Project 1: Rules of Engagement
Instructions
The first deliverable of the Penetration Test Proposal is the rules of engagement (ROE) document, a formal one to two page document that outlines the objectives, scope, methodology, and overall test plan agreed upon by the penetration testers and client system administrators. Penetration testing can cause complications such as network traffic congestion, system downtime, and may cause the same vulnerabilities and compromises it was designed to prevent. Due to the potential consequences of penetration testing, it is vital to agree upon a comprehensive ROE before testing.
For your ROE deliverable, consider the following:
How will you identify Haverbrook Investment Group's [attached] network characteristics, expectations, constraints, critical systems, and other relevant information?
What are your preliminary engagement activities with regard to scheduling, scope, and key stakeholders?
Cognitive Systems
Present the basic structure of a Cognitive System and describe its basic elements (parts and mechanism).
If you were to create such a system describe the basic steps to follow.
For making your case easier it is suggested to choose a real system from the medical world as a case study.
Note: Suggested length with figures up to four pages for your answer.
Your boss wants to implement new password requirements. She'd like you to make a recommendation on what the new requirements will be. She knows this is new for you, so she expects you to do some research and present your recommendations, fully cited with the resources you used to write those recommendations. Your paper should be between 600 and 800 words, and should describe the current issues associated with password security (including examples), what is considered "best practice" and why, and provide a conclusion of what the policy should be. Be sure to discuss length, expiration, as well as any other issues you might consider important. Each essay in our class should have three sections: Intro: Short, and to the point. Basically just states what the paper is about Body: 90% of the paper's length. Facts. Just facts. No opinions. This is where you discuss the issue in the context of research. Most, if not all of your citations end up here. Conclusion/recommendation: This is where you
Please research then write a one-page paper on defense techniques for Windows based computers. Please include one proactive defense (configurations, AV, Malware protection, patch management.) and one reactive defense (log analysis, forensics) The goal of this assignment is to show the defensive side of Cyber when it comes to Windows based computers
I want you to conduct one of the following experiments:
From a safe location observe the number of people wearing masks in a public place for 30 minutes, note how many people wear masks and how many wear them inappropriately. What recommendations can you make to the design of the mask, environment, or the task of putting a mask on to encourage proper mask-wearing?
Safely observe two or three people (using zoom is fine) using the drug interaction tracker in a fictional scenario where they need to see if two medications interact. Observe what errors they make or points they find confusing. What recommendations can you make to the design of the mask, environment, or the task of identifying drug interactions? What recommendations can you make to the design of the mask, environment, or the task of putting a mask on to encourage proper mask-wearing?
Think about workflow related to
your focus area. Whose workflow
would be important to consider
when designing and implementing
informatics solutions?
Visit the AHRQ Health IT tools
on workflow, choose a tool
and discuss how it would be
used to evaluate/plan/design
workflow implications to
resolve an informatics
challenge in your focus area.
Think about human factors and
your focus area. Identify areas
where humans are challenged.
Where does human performance
suffer? Or, where do humans get
frustrated by a technology or
process? How could human
factors be used to improve the
design of technologies and
informatics tools to better support
humans in your focus area.
Throughout your post, be sure to
demonstrate your understanding
and synthesis of readings and
activities from Weeks 1-6 of the
course (cite course readings,
integrate explanations of
concepts/theories into your
description of informati
Encryption/decryption Format:
Types of encryption Cover page(name, date, paper title)
How it works four page content
Benefits Reference page
Where it is used. One-inch margin
Identify one reported case (North Carolina V Bradley Cooper Murder of wife Nancy Cooper 2007 )(accessing text messages)For the case, cite the case and summarize the issue that was heard before the court; the majority of the (thorough) analysis should be dedicated to the impact the case had on the application of digital evidence in the criminal justice system or the manner in which the digital forensics analysts operated.
Assignment 1 Requirements:
2 full pages minimum.
Paper should be structured with an introductory paragraph and ended with a conclusion. IRAC essay style format(Issue, Rule, Analysis & Conclusion) and footnote any direct reference to someone's published work .
Format: 12 point "normal" (e.g., Times New Roman, Arial, or similar) font, double-space, one-inch page margins.
Bibliography/reference page (not included in page count): APA citation style.
Identify one reported case (North Carolina V Bradley Cooper Murder of wife Nancy Cooper 2007 )(accessing text messages)For the case, cite the case and summarize the issue that was heard before the court; the majority of the (thorough) analysis should be dedicated to the impact the case had on the application of digital evidence in the criminal justice system or the manner in which the digital forensics analysts operated.
Assignment 1 Requirements:
2 full pages minimum.
Paper should be structured with an introductory paragraph and ended with a conclusion. IRAC essay style format(Issue, Rule, Analysis & Conclusion) and footnote any direct reference to someone's published work .
Format: 12 point "normal" (e.g., Times New Roman, Arial, or similar) font, double-space, one-inch page margins.
Bibliography/reference page (not included in page count): APA citation style.
Project number1:Project 1: Buying a New Computer , comparing and contrasting
Your grandmother has given you $1500 to purchase a new computer, but she wants you to research and compare four computers before you buy one. Write a brief paper or create a table comparing and contrasting the features (storage, CPU speed, RAM), cost, size, special features, and weight of the four computers you researched. Explain which computer would best fit your needs and why..
Suggested Keywords
Apple computer specifications, Microsoft computer specifications, how to find computer specifications, best deals on computers, highest rated computers
Suggested Websites
apple.com
microsoft.com
bestbuy.com
dell.com
gadgetsnow.com
the features of 4 different computer(storage, CPU speed, RAM), cost, size, special features, and weight of the four computers you researched. Explain which computer would best fit your needs and why.