Ability to convey the steps and process of investigative methodology used in digital forensics:Discuss?(CLR 1)

Project Digital Forensics Finding Report

Ability to convey the steps and process of investigative methodology used in digital forensics:Discuss?(CLR 1)

Ability to explain the responsibilities of a Canadian security professional working in a digital forensics environment (CLR 6)

 Is there a case for disciplinary action? Should the employees involved receive some form of remedial training?

FDM (Flight Data Montioring)

 Briefly (500 words) consider the following questions with regard to the operator’s safety and just culture:

Is there a case for disciplinary action?

Should the employees involved receive some form of remedial training?

Is there an argument that any interventions could be counter-productive? (20%)

How many instructions will be executed for your code in Q1 without optimisation? How many instructions will be executed for your code with optimisation conducted?

COMPUTER ARHITECTURE

Q1 Use the MIPS instruction set and the MARS MIPS simulator to:

Write the equivalent MIPS assembly code for the C-code shown above. Remember to add comments to your assembly code.

Test the assembly code program via the MARS MIPS simulator.

Show the assembly code and all test results of running the assembly code in the report.

Q2 Consider the basic MIPS 5-stage pipeline (IF, ID, EX, MEM, WB). Assume that there is full forwarding and branch not taken.

Show the pipeline execution table of your code from Q1.

Based on the pipeline execution table, does your solution in Q1 have any pipelining hazards?

If yes, then list these hazards and show how these hazard(s) can be resolved by rewriting the code you produced in Q1. You should test the rewritten code and provide the new code and the results in the report.

If your code from Q1 does not have any pipeline hazards, discuss why this is the case and how did you resolve the pipeline hazards issues in Q1.

Q3 Performance measurement.
How many instructions will be executed for your code in Q1 without optimisation?

Optimise using inline expansions and loop unrolling to use a minimum number of instructions in to run your assembly code and explain the methods done.

How many instructions will be executed for your code with optimisation conducted?

Discuss the contract requirements and derivative requirements for cybersecurity at Sifers-Grayson in 3 to 5 paragraphs under “Section 6 General Comments.”

IT: Project #1 Incident Response Report – Part A: Incident Response

For section 1 of the form, use your own name but provide reasonable but fictitious information for the remaining fields.

For section 2 of the form, assign IP addresses in the following ranges to any servers, workstations, or network connections that you need to discuss.
a. R&D Center 10.10.135.0/24
b. Test Range 10.10.145.0/24
c. Corporate Headquarters 10.10.100.0/24

For sections 2, 3, and 5, you should use and interpret information provided in this file and elsewhere in the classroom. You may use a judicious amount of creativity, if necessary, to fill in any missing information.

For section 4 of the form you may provide a fictitious cost estimate based upon $100 per hour for IT staff to perform “clean-up” activities. Reasonable estimates are probably in the range of 150 to 300 person hours.

What’s important is that you document how you arrived at your cost estimate.

Discuss the contract requirements and derivative requirements for cybersecurity at Sifers-Grayson in 3 to 5 paragraphs under “Section 6 General Comments.”

COMPARE AND CONTRAST A CYBERCRIME VERSUS A CYBER-ASSISTED CRIME using your example as a basis for discussion.

The Deep Dark Web

Assignment:

Throughout your career as a cyber professional, you may be asked to conduct intelligence gathering activities.

In preparation, write a 250- to 500-word EMAIL SYNOPSIS that you would provide to your immediate supervisor IDENTIFYING WHAT CYBER THREAT INTELLIGENCE AND INFORMATION IS, AND WHY IT IS IMPORTANT. ( provide in detail, the “what” and the “why”)

PROVIDE THE SCREENSHOT OF THE ABUSIVE OR ILLEGAL ACTIVITY and

IDENTIFY WHETHER THE ACTIVITY IN QUESTION IS A CYBERCRIME OR CYBER-ASSISTED CRIME if carried out. ( cite screenshots)

COMPARE AND CONTRAST A CYBERCRIME VERSUS A CYBER-ASSISTED CRIME using your example as a basis for discussion.

 

Describe the TCP/IP address maintenance process planned for the system. Maintenance should include assignment of new addresses and a periodic review of currently assigned addresses.

Network Improvement Plan

TCP/IP Addressing and Management

Document an addressing scheme for the TCP/IP addresses used for the network.

Provide justification for the addressing scheme.

Describe the TCP/IP address maintenance process planned for the system. Maintenance should include assignment of new addresses and a periodic review of currently assigned addresses.

What is the average price of all items purchased? How many orders did each customer make? Use the Order Item table. Select the customer id, number of orders they made, and the sum of their orders.

SQL

What is the average price of all items purchased?

Return the total number of items purchased.

How many orders did each customer make? Use the Order Item table. Select the customer id, number of orders they made, and the sum of their orders.

From the items ordered table, select the item, maximum price, and minimum price for each specific item in the table. Only display the results if the maximum price for one of the items is greater than 190.00.

Select the item and price for all of the items in the items ordered table where the price is greater than 10.00. Display the results in ascending order based on the price