Computer Science homework help

Get free Computer Science homework help here or go to homework help

CIS 524 Week 2 Case Study 1

Early user interfaces were designed with little or no consideration for the end user. This was largely due to technical and hardware limitations.

CIS 524 Computer Interaction and Design

CIS 524 Week 1 DQ 1

CIS 524 Week 1 DQ 2

CIS 524 Week 2 Case Study 1

CIS 524 Week 2 DQ 1

CIS 524 Week 2 DQ 2

CIS 524 Week 3 Assignment 1

CIS 524 Week 3 DQ 1

CIS 524 Week 3 DQ 2

CIS 524 Week 4 Case Study 2

CIS 524 Week 4 DQ 1

CIS 524 Week 4 DQ 2

CIS 524 Week 5 DQ 1

CIS 524 Week 5 DQ 2

CIS 524 Week 6 Assignment 2

CIS 524 Week 6 DQ 1

CIS 524 Week 6 DQ 2

CIS 524 Week 7 Case Study 3 Security

CIS 524 Week 7 DQ 1

CIS 417 Week 10 Term Paper – Investigating Data Theft

Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. You have been informed that an employee may have been using corporate email to send confidential corporate information to one or more personal email accounts, which may or may not belong to him.

CIS 417 Week 8 Assignment 4, Data-Hiding Techniques

Suppose you are the Chief Security Officer for a financial institution. Someone on your information security staff has informed you that recent Web content filters have shown an end user who has been visiting sites dedicated to alternate data stream (ADS) and steganography hiding techniques. She is interested in what the end user may be doing and comes to you for some explanation on these techniques. Write a two to three (2-3) page paper in which you: 1.

CIS 417 Week 7 Case Study 3, Casey Anthony Trial

On July 5, 2011, Casey Anthony was found not guilty of first-degree murder in the 2008 death of her daughter, Caylee. Further research this incident using quality and reputable resources.

Write a two to three (2-3) page paper in which you:

1. Provide a brief summary of the background, charges, and trial of this high-profile court case.

CIS 417 Week 6 Assignment 3, Securing the Scene

Imagine you are a digital forensic investigator for a healthcare organization. You learn from your internal information security department that an employee has been using password-cracking software to access confidential customer insurance information. The account information extracted is unknown at this time, though it appears as though multiple computers were being used for the crime and it isn’t clear whether an attack is currently in progress.

CIS 417 Week 5 Case Study 2, External Intrusion of the PlayStation Network

On April 20, 2011, the Sony PlayStation Network was taken offline after an external intrusion was discovered. Further research this incident using quality and reputable resources.

Write a two to three (2-3) page paper in which you:

1. Briefly summarize the details of the attack on the PlayStation Network, including the dates of

when the attack started and was eventually uncovered.

CIS 417 Week 4 Assignment 2, Forensic Lab Design

Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization.

Write a four to five (4-5) page paper in which you:

1. Explicate the steps you would take to plan a budget for the lab, keeping in mind the general

business objective to avoid unneeded costs.

CIS 417 Week 2 Assignment 1, Computer Forensic Overview

Suppose you were recently hired for a new position as the computer forensics specialist at a mediumsized communications company. You have been asked to prepare a presentation to the Board of Directors on your main duties for the company and how your position could help achieve business goals based on security and confidentiality.

Syndicate content