Enjoy the best grades that will raise your GPA.

Category: Computer Science (Page 1 of 24)

Proposal and Annotated Bibliography for Final Report Introduction: In this assig

Proposal and Annotated Bibliography for Final Report
Introduction:
In this assignment, you will propose a topic for your final report and summarize and evaluate some sources that are relevant to your project.
Directions:
Prior to doing the final business report itself, you will write a proposal and annotated bibliography in which you persuade your instructor that the project you have in mind is necessary/useful and to convince them that you are prepared to take on the project.
To lay out your document, you can use the sample proposal in fig. 22.2 on pgs. 564-65 as a model for how the proposal should look on the page. However, you do not need to include all the same headings included in figure 22.2, so long as you cover all the parts required by this prompt. (For example, you do not need to jump to solutions at this stage, but you will need to add annotations to your sources, so your final document will not be exactly the same as the sample. As the proposals chapter emphasizes, a proposal is written to the needs of the audience, purpose, and task, so you need to shape your proposal to fill the requirements and purposes of this assignment.)
You may find it helpful to review the assignment for the final report that you looked at in Unit 1 before you write your proposal.
In your proposal, you should:
Identify the topic/issue are you planning to write about in your report.
Describe why exploring this topic is important to the audience.
Explain who your primary (decision-making) audience is, as well as other relevant audiences.
Discuss the questions you think you will need to answer to address the issue.
At the proposal stage, you should not necessarily know what course of action you are going to recommend or what arguments you will make (after all, you haven’t even done all your research yet!) You are simply convincing your instructor to approve your project by showing that you have chosen a topic that fits the assignment and is researchable and developable into a formal report.
In the annotated bibliography, you should:
List 3 sources that are relevant to your project (you must include at least 1 scholarly, peer-reviewed source) using an APA or MLA format citation (or other citation formats as approved by your instructor).
Under each citation, write 2 paragraphs (this is the annotation)
Paragraph 1 should summarize the source, as specifically as possible
Paragraph 2 should evaluate the source for credibility and usefulness for the project
Note: You should write your own annotations. Do not copy abstracts or other people’s summaries of your sources; that counts as plagiarism. You are showing your instructor that you read and understood the source.
While the proposal requires a minimum of 3 sources to show that the project is researchable, you will need more than 3 to fully develop your final project. There is no magic number, of course, as all topics are different and require different sources to achieve their goals. As you continue working on your report over the next couple of units, keep examining sources and thinking about what material you need to fully develop your report and recommendations. You do not need to redo the proposal to add or change sources. It is fairly normal to refine your sources as you work on a project.

I am looking for someone with vast experience in Computer Science to work on thi

I am looking for someone with vast experience in Computer Science to work on this assignment and perferably access to the required textbook.
In this assignment, students will apply what they have
learned in the course about FISMA compliance, CSF framework, and the ISO/IEC
27001:2013 certification process to expand their understanding through the lens
of an internal auditor for a small and medium-sized business. The student may
select to address the scenario from a federal or private sector perspective,
but must be sure to denote which sector is chosen and apply the appropriate
logic to the steps needed to secure compliance.
Scenario
The federal and private sector organization is considering
ISO/IEC 27001:2013 certification and currently holds a Level 3 strategic
alignment organizational alignment maturity (established policies, procedures,
and SOPs). The organization requires additional work to obtain an optimized
state and you have been asked to lead the effort to get them there.
In a 750- to 1,000-word paper, describe the steps you would
use to help the organization begin to prepare for this certification. Make sure
to address the following:
What is the organizational readiness for certification?
Review the Strategic Alignment Maturity Model Levels for this portion.
How many members of your internal audit team will you need
to perform the risk assessment? How long will the risk assessment take?
What internal technology teams and other key stakeholders
will you need to engage?
Provide a brief description of the ISO/IEC 27001:2013 or
FISMA certification process (dependent on sector type chosen).
Make sure to reference academic or NIST official
publications (most current year available via the Internet) or other relevant
sources published within the last 5 years.
Prepare this assignment according to the guidelines found in
the APA Style Guide, located in the Student Success Center.
This assignment uses a rubric. Please review the rubric
prior to beginning the assignment to become familiar with the expectations for
successful completion.
Be sure to follow APA 7th ed. guidelines; In
addition, please include a Table of Contents, Abstract, and an overview.
Therefore, a plagiarism report is required to
be submitted with your work! Moreover, please check for grammatical errors,
syntax errors, and punctuation, i.e.
Accordingly, the class DOES NOT OPEN until 28-30.
Also, I have attached a template for you to use for this assignment you can type the title of the paper but leave the coverpage as is!
The required textbook is Operating Systems: Internals and Design Principles 9 Stallings, W. Pearson (You can use an earlier edition of the book if needed). I would also like a progrssive draft of the paper.
Please bear with me as I await the correct due dates/instructions for this assignments!
Remember, take your time on this; Any questions reach out.

Identify two quality resources regarding mobile device forensic tools that you h

Identify two quality resources regarding mobile device forensic tools that you have not used. These are resources that you found in your own research. Complete an annotated bibliography for the two resources – one research article/news release, and one video “how-to” for a digital forensic technique or tool that is designed for mobile devices. Please see the below links for an example of an article and video. These can be used.
https://cuckoosandbox.org/

View the “Lab 2 Opensource Intelligence” video within the “Video Playlist: Penet

View the “Lab 2 Opensource Intelligence” video within the “Video Playlist: Penetration Testing and Risk Management,” located in the topic Resources.
The use of the Maltego tool allows for the gathering of passive data across various platforms in order to better prepare an attacker to exploit a system. Utilizing this tool, as well as the OSINT framework, do the following:
Research a Fortune 500 Company and one of its C-suite officers to extract as much passive data as possible in order to prepare your team to carry out a pending pen test of their systems.
Present the findings of your attack surface discovery to your team through a video or streaming service 3-5 minutes in length. Define the stage of cyber operations in which you are currently operating. Your video should include screenshots and an examination of attack vectors that you will use to proceed with active recon.
Once you have identified your prospective target, create a Spear Phishing Email to target someone within the organization you have researched, utilizing the information you gained. Present your attack in your video presentation, describing why and how you believe it would be effective. (DO NOT SEND this attack. It is a violation of the code conduct at GCU.)
Explain, from a Christian perspective, the legal authorities and ethical considerations that must be taken into account when conducting such an attack as part of a penetration test.

PROJECT 12.3: Performing a Full Audit Note: This exercise requires a fully equip

PROJECT 12.3: Performing a Full Audit
Note: This exercise requires a fully equipped lab (at least 10 machines) and is probably best done
in groups.
You and your team should conduct a complete audit of the chosen lab and write a detailed account of
what you find. The audit must include a review of lab policies, probing the machines, checking for
patches, and all other items mentioned in this chapter.

I will do the screenshot part. i just need the writhing part. Instructions This

I will do the screenshot part. i just need the writhing part.
Instructions
This week, you will submit the second project, VM Scanner Background Report, based on the Nessus Report. As you are writing your report, you may want to refer back to the CEO’s video in Week 1 to make sure your analysis and recommendations align with the CEO’s priorities and concerns.
You should link your analysis to the kinds of organizational functions and data associated with a transportation
Instructions
This week, you will submit the second project, VM Scanner Background Report, based on the Nessus Report. As you are writing your report, you may want to refer back to the CEO’s video in Week 1 to make sure your analysis and recommendations align with the CEO’s priorities and concerns.
You should link your analysis to the kinds of organizational functions and data associated with a transportation company (e.g., protecting order data, customer lists, sales leads, Payment Card Industry (PCI) compliance for processing credit, proprietary software, etc.) and provide your recommendation if Mercury USA should purchase the Nessus tool. This report should be four to six pages in length and include a title/cover page. Include in-text citations and a reference page with three quality sources in a citation style of your choice.
n company (e.g., protecting order data, customer lists, sales leads, Payment Card Industry (PCI) compliance for processing credit, proprietary software, etc.) and provide your recommendation if Mercury USA should purchase the Nessus tool. This report should be four to six pages in length and include a title/cover page. Include in-text citations and a reference page with three quality sources in a citation style of your choice.

« Older posts

© 2022 assignmetshive

Theme by Anders NorenUp ↑