Discussion 12- Project Risk

Chapter 14: Project RiskInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the … Read more

research and critical analysis

Answer the 6 questions who, when, where, why (all together in 1-2 sentences) then HOW and WHAT in 2-3 sentences EACH -we need detail), then write an objective summary using the sample in the resource manual as a template. Objective 1: Identify the elements of a scholarly research article: who conducted it (plus credentials or … Read more

Read the chapter:

Provide an overview of the article:  ans:  Describe LSB Steganography: ans: It is often difficult and time consuming to detect steganography. What are some clues for a forensic analyst to discover the presence of steganography? (might need some additional research / Google searchers) ans: Visit https://www.spammimic.com/ / research the company Describe what this website does:  … Read more

CIS 415 Unit 3 DB: Big Data

 1 page apa format Retailers are known for collecting huge amounts of customer data.  Considering the three characteristics of big data (volume, velocity, and variety), what do you think are some of the challenges that apply to the process? In response to your peers, offer and support a different position.  Make sure you articulate sufficiently … Read more

Objective summary

Answer the 6 questions who, when, where, why (all together in 1-2 sentences) then HOW and WHAT in 2-3 sentences EACH -we need detail), then write an objective summary using the sample in the resource manual as a template.

Discuss common forms of attack on Microsoft systems using the Internet

  Instructions Assignment Instructions Week 1 Assignment: In order to complete assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #1). Use examples from the … Read more

Virtualization

 1) Discuss three situations for uses of different operating system installs in a virtual environment while at the same time securing the operating system installation. For example, think about why a system administrator would install several different versions of Microsoft Windows VM’s? Or maybe a developer installing different distributions of Linux? Think about the different IT departments … Read more