline or both. At least EIGHT references must be provided. -
Title: IoT Product Proposal for the Healthcare Industry
Review the attached list of IoT product characteristics for various markets. Select a market from this list: Manufacturing, Media, Environmental Monitoring, Infrastructure Management, Energy Management, Medical and Healthcare Systems, Building and Home Automation, Transportation, or Large-scale Deployments. Provide a five to seven page paper that includes the following elements:
Introduction
Proposal of an Internet of Things product:
What is the IoT proposed product?
Provide the statement of need for the IoT product.
What else is offered similar to the proposed IoT product in the market?
How is your proposed IoT idea better or different? Identify the qualities that make the IoT product better or different than other products.
Description of your chosen market that could benefit from an IoT product:
Does the IoT product solve a problem for the market, enhance exiting processes, improve existing products, or provide a new product offering?
Identify how the IoT product supports electronic commerce, business-to-business electronic commerce, or business-to-consumer electronic commerce in the market?
Identification of both pros and cons for the proposed IoT product (see the attached “Pros and Cons of IoT” diagram).
What are the pros of the proposed IoT product?
What are the cons of the proposed IoT product?
Conclusion
Reference List
The Internet of Things (IoT) Product Proposal Paper:
Must be five to seven double-spaced pages in length (not including title and references pages) and formatted according to APA style.
Must use at least three scholarly sources.
Must document all sources in APA style.
Must include a separate references page that is formatted according to APA style.
Attachments:
Grading Rubric
IoT Product Characteristics for Various Markets
Pros and Cons of IoT diagram -
“Exploring the Art of Research: A Guide to Writing a Successful Research Essay”
Your last written assignment for this class is a 7-page to 10-page, 1,500 to 2,500-word research essay on a current issue or enduring question of your choice. You will use documented source material to support your essay’s thesis. However, this First Draft assignment requires only 5 to 10 paragraphs (or more) of text. You are not required to use sources or a Works Cited page for the First Draft.
A research essay presents and develops a thesis supporting multiple sources of opinion. You stake out a subject narrow enough to be researched and you steep yourself in it. Then you formulate a thesis — your own attitude or opinion on the subject — and present it in an analytical and/or argumentative form, along with facts, opinions, and information that prove it true. You should use appeals and other methods to support your thesis, but you should also analyze each source you plan to use to support your thesis.
The Parts of a Research Essay
There are two parts to a Research Essay:
The text (7 to 10 pages, 1,500 to 2,500 words)
The works cited page / annotated bibliography (one or more pages)
Research Essay Format
Much of the writing in your research essay comes from the work of other writers, and you must give proper credit by citing (mentioning) these sources in your paper. The art of citing is called documentation, which is required for any information falling into the following three categories:
Any judgment, opinion, speculation or theory that is not original (unless it is universally known and accepted).
Any fact or statistic open to dispute.
Any information provided by a specific observer, even by an expert in his or her field (for example, opinions of psychologists on child abuse).
Sources
For your Final Draft, you must use quote and cite passages from six to ten scholarly sources (one or more from each of the following categories) and list them on your works cited page. You may use our campus library’s Website to find and access these sources.
Google Scholar Links to an external site.is another good source of written sources.
one book;
one periodical (magazine, journal or newspaper) article;
one website;
one “multimedia” source: a film, video, DVD, photo, musical piece, etc.).
Works Cited Page
Your Annotated Bibliography will serve as the Works Cited page for this essay assignment. Your sources should be listed in alphabetical order, by the author’s last name. Your source listings for books should look like this: Author’s last name, author’s first name, title of book, name of publisher, and year of publication.
For example, if we were listing author Barbara Kingsolver’s novel, The Bean Trees:
Works Cited
Kingsolver, Barbara. The Bean Trees. HarperCollins, 1988.
(The publisher and year of publication can usually be found at the beginning of a book, before the title page.)
Your source listings for articles should look like this: Author’s last name, author’s first name, title of article, name of magazine or newspaper, date of article, article’s page numbers.
For example, if we were listing Kenneth L. Woodward’s Newsweek article, “Hail, Mary”:
Works Cited
Woodward, Kenneth L. “Hail, Mary.” Newsweek. August 25, 1997: pp. 49-55.
Quotations and Citations
You will use quotations to include information from your sources in your essay. For example, if you were quoting a Newsweek magazine article on the Virgin Mary by Kenneth L. Woodward, you could write:
Kenneth L. Woodward, in his article on the Virgin Mary, writes that “the 20th century has belonged to Mary” (Woodward 49).
Or…..
According to Kenneth L. Woodward, the 20th century has “belonged to Mary” (49).
Or…..
Kenneth L. Woodward writes: “The 20th century has belonged to Mary” (49).
You will use the MLA (Modern Languages Association) style for parenthetical documentation to list your sources on your Works Cited page, which is the last page of your essay. -
Title: Building Skills for Disaster Recovery and Cloud Maintenance through System Hardening Tasks In the labs from Weeks 1, 2, and 3, I gained valuable skills in vulnerability scanning, remote connection, RAID configuration, DNS and DNSSEC
In the labs from Weeks 1, 2, and 3, you conducted vulnerability scanning, connected remotely to a computer, and configured RAID, DNS, and DNSSEC. In addition, you disabled services, installed antivirus software, used a firewall, restored files, and used Event Viewer. These labs replicate system hardening tasks you may be asked to complete in a future career as an information security analyst.
Assessment Details
Write a 350- to 700-word summary on your experience completing these labs. Include the following in your summary:
Explain how the skills from these labs can be used to help prevent or address issues in a disaster recovery situation. Provide details about how the skills are used for hardening the IT system.
Describe the importance of conducting vulnerability testing. Provide a scenario in which this practice is used.
Explain why these tasks are important for cloud maintenance. Provide an example of when you would complete 1 specific task for cloud maintenance. -
Title: Understanding Nginx, iframe, PHP Arrays, GET and POST Methods, and XML in Web Development
2a.
i. Write a short note on Nginx webserver with emphasis on its architecture.
ii. What is the use of iframe tag? Give an example.
iii. Write a short code showing how an array can be declared with PHP.
2b.
i. Differentiate between the GET and POST method
ii. What is XML?
iii. List 3 features of XML.
2c. Explain the following HTML tags with all attributes.
i. ii. iii. iv. v.