Categories
computer

Digital forensic

Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).

Your written assignment should be 3-4 paragraphs in your own words, and should include a reference citation for your source of information.

Categories
computer

Using Chapter 10 as a reference, eExplain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?

Using Chapter 10 as a reference, eExplain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.

Categories
computer

Suburban Homes Construction Project Quality Management Plan (QMP)

 

 

Prepare a quality management plan using the elements described in the PMBOK 6e (Section 8.1.3.1) for the Suburban Homes Construction Project.

Content (90 points) Over the course the semester you’ve become familiar with the project and as part of the overall project management plan, a quality management plan is needed to communicate how quality will be met to the satisfaction of each stakeholder involved in a typical residential construction project.

You should perform research on quality standards associated with residential construction to determine applicable standards.  At least four (4) quality objectives associated with the project should be defined.

As part of the section on quality tools, include a separate appendix with at least three (3) quality tools that will be used as a part of the project.  These can be drawn from: 1) flow charts, 2) check sheets, 3) Pareto diagrams, 4) histograms, 5) control charts, 6) scatter diagrams, 7) affinity diagrams, 8) process decision programs charts, 9) interrelationship digraphs, 10) tree diagrams, 11) prioritization matrices, 12) activity network diagrams, 13) matrix diagrams, 14) inspections, and 15) statistical sampling.

Last, about 1/3 of the plan should be devoted to major procedures relevant for the project for dealing with non-conformance, corrective actions procedures, and continuous improvement procedures.

If information needed to complete a QMP is not explicitly stated in the scenario description or other project artifacts you’ve created or collected for this scenario in the past units, then develop (make-up) the information you need to complete the plan.  Use tables and illustrations as needed to convey information.

The plan (excluding the separate appendix) should be approximately 4 to 5 pages. 

Categories
computer

CIS-599: Project Deliverable 2: Business Requirements

CIS-599: Project Deliverable 2: Business Requirements

This assignment consists of two (2) sections: a business requirements document and a project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
Procuring quality business requirements is an important step toward the design of quality information systems. Completion of a quality requirements document allows user needs and expectations to be captured, so that infrastructure and information systems can be designed properly. Your company, which is a data-collection and analysis company that has been operating less than two (2) years, is seeking to create a repository for collected data beyond standard relational databases. Your ten (10) terabyte data warehouse is expected to grow by 20% each year. You are mindful of data warehousing best practices which will aid you immensely in your requirements gathering effort. Using the requirements document provided in the course shell, you are to speculate on the needs of the company. You must consider current and future requirements; however, assumptions should be realistic and carefully considered.  
Section 1: Business Requirements Document Write a four to six (4-6) page original business requirements document for the project plan using the template provided. Note: The template is provided under the Additional Resources in the Student Center tab of the online course shell. Describe the project including the following:

o      Describe and define the scope of the project. Speculate as to how to control the scope. Identify possible risks, constraints, and assumptions. Describe the relationship and integration between systems and infrastructure. Note: Database and Data Warehousing, Analytics, Interfaces and Cloud Technology, and Infrastructure and Security should be considered. Speculate upon potential outsourcing or offshoring needs. Identify and justify the necessary resources including staffing that are necessary. Define relevant terms that will be used throughout project. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

 

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

 Section 2: Revised Project Plan

Use Microsoft Project to: Update the project plan from Project Deliverable 1: Project Plan Inception, with three to five (3-5) new project tasks each consisting of five to ten (5-10) sub-tasks.

The specific course learning outcomes associated with this assignment are: Evaluate an organization through the lens of non-IT senior management in deciding how information systems enable core and supportive business processes as well as those that interface with suppliers and customers. Use technology and information resources to research issues in information systems. Write clearly and concisely about strategic issues and practices in the information systems domain using proper writing mechanics and technical style conventions.

 

 

Categories
computer

week 7 wiki

 

A key responsibility for security professionals is representing organizations during audits, either internal or external. Since our case study involves cyber security for a chemical facility, we’ll be practicing this skill by responding to questions that might be generated by an inspector with the Department of Homeland Security (DHS). Consult the attached document to get your assigned audit question, and post to the Wiki your question and answer so that we can share the learning experience.  The rubric for this assignment is here.

Assignment Resources: Textbook: Industrial Network Security, 2nd Edition by: Joel Thomas Langill and Eric D. Knapp- Chapter 13

Categories
computer

Need help with 1 maybe 2 short Cisco essays…..

I will post questions after I log in to the quiz. It is 1 hour and is timed. We both will be coordinating on this. I may need a couple of multiples answered. 

Categories
computer

In MS Word. P 7-41

Grande Stores is a large discount catalog department store chain. The company has recently expanded from 6 to 43 stores by borrowing from several large financial institutions and from a public offering of common stock. A recent investigation has disclosed that Grande materially overstated net income . Theis was accomplished by understating accounts payable and recording fictitious supplier credits that further reduced accounts payable. An SEC investigation was critical of the evidence gathered by Grande’s audit firm, Montgomery & Ross, in testing accounts payable and the supplier credits.
The following is a description of some of the fictitious supplier credits and unrecorded amounts in accounts payable, as well as the audit procedures.
1. Neo: too much
2. typing. I’m sure
3. you have a copy
4. of 1 thru 4.
Required:
Identify deficiencies in the sufficiency and appropriateness of the evidence gathered in the audit of accounts payable of Grande Stores.

Categories
computer

Lab -LAMPZap

For this Lab please do make sure to include a word document to use called williamclementsSDEV300Lab9 attached. Please format it so it is a professional report including APA Style references for how you fix the 2 separate ZAP Reports attached which are the vulnerability reports I had already ran. So please be well-organized and include a table of contents, page numbers, figure and table numbers. The writing style should be paragraph style with bullets used very sparingly to emphasize specific findings. In other words, this should be a professional report and demonstrate mastery of writing.

Those two reports are week7 local host website that was created last week and a local host site that was given to evaluate this week. After documenting all the issues and how you fixed them, send those two files two me as a zip file separately attached so I can run the files again and be sure there are no more vulnerability issues for any of the 2 different local lost websites. Below is what is required!

 

Lab submission details:

As part of the submission for this Lab, you will run manual and automatic attacks on your week7 lab submission and the UMUC Tutor app on your VM.

Be sure to work on each application separately and document the issues you found and the process you used to fix the applications. You can provide the findings in one well-organized document. You should work to eliminate all alerts in both applications and clearly document specifically what you did to mitigate each issue.

Create screen shots demonstrating your process and results. The document should be well-organized and include a table of contents, page numbers, figure and table numbers. The writing style should be paragraph style with bullets used very sparingly to emphasize specific findings. In other words, this should be a professional report and demonstrate mastery of writing.

Be sure your process includes both manual and automatic scanning. When researching your security alerts, be sure to document your references using APA style. You should show both before and after fix vulnerability reports. Your final vulnerability report should show zero alerts and vulnerabilities.

For your deliverables, you should submit a zip file containing your word document (or PDF file) along with the before and after application files. (including sql and parameter files) If you made changes to your VM environment (e.g. security.conf, apache2.conf, php.ini) you should provide those files also.

 

 

Include your full name, class number and section and date in the document.

 

Here is what I have attached & Why:

 

·         UMUCTutorLamp.zip (supplied local host site by teacher).

·      ZAP Scanning Report for UMUCTutorLamp.docx (should open in a word document with the vulnerability report for the site).

 

·          

·         answer_2.0.zip (My website created).

·         ZAP Scanning Report for week7 Lab.docx (should open in a word document with the vulnerability report for the site).

 

 

williamclementsSDEV300Lab9.dox (Please use that for the report as mentioned above and send back along with the zip file edits).

Categories
computer

Short paper

Ensuring the appropriate steps are taken to guarantee adequate project closure is critical. The various sections of the project closure document you have prepared for this class cover what is required to ensure the system is turned over properly and will continue to operate as designed. You may have also taken additional steps or measures specific to the type of system you have implemented. 

 

Read the article IT Project Closure from Risk Management magazine. The project discussed was a six-month legacy system migration to a web-based environment for an insurance claims sponsor. The article details how the project’s overall success was partly due to ensuring special considerations were taken during project closure. Summarize and discuss the importance of the project closure activities you performed and how they will contribute to the overall success of your project. Elaborate on the importance of one of the IT project closure considerations or activities mentioned in the article or another of your choosing. 

 

Specifically, the following critical elements must be addressed: 

 

• Summarize the project closure activities and considerations performed. 

• Elaborate on the importance of one of the IT project closure considerations or activities mentioned in the article or another of your choosing

Categories
computer

642-8 Yhtomit

Security expert Chris Nickerson is often asked by clients to conduct penetration testing of their on-site security. Watch Nickerson and his team recently pull off a $24,000.

Nickerson and crew recently took on such an exercise for a client he describes as “a retail company with a large call center.” With some prep work, Nickerson says the team was able gain access to the company’s network and database quite easily. Read on to find out how they did it and what lessons you can take away for shoring up your organization’s defenses.

Goodchild, J. (2009).  Social engineering: Anatomy of a hack.  InfoWorld.  Retrieved from https://www.infoworld.com/article/2675986/security/social-engineering–anatomy-of-a-hack.html

250 words

APA Format

3 sources