Project Cost Management why technical people are not interested

Project Cost Management. Why do you think it’s difficult to understand some of the basic cost terms in this chapter?  Why aren’t many technical people interested in cost-related subjects? What could be done to change this?

Assignment Requirement

1. Minimum 5 references. 

2. APA format is required. 

3. All references listed at the end of paper need to be cited in the text.

 

Looking for a Similar Assignment? Hire our Top Techical Tutors while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Active Discount Code FREE15

question 1

  

Question 1: 

Go to the website: https://epic.org/privacy/litigation/ which focuses on civil rights issues and privacy. Pick a case.

· Summarize the case

· Give your opinion of the decision.

· Describe how the case deals with the material in this chapter

Question 2:

Describe the plain view doctrine, and why it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

Question 3: 

Go online and research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed to be purchased. Include a price if applicable.

Question 4:

Use the web or other resources to research at least two criminal or civil cases in which recovered files played a significant role in how the case was resolved.

Question 5:

Define several forms of metadata that can be useful to an investigation. How are valuable to an investigator?

Question 6:

Explain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?

Question 7:

Explain how cookies can show that a user has visited a site if that user’s history has been deleted.

Optional: install Windows Historian and see the sites visited by a particular user. 

 

Looking for a Similar Assignment? Hire our Top Techical Tutors while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Active Discount Code FREE15

mini research paper

   Chapter  2 Security in Mic  

Chapter 1 – Windows and the Threat Landscape

Windows 10 Threat Landscape – Multiple Contributors, Microsoft.com

7 Things to Know about the Changing Security Landscape – Jessica Lyons Hardcastle 

  Chapter  2 Security in Microsoft Windows OS

http://resources.infosecinstitute.com/identity-management/

https://www.sans.edu/cyber-research/security-laboratory/article/311

Chapter  3 Access Controls in Microsoft Windows

https://technet.microsoft.com/en-us/library/dd277411.aspx

https://docs.microsoft.com/en-us/windows-server/identity/ad-ds/plan/security-best-practices/implementing-least-privilege-administrative-models

Chapter  9 Microsoft Windows Network Security

https://technet.microsoft.com/en-us/security/hh535726.aspx

Pick a topic relevant to the information we have covered to date, including this week.  It can cover information in Chapters 1,2,3, and 9, or any of the articles presented in the readings area.  The format of your paper will need to follow the following outline in APA format (include title page, abstract page, content pages, and reference page):

INTRODUCTION

· State the topic you are attempting to cover

· State the issues involved

· State why we should be concerned with resolving whatever issues are involved

· State how answering the issues will help us

· State the implications and consequences of dealing with or resolving the issues involved

REVIEW OF THE LITERATURE (2 sources minimal, at least 1 needs to be peer-reviewed)
Identify who has tried to answer the question before by doing the following:

· Summarize how each of the sources presents and deals with the subject

· Explain how each source presents and deals with its findings or results

· Explain the relevancy of each source to your topic

· State what you learned from each of your sources

· State in what way(s) each source contributes to answering your issues

DISCUSSION

· State your answer to your issue

· State how and elaborate on how, explain how, illustrate how each of the sources you previously reviewed help you answer your issue

· State what questions about your topic you still have that your sources may not have answered

CONCLUSIONS

· Indicate how each of the sources have contributed to your conclusions (and clearly, accurately, correctly document those sources within your text)

· State the implications of your conclusions

· State what might be the possible consequences of your conclusions

· State the significance these implications and consequences might have in the information technology / information security realm 

DOCUMENTATION

· On a separate page, include a section labeled References which provides the full publication information for all the sources you used in your paper

· You should have a MINIMUM of three (2) sources for your paper, at least 1 source needs to be peer-reviewed

· Not meeting this minimum requirement of three (2) sources will lead to a lower evaluation of your paper for each missing source

· Use APA format for documenting your sources

-For APA help: Purdue OWL
-For more details on journal types, refer to this link:  Rutgers Library

 

Looking for a Similar Assignment? Hire our Top Techical Tutors while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Active Discount Code FREE15

Analyzing data – 7

  EDITORIAL EXTRACTION

Select any visualisation/infographic and looking at any individual chart included. Try to extract and write down in language terms what this chart shows across the angle, the framing, and (where relevant) the focus?

Does it feel that the definition you have arrived at is consistent with the aims/claims of the chart as it is published? In other words does the chart show and include what you think it is actually supposed to be doing or is there a disconnect?

Assignment Link: http://book.visualisingdata.com/chapter/chapter-5

 

Looking for a Similar Assignment? Hire our Top Techical Tutors while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Active Discount Code FREE15

Security Proposal

  

The Dayton Soft Products executive staff has requested materials and your recommendations on the following security issues:

· Is a security audit really needed? What are your recommendations for conducting such an audit?

· What are the roles and responsibilities for the organization’s staff regarding security?

· Is there any concern about Dayton Soft Products’ overall communications?

Compile a 3- to 4-page proposal that addresses solutions for the issues presented and includes:

1. Reasons for why a security audit is necessary with your recommendations for conducting such an audit:

2. Potential costs (personnel, finances, etc.)

3. Proposed audit timeline

4. Two recommend methodologies

5. A RACI chart that identifies:

6. the roles and responsibilities for the organization’s staff regarding security, and

7. expectations for a) business units, b) IT staff, c) executive staff, d) sales, and e) support staff.

8. Note: This chart may be embedded in your proposal as a table or spreadsheet file, or attached as a separate document.

9. Answers to concern about Dayton Soft Products’ overall communications

10. Three recommendations for securing the web communications—especially addressing internal needs and the growing global needs

APA Format Please provide sources NO PLAGIARISM

 

Looking for a Similar Assignment? Hire our Top Techical Tutors while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Active Discount Code FREE15

Using Chapter 10 as a reference, eExplain the concept of information stores.

Using Chapter 10 as a reference, eExplain the concept of information stores. Why is an understanding of how different clients store messaging information critical to the success of an email search?

Write your answer using a WORD document. Do your own work. Submit here. Note your Safe Assign score. Score must be less than 25 for full credit.

You have three attempts.

 

Looking for a Similar Assignment? Hire our Top Techical Tutors while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Active Discount Code FREE15

P1 JAVA

QUESTION 1 In Java, the symbol “=” and the symbol “==” are used synonymously (interchangeably). 

True
False

    QUESTION 2 Given the following code, where x = 0, what is the resulting value of x after the for-loop terminates?
            for (int i=0;i<5;i++)
                  x += i;

A.0B.4C.5D.10

    QUESTION 3 The following loop is syntactically valid.
      for (int j = 0; j < 1000; j++) j–;

True
False

    QUESTION 4 It is possible to convert any type of loop (while, do, or for) into any other.  True
False

   QUESTION 5 If x is an int where x = 0, what will x be after the following loop terminates?
            while (x < 100)
                  x *= 2;

2

64

100

128

none of the above, this is an infinite loop

  QUESTION 6 Consider the following switch statement where x is an int. If x is currently equal to 3, what will the value of x be after the switch statement executes?
switch (x)
     {
 case 3 : x += 1;
 case 4 : x += 2;
 case 5 : x += 3;
 case 6 : x++;
 case 7 : x += 2;
 case 8 : x–;
 case 9 : x++;
     }

A- 6

B-  11

C- 10

D- 12

   QUESTION 7 A switch statement must have a default clause. True
False

    QUESTION 8 How many times will the following loop iterate?
 int x = 0;
 do  {
 System.out.println(x);
 x++;
 } while (x > 0 && x<10);

A.1 timeB.9 timesC.10 timesD.11 times

   QUESTION 9 Control in a switch statement jumps to the first matching case. True
False

1.5 points    QUESTION 10 The following for-loop is an infinite loop.
      int i; for (int j = 0; j < 1000; ) i++;

True
False

  QUESTION 11 Assume that count is 0, total is 20 and max is 1.  The following statement will do which of the following?  if (count != 0 && total / count > max)  max = total / count;
A- The condition short circuits and the assignment statement is not executed
B- The condition short circuits and the assignment statement is executed without problem
C- The condition does not short circuit causing a division by zero error
D- The condition short circuits so that there is no division by zero error when evaluating the condition, but the assignment statement causes a division by zero error

    QUESTION 12 The break statement does which of the following?

A- ends the program

B- transfers control out of the current control structure such as a loop or switch statement

C- ends the current line of output, returning the cursor

D- denotes the ending of a switch statement

E- indicates the end of line when using System.out.print

  QUESTION 13 The do loop differs from the while loop in that

A- the while loop will always execute the body of the loop at least once

B- the do loop will always execute the body of the loop at least once

C- the do loop will continue to loop while condition in the while statement is false and the while loop will continue to loop while the condition in the while statement is true

D- the while loop will continue to loop while condition in the while statement is false and the do loop will continue to loop while the condition in the while statement is true

E- none of the above, there is absolutely no difference between the two types of loops

QUESTION 14 Of the following if-statements, which one correctly executes three instructions if the condition is true?

if (x < 0)
    a = b * 2;
    y = x;
    z = a – y;

{
if (x < 0)
    a = b * 2;
    y = x;
    z = a – y;
}if { (x < 0)
   a = b * 2;
   y = x;
   z = a – y ;
}

if (x < 0)
{
a = b * 2;
y = x;
z = a – y;
   }

   QUESTION 15 How many times will the following loop iterate?
 int x = 0;
 while (x > 0 && x<10)
 {
 System.out.println(x);
 x++;
 }

A.0 timesB.1 timeC.9 timesD.10 times

QUESTION 16 Which of the sets of statements below will add 1 to x if x is positive and subtract 1 from x if x is negative but leave x alone if x is 0?
if (x > 0) x++;

else x–;

if (x > 0) x++;

else if (x < 0) x–;

if (x > 0) x++;

if (x < 0) x–;

else x = 0;

if (x == 0) x = 0;

else x++;

x–;

E) x++;

x–; QUESTION 17 Assume that x and y are int variables with x = 5, y = 3, and a and d are char variables with a = ‘a’ and d = ‘A’, and examine the following conditions:
            Condition 1:  (x < y && x > 0)
            Condition 2:  (a != d || x != 5)
            Condition 3:  !(true && false)
            Condition 4:  (x > y || a == ‘A’ || d != ‘A’)

All 4 Conditions are true, Only Condition 2 is true,  Condition 2 and Condition 4 are true only, Conditions 2, 3 and 4 are all true, Condition 1 is not,  All 4 Conditions are false

  QUESTION 18 You might choose to use a switch statement instead of nested if-else statements ifthe variable being tested might equal one of several hundred int valuesthe variable being tested might equal one of only a few int valuesthere are two or more int variables being tested, each of which could be one of several hundred valuesthere are two or more int variables being tested, each of which could be one of only a few valuesnone of the above, you would never choose to use a switch statement in place of nested if-else statements under any circumstance

1.5 points    QUESTION 19 The statement if (a >= b) a++; else b–; will do the same thing as the statement if (a < b) b–; else a++;. True
False

    QUESTION 20 Consider the following switch-statement where x is an int. If x is currently equal to 5, what will the value of x be after the switch statement executes?

switch (x)
     {
 case 3 : x += 1;
 case 4 : x += 2;
 case 5 : x += 3;
 case 6 : x++;
 case 7 : x += 2;
 case 8 : x–;
 case 9 : x++;
     }

A.8B.6C.11D.5

 

Looking for a Similar Assignment? Hire our Top Techical Tutors while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Active Discount Code FREE15

Relationship between NIST and FISMA.

 

Discuss in 500 words or more the relationship between NIST and FISMA.

Cite your sources. Do not copy. Write in essay format not in bulleted, numbered or other list format. 

 

Looking for a Similar Assignment? Hire our Top Techical Tutors while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Active Discount Code FREE15

The dangers of biting on a Phish

 Short Newsletter Item: The Dangers of Biting on a Phish

Discussion Topic

Write a short “newsletter” article (3 to 5 paragraphs) for the non-technical managers and employees at Sifers-Grayson to explain the following:

(a) What is Phishing? (Focus on phishing emails and targeted attacks that include spear phishing and whaling.)

(b) What “bad things” can happen when a successful phishing attack gives outsiders access to company networks and computers?

(c) How can employees avoid “biting” on a “phish?”

(d) How should employees report phishing attacks? Why is immediate reporting critical to stopping the attackers?

Since this article is for a newsletter, you may use an informal but professional tone (address the reader as “you,” use “we” and “our” to refer to the organization’s perspective). The focus of the article should be upon changing how people think about and respond to computer security incidents. Humor is good but should not lessen the severity of the problem.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your article.

 

Looking for a Similar Assignment? Hire our Top Techical Tutors while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Active Discount Code FREE15

IAM

Write an essay of at least 500 words discussing discussing IAM in a federated cloud application.  

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles, place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

 

Looking for a Similar Assignment? Hire our Top Techical Tutors while you enjoy your free time! All papers are written from scratch and are 100% Original. Try us today! Active Discount Code FREE15