Virtualization Software

Discuss the benefits of virtualization software, as described in the text. Do you agree/disagree with these benefits, or can you think of additional benefits not already presented? Also discuss the security concerns highlighted by server sprawl and how you would propose to solve those in your (real or hypothetical) organization.

Please prepare one main discussion and two response posts substantive. A substantive post will do at least two of the following:

At least two scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

I will post other student discussions here once you are done with main discussion.

Requirements: APA | Discussion | 2 pages, Double spaced

Answer preview

However, in some cases, users adopt more computing resources that supersize their financial capabilities. Organizations employ numerous servers in their data centers to facilitate processing, networking, and storage needs. The application of numerous servers can sometimes exceed organizational business requirements. Some of the servers applied are not exploited to their full capacity. This situation is known as servers sprawl. The server sprawl pushes the organization to spend more money running the servers, paying their energy and cooling costs, and getting inequivalent performance from the servers in return. Also, there are increased chances of security vulnerabilities when using a low server consolidation ratio. The cost of installing security infrastructure for many servers is stiff, making organizations choose to install alternative cheaper security measures instead of using few high-performance servers with superior security infrastructure.

[640 Words]

Virtualization Software

Cloud computing

1-Case Project 7-5: Would your school or place of work benefit from cloud computing? Identify at least two cloud computing vendors and research their features and costs. Then look at one element of your school or work network infrastructure and apply it to cloud computing. Would it be feasible? Why or why not?A one page paper is not necessary, just answer the questions above and remember to cite any additional sources.

2-Why should a person make sure to use secure protocols opposed to unsecure ones like FTP?

3-What are the potential effects of a network device not being properly placed in the correct place on the network?

please answer the questions in simple and short answers

I will attach the slides please answer the questions

Requirements: answer questions and two replies

only articles and websites on google search

Answer preview

AWS has a mobile hub that allows users to access services using android and IOS (Stergiou et al., 2017). Besides, AWS has a mobile SDK feature that supports Web, Unity, React Native IOS, and Android (Stergiou et al., 2017). AWS provides On-demand, reserved instances, saving plans, and spot instances pricing options. Some of Google’s cloud platform features include artificial intelligence and machine learning features, API management features, computing features, data analytics features, databases, and developers’ tools (Stergiou et al., 2017). Google cloud platform employs VM instance pricing, networking pricing, sole-tenant mode, GPU, disk and image, confidential VM, and VM manager modes of pricing.

[381 Words]

Cloud computing

Information Security Policy

Q1. Discuss the purpose of an Information Security Policy and how it fits into an effective information security architecture. Your discussion should include the different levels of policies and what should be covered in an information security policy.

Q2. Discuss how an organization can apply the information life cycle to protect information. Make sure you discuss the different states of data and protection measures for those states.

Assignment Formatting Requirements:

  • APA Standard 1-inch margins all around
  • Standard font (e.g., Arial, Times Roman, Calibri, Tahoma, etc.)
  • 12-pt font size
  • Double-spaced
  • No cover page – use a simple heading at the top of the first page with Course #/Title, Exam Name, Your Name, and Date (this heading can be left-justified, centered or right-justified)
  • No Abstract
  • Identify the question number for each response (e.g., “Essay Question #1”) – do not repeat the actual question text
  • When using external sources, list the references immediately following the end of the essay question where used (do not put all references at the end of the document)
  • Start Q2 on a new page

Answer preview

An organization can also apply disposition where it deletes or archives the invalid information. There are three states of data: data at rest, data in motion, and data in use. Data at rest entails data that is not accessed and stored on a logical medium (Rustad & Koenig, 2019). The protection measure for this state of information is the use of encryption, for instance, full disk encryption, which allows that if the laptop is lost, the data contained cannot be accessed by mounting the hard disk or device on another machine. The second state of data is data in motion. This is the data that travels through any private or public communication channel, such as email. To protect data in motion, the following measure is applied. Email encryptions manage file transfer and data leak prevention. The third state is the data in use which is the data that is opened by one or more applications for its assessment by users.

[597 Words]

Information Security Policy

Computer forensic tools

Please answer those 2 questions in the last slide and make it look clear and simple.

Read the presentation and do the 2 exercises at the end of the presentation. write what you found most surprising about your findings.

Please make it look simple and clear

Case Project 14-5: Forensic Tools
•Search the Internet for websites that advertise computer forensic tools. Locate reviews of four tools. Create a chart that lists the tool, the type of data it searches for, its features, the costs, etc. Which would you recommend if your company could only purchase one tool and budget were not a concern?
Case Project 14-6: Online Backup Services
•Several good online backup services can help make data backup easy for the user. Use a search engine to search for online backup service reviews and select three different services. Research these services and note their features. Create a table which lists each service and compare their features. Which would you recommend most for a company and why?
Answer preview

Online Backup Services

Service Features 
IDrive

 

§  Storage is 1TB per a year

§  Multiple drive backup: a lot of devices as well as data from external hard drives can back up into a single account.

§  Online file sync; all devices linked are synced in real time. This does not affect the backup storage limit.

§  -IDrive express service which enhances quick retrieval of data from a physical storage.

§  -End-end-encryption which makes it difficult for hackers to access it.

§  -Continuous data protection by automatically recognizing recent modifications and backing them up.

§  -Archiving; data is not deleted unless it’s done manually.

§  -Status reports; all activities, backup and sharing reports are updated each time it happens.

§  -It has a 30-day free trial period.

 

 

SpiderOak One -Storage is 5TB a year.

-Unlimited devices can use the account.

-Cross-platform which allows data to be synced across all linked devices.

-Files can be retrieved from any internet connected device.

-End-end-encrypton which protects data securely.

-It has a 21-day free period.

-Folders can be shared in web Share Rooms.

 

[564 Words]

Computer forensic tools

Computing Environments

Attached is the case study

Read problem H.57 Internal Control Considerations in End-User Computing Environments on page 920 of the textbook.

Required:

Assume that you are participating in the audit of Chicago Appliance Company and that the background information was obtained during the planning phase of the engagement. You have been asked to (a) consider the potential internal control weaknesses that exist in this end-user application and (b) assess how those internal control weaknesses could alter the audit plan for the current year. Be sure to write your information so that Chicago Appliance Management can fully understand.

Answer preview

In conclusion, the Chicago Appliance management needs to know that insufficient control measures may prevent the organization from performing a successful auditing plan. As much as the organization has invested in the end-user applications to enhance operations, this may lead to substantial financial losses. According to Goyal (2011), insider breaches, human error during data entry, and inadequate training of the workforce on how to implement the new applications are significant consequences. Therefore, the organization should train the employees on proper usage of the application to increase efficiency and reduce data breaches. Further, establishing policies on access permits and improving the system’s security would help reduce the huge losses that the company would experience.

[646 Words]

Computing Environments

Computer crime prosecution

Assignment 1:

Search the Internet for articles on computer crime prosecution. Write a one-page paper summarizing the article and identify key features of the decision you find in your search.

After answering the questions, save the file with LastnameFirstname_Assignment1 (e.g., JohnSmith_Assignment1) and submit it right back here under Assignment 1 for grading.

Assignments are due by 11:59 p.m. Eastern Time on Sunday of Week 1.

Assignment Grading Criteria

Assignment Grading Criteria Maximum Points
Completes and analyzes relevant lab/activity 60
Uses proper grammar, spelling, and mechanics 20
Timeliness & APA Style 20
Total Points: 100

Requirements: 500 words

Answer preview

The article by Gottschalk (2019) was quite informative, especially when it comes to the nature of the prosecution of cybercrimes. One of the critical features of the article was Gottschalk’s (2019) recognition of the transnational element of cybercrimes, which serves as a hindrance to the successful prosecution of these crimes. Due to the internet, individuals located in distant places can groom a child located in an area situated thousands and thousands of miles away from them. When this happens, finding the perpetrator, gathering pertinent evidence, arresting them, and prosecuting them, will be challenging due to the perpetrators or victim’s location in a foreign jurisdiction. Despite this, Gottschalk (2019) proposes the best solution to overcome this prosecutorial hurdle is for law enforcement agencies, governments, and intelligence agencies around the globe to collaborate. This collaboration will enhance the identification of perpetrators, collection of evidence, and, if need be, extradition of a perpetrator to the victim’s location for prosecution and sentencing. The net effect of this will be that punishments will be severe on perpetrators and accessible even when the perpetrator and victim are in different locations.

[669 Words]

Computer crime prosecution

Role-Based Access Control in Microsoft Azure

I have been tasked with implementing an access control solution based upon users’ roles. Write a 2–4 page paper on how you would go about doing this assuming that the cloud environment is either Microsoft Azure or Amazon Web Services (AWS) (pick only one). The paper should include details on the following RBAC/access control features:

Roles, Secure remote access, Policies, Encryption, Federation/Single Sign-on (SSO), Logging and monitoring, Resource permissions.

Requirements: 2 pages

Answer preview

It is necessary to ensure that the different roles are assigned their specific security permissions for accessibility. The database will consider the three levels of permissions, including; database queries, app screens and interfaces, and individual concepts. For example, for logging in to access a respective database, the user will be exposed to customized queries, guiding them to their specific roles in the database (Ferraiolo e al.,2003). On the same note, monitoring is enhanced through the permissions act as regulations determining who can access certain information. The regulation ensures that only authorized persons can access sensitive information. For instance, in Azure RBAC, authorized and controlled access to information is achieved by secure remote access, such as the single sign-

[732 Words]

Role-Based Access Control in Microsoft Azure

Computer crime prosecution

Search the Internet for articles on computer crime prosecution. Write a one-page paper summarizing the article and identify key features of the decision you find in your search.

After answering the questions, save the file with LastnameFirstname_Assignment1 (e.g., JohnSmith_Assignment1) and submit it right back here under Assignment 1 for grading.

Assignments are due by 11:59 p.m. Eastern Time on Sunday of Week 1.

Assignment Grading Criteria

Assignment Grading Criteria Maximum Points
Completes and analyzes relevant lab/activity 60
Uses proper grammar, spelling, and mechanics 20
Timeliness & APA Style 20
Total Points: 100

Requirements: 500 words

Answer preview

Due to the internet, individuals located in distant places can groom a child located in an area situated thousands and thousands of miles away from them. When this happens, finding the perpetrator, gathering pertinent evidence, arresting them, and prosecuting them, will be challenging due to the perpetrators or victim’s location in a foreign jurisdiction. Despite this, Gottschalk (2019) proposes the best solution to overcome this prosecutorial hurdle is for law enforcement agencies, governments, and intelligence agencies around the globe to collaborate. This collaboration will enhance the identification of perpetrators, collection of evidence, and, if need be, extradition of a perpetrator to the victim’s location for prosecution and sentencing. The net effect of this will be that punishments will be severe on perpetrators and accessible even when the perpetrator and victim are in different locations.

[669 words]

Computer crime prosecution

Categories of computer crime

In order to complete Assignment #1 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #1). Use examples from the readings, lecture notes and outside research to support your answers. The assignment must be a minimum of 1-full page in length with a minimum of 2 outside sources. Please be sure to follow APA guidelines for citing and referencing sources. Assignments are due by 11:59 pm Eastern Time on Sunday.

1. The term computer crime encompasses a very broad range of criminal acts. Explain in detail categories of computer crime. Use examples to support your explanations

Requirements: 1 page in APA format

Answer preview

The best solution to overcome this challenge is to always prepare in advance and seek the guidance of the jury or the attorney on areas to address. This will ensure that the expert witness does not lose his or her credibility in the courtroom and with the jury, who depend on his knowledge, expertise, and experience. The second professional challenge is that the expert witnesses might provide the attorney with complex information that can be confusing to the attorney during a case. This is because the expert witnesses are experts in their field of forensic science, which is a different field from that of the attorney. The solution is to explain complex issues in the most simple but relevant manner that the jury or attorneys can understand.

[427 Words]

 

Categories of computer crime