writing homework on Geology of Monaco

Need help with my writing homework on Geology of Monaco. Write a 1250 word paper answering; Monaco is an autonomous region bordering France on three sides and the Mediterranean Sea on the other. Due to Monaco’s closeness to the Mediterranean Sea, this region has a diversity of geological structures that mostly rely on the interaction of the sea and land to form. As such, the main geological feature of Monaco is the Rock of Monaco, a 141-meter monolith that stands on the Mediterranean Sea coast overlooking the port (King, 2008). The monolithic rock formation was formed from the constant bashing of the limestone-rich rock outcrops of the Mediterranean coastline by the oceanic plates. Such processes leave a monolith of pure rock material after the saltwater had eroded the softer limestone parts. Although the monolith rock served many purposes during the development of Monaco as an autonomous region, the geological feature stands as one of the most prominent natural facades of the country. Due to the geological phenomena mentioned earlier, a large part of Monaco is a hilly and rugged country.

The second most idyllic geological structure in Monaco is the Mont Agel. As the home of the Nice Air Base, this mountain range is not exactly the highest point in all of Monaco since there is a staircase greater than the range. However, the range is the largest natural or geological structure in the small country. The formation of the small range is not well known, but many geologists attribute seismic activity originating from the nearby Alpine regions. However, some critics have claimed that possible volcanic eruptions in the middle ages might have contributed to the formation of the small ranges.

Most of the geological regions that form Monaco are covered up in urban structures due to the large-scale real estate industry of the small region. The issue is so serious that Monaco has no commercial agricultural interests basing its economy entirely on the property, fishing, and&nbsp.tourism industries. However, these intensive human activities have spared a few regions, such as the pristine beaches. Monaco’s beach is comprised mostly of occupied beachfront properties, but the geology of the small country’s sea-hugging beach line is largely untouched.

Create a 5 pages page paper that discusses behavioral effects on caged and captive animals.

Create a 5 pages page paper that discusses behavioral effects on caged and captive animals. Retracing their steps back the way they came in (Fox 73). The behaviour is usually caused by boredom, stress and adaptability in the new environment.

Change in behaviour by captured animals can be studied in the following ways. The activities being engulfed by the animal, auto grooming, scent marking, social behaviours including contact, allogrooming and aggression, stereotype locomotion, consumption behaviour, foraging, locomotion, tree gouging and startle. There are three types of behavioural effects that can be studied in three different ways: passive behaviours, stereotype behaviour and loss of weight appetite behaviour.

Studies have suggested that stereotypic behaviour is generally an indication of poor psychological well being of the caged animals according to Fox (2). This behaviour does not only affect the wild but also domesticated animals. Research has been conducted on primate captured animals t determine how this behaviour can be minimized (Cowgill, and Llewellyn 121). Experiments and observations have shown that environmental factors also cause stereotypes in caged animals. Meera Baines (reporter) has claimed that transportation of Nanuk led to its breakage of a jaw that led to an infection that caused its death at sea world facility. They include factors like hose type, cage size and stress. This usually changes their aggression and social interaction for example animals like tigers. Wendy Mesley brings the fact about the death of the beluga whale. For instance, stressed mothers are faced with difficulty in breeding healthy young ones which in some instances pass away like a baby elephant in Calgary zoo.

Caged wild animals usually portray different signs when they are changed from their natural environment to a new environment like zoos and orphanages. The following are the different types of signs researchers and studies have based on to clarify the effect of caged animals (Suckow, Weisbroth and Craig 321).

The caged animal usually portrays a reduced level of activity in a new environment. It is caused by stress and boredom experienced by this animal in the new environment. Research has indicated that there will be improved in the level of activeness if the animal finds or adapts to the new environment (Cowgill, and Llewellyn 345).

Write an article on Soil Horizon.

I will pay for the following article Soil Horizon. The work is to be 5 pages with three to five sources, with in-text citations and a reference page. Mechanical Weathering is the cutting or reshaping of the surface done by the Earth’s atmospheric elements (Monroe & Wicander, 2012, p.137). This breaking down process is caused by physical contact with the atmospheric elements which include heat, water and pressure. For example, rocks can be disintegrated by simply expansion and contraction by a change in atmospheric temperature. Similarly, the surface can be damaged by the change in pressure. On any surface, the layers below are under pressure by the weight of the surface above. In case of erosion when the higher surfaces change, the pressure is decreased and different surfaces tend to expand under the conditions of changed pressure. Therefore, expanding and exerting pressure on parallel surfaces under new pressure conditions.

Changes are done to the surface when atmospheric elements carrying chemical agents come in contact with the surface. Acid rain is one example of these elements and contains sulfuric acid. When it comes in contact with rocks the chemical reaction changes composition in some cases and causes weathering.

Spheroidal Weathering is a form of Chemical Weathering in which the larger rocks form a rounded shape. In simple the weathering, in this case, takes away the joints and edges of large blocks as they are more exposed to atmospheric elements. Water creeps into cracks and edges and they are taken off the surface gradually. A round surface is formed which presents an equal area exposed to atmospheric elements.

Leaching is the process in which minerals in the top layer of the soil are mixed with water and are carried to lower layers as the water seeps into the surface. Many valuable nutrients are absorbed by water and are deposited in lower layers, whereas, the non-soluble materials remain on the top surface.

Creep is the deformation or disintegration of materials after being exposed to external stresses for a long period of time. This effect increases with an increase in the magnitude of stresses. Heat and pressure are the main stresses and their magnitude is proportional to the effect.

Provide a 6 pages analysis while answering the following question: The Discovery of the Theory of Natural Selection.

Provide a 6 pages analysis while answering the following question: The Discovery of the Theory of Natural Selection. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required. Evolutionary theories were first seen with the Greek philosophers who adhered to origination ideas, setting forth that all things originate from water or air and that all matters come from one central and guiding principle (Think Quest).&nbsp. Christianity and its teachings dominated medieval theories on evolution. Immanuel Kant set forth that all organisms come from a single source based on similar qualities of organisms.&nbsp. He further discussed that a chimpanzee may develop organs that he would use for walking and grasping objects, and from these organs, the structure of man may evolve and develop into a social culture (Think Quest).&nbsp. Carolus Linnaeus first believes in a fixed quality or nature of species. however, he soon found out that new species can be built from the original species with hybridization. He also considers hybridization as part of God’s plan.&nbsp.

&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. The British Admiralty in 1831 invited a naturalist to travel with Capt. Robert Fitzroy on a voyage in the HMS Beagle to survey Patagonia, Tierra del Fuego, Chile, Peru, and the Pacific Islands.&nbsp. Charles Darwin was recommended to join this voyage, and he journeyed with the Beagle for five years (Vardiman).&nbsp. His tour of the Cape Verde Islands provided him a practical application of Charles Lyell Principles of Geology with his views of volcanoes and other geological formations.&nbsp. In his time, he was able to witness massive erosion downstream coming from glaciers.&nbsp. He then thought that the glaciers could not have been formed the way they did if the Bible’s explanations would be believed (Vardiman).&nbsp. He then considered truths on the grounds of Lyell and his doctrine of uniformitarianism.&nbsp. He saw his first tropical rain forest in Brazil and his first fossils in Argentina.&nbsp. He also saw the tribe of savage men in Tierra del Fuego. then, he experienced his first earthquake in Chile.&nbsp. He climbed mountains, he observed finches with varying beak lengths, and he traveled the Galapagos islands, Australia, New Zealand, South Africa, Brazil, and then back to England (Vardiman).&nbsp.

Do research online to identify the capabilities of digital asset management software. What are the top rated digital asset management software products? Who uses this software? 

WEB-BASED CASE

BBC Digital Media Initiative Revisited 

The National Audit Office (NAO) scrutinizes public spending in the United Kingdom. Its memorandum on the BBC’s DMI project reported on several key findings. First, the in-house team was severely challenged by the fact that the project was already 18 months behind schedule when they began work on the project. Second, the technology team issued releases throughout the project that did not meet end-user expectations and eroded confidence in the project. Third, the BBC focused more on the technological development rather than on encouraging organization-wide changes in workflow that would encourage adoption. Finally, the NAO concluded, the DMI lacked governance arrangements for the scale, risk, and complexity of the project.

Do research online to identify the capabilities of digital asset management software. What are the top rated digital asset management software products? Who uses this software?

Given the NAO’s findings and what you discover about available off-the-shelf products, would it have been wiser for the BBC to adopt a collection of these existing products?

 What actions would be necessary to gain the cooperation of the business units to incorporate this collection of products into their work processes? 

Answer all the questions 1000 words.NO PLAYGIRIZUM. PLAGIARISM REPORT NEEDED.SUBMIT IN TIME.

Create a detailed outline for a security plan for the e-commerce website you prototyped in Week Two.

Review figure 5.12, Developing an E-Commerce Security Plan. (Attached File)

 

Create a detailed outline for a security plan for the e-commerce website you prototyped in Week Two. (See attached file for week two prototype)

 

Include at least five subtasks for each of the five major tasks/steps listed in the figure.

 

Provide a description of the security risks most likely to be encountered.

Programming Problems

Programming Problems

What are programming problems? Below I have listed the second assignment for you to do.  Every assignment should be submitted with a cover page.  With that being said please do the following assignments.

** To complete this assignment Chapter0 – Chapter3 should be reviewed.  Also see the document “Introduction to Raptor Tutorials” for assistance using Raptor.

2nd Assignment is located in the AITT-Summer 2018\Assignments folder.  Please answer all questions and submit. The questions can be answered within the document.

https://eazyweezyhomeworks.com/vehicle-shopping-workbook/

1)  AITT4300 – Assignment2

The second part of the assignment is also located in the AITT-Summer 2018\Assignment folder.  The document isAITT4300_Chapter3_PC_1-5.

2)  Under the section Programming Challenges (page 177), do questions 4 and 5.  This assignment should be done in a project format.  The two problems are to be submitted as one project.

I. Cover Page

II. Background/Theory

III. Problem Statement

IV. Pseudocode

V. Flowchart

VI. Code

VII. Results

VIII. Conclusion

 

Below I have listed the first assignment for you to do.  Every assignment should be submitted with a cover page.  With that being said please do the following assignments.

** To complete this assignment Chapter0 – Chapter3 should be reviewed.  Also see the document “Introduction to Raptor Tutorials” for assistance using Raptor.

1st Assignment is located in the AITT-Summer 2018\Assignments folder.  Please answer all questions and submit. The questions can be answered within the document.

1)  Try_It_Yourself_AppendixA_Exercises

2)  Try_It_Yourself_AppendixB_Exercises

2nd Assignment is also located in the AITT-Summer 2018\Assignment folder.  The document is Chapter3_Questions.pdf.

1) Under the section Programming Problems (page 161), do questions 1 and 2.  This assignment should be done in a project format.  The two problems are to be submitted as one project.

I. Cover Page
II. Background/Theory
III. Problem Statement
IV. Pseudocode
V. Flowchart
VI. Code
VII. Results
VIII. Conclusion

Maths Homework

  • 1) Draw the following directed graph
    G = (V, E)
    V = { u, v, w, x, y ,z }
    E = { (u,v), (v,w), (w,z), (z,v), (v,y), (x,v), (x,x) }
  • 2) Visually show each step of the DFS algorithm’s execution as done on textbook page 605
  • 3) Create and visually show a (max) heap using the following numbers as shown on textbook page 152.
    Numbers: 3, 2, 8, 23, 10, 14, 7, 20, 1, 5, 13, 6, 1

Please use the attached textbook for reference as stated in the homework quesitons

Vehicle shopping workbook

A Skills Approach: Excel 2016 Chapter 3: Using Formulas and
Functions
1 | Page Challenge Yourself 3.3 Last Updated 3/19/18
Challenge Yourself 3.3
In this project you will complete a vehicle shopping workbook to compare the purchase of several vehicles. After
completing the project, you can make a copy of the file and use it to compare vehicle purchases you are
considering for yourself. Be sure to save your work often!
Skills needed to complete this project:
• Naming Ranges of Cells
• Calculating Averages
• Finding Data Using the VLOOKUP Function
• Working with Named Ranges
• Using the Function Arguments Dialog to Enter Functions
• Using the Logical Function IF
• Calculating Loan Payments Using the PMT Function
• Creating Formulas Referencing Data from Other Worksheets
• Displaying and Printing Formulas
• Finding Errors Using Trace Precedents and Trace Dependents
• Finding Minimum and Maximum Values
• Using Formula AutoComplete to Enter Functions
• Updating Named Ranges with the Name Manager
• Editing and Deleting Names with the Name Manager
• Checking Formulas for Errors
1. Open the start file EX2016-ChallengeYourself-3-3. The file will be renamed automatically to include your
name. Change the project file name if directed to do so by your instructor, and save it.
2. If the workbook opens in Protected View, click the Enable Editing button in the Message Bar at the
top of the workbook so you can modify it.
3. The registration fee information in cells B11:C17 on the Data sheet will be used in lookup formulas later in
this project. Name the range RegistrationFees to make it easier to use later.
4. Return to the Purchase worksheet.
5. Calculate the average MPG for each vehicle.

https://eazyweezyhomeworks.com/racial-disparities-in-the-federal-death-penalty/
a. Enter a formula in cell C10 using the AVERAGE function to calculate the average value of C8:C9.
Use only one argument.
b. Copy the formula to the appropriate cells for the other vehicles.
c. Excel will detect a possible error with these formulas. Use the SmartTag to ignore the error. Hint: Use
the SmartTag while cells C10:F10 are selected and the error will be ignored for all the selected cells.
6. Calculate the registration fee for each vehicle.
a. Enter a formula in cell C13 to look up the registration fee for the first vehicle. Use the vehicle type in
cell C4 as the Lookup_value argument. Use the RegistrationFees named range as the Table_array
argument. The registration fees are located in column 2 of the data table. Require an exact match.
b. Copy the formula to the appropriate cells for the other vehicles.
Step 1
Download
start file
A Skills Approach: Excel 2016 Chapter 3: Using Formulas and
Functions
2 | Page Challenge Yourself 3.3 Last Updated 3/19/18
7. Determine whether or not you will need a loan for each potential purchase.
a. In cell C15, enter a formula using an IF function to determine if you need a loan. Your available cash is
located on the Data sheet in cell A3. If the price of the car is less than or equal to your available cash,
display “no”. If the price of the car is more than your available, cash, display “yes”. Use absolute
references where appropriate—you will be copying this formula across the row.
b. Copy the formula to the appropriate cells for the other vehicles.
8. Calculate how much you would need to borrow for each purchase.
a. In cell C16, enter a formula to calculate the price of the vehicle minus your available cash (from cell A3
in the Data worksheet). Use absolute references where appropriate—you will be copying this formula
across the row.
b. Copy the formula to the appropriate cells for the other vehicles.
9. Calculate the monthly payment amount for each loan.
a. In cell C20, enter a formula using the PMT function to calculate the monthly loan payment for the
first vehicle.
• Hint: Divide the interest rate by 12 in the Rate argument to reflect monthly payments.
• Hint: Multiply the number of years by 12 in the Nper argument to reflect the number of monthly
payments during the life of the loan.
• Hint: Use a negative value for the loan amount in the Pv argument so the payment amount is expressed
as a positive number.
b. Copy the formula to the appropriate cells for the other vehicles.
10. Compute the monthly cost of gas.
a. In cell C21, enter a formula to calculate the number of miles you expect to drive each month. Divide
the value of number of miles (cell A5 from the Data sheet) by the average MPG for the vehicle
multiplied by the price of a gallon of gas (cell A6 from the Data sheet).
b. Copy the formula to the appropriate cells for the other vehicles.
c. If cells D21:F21 display an error or a value of 0, display formulas and check for errors.
d. If you still can’t find the error, try displaying the precedent arrows.
e. Hint: The references to the cells on the Data sheet should use absolute references. If they do not, the
formula will update incorrectly when you copy it across the row.
11. Compute the monthly cost of maintenance.
a. In cell C22, enter a formula to calculate the monthly maintenance cost: Divide cell C12 by 12.
b. Copy the formula to the appropriate cells for the other vehicles.
12. Compute the monthly cost of insurance.
a. In cell C23, enter a formula to calculate the monthly insurance cost: Divide cell C14 by12.
b. Copy the formula to the appropriate cells for the other vehicles.
A Skills Approach: Excel 2016 Chapter 3: Using Formulas and
Functions
3 | Page Challenge Yourself 3.3 Last Updated 3/19/18
13. In cells C24:F24, compute the total the monthly cost for each vehicle.
14. Determine which vehicles are affordable.
a. In cell C26, enter a formula using the IF function to display “yes” if the total monthly cost (cell C24)
is less than or equal to the total monthly amount available for vehicle expenses (Data sheet, cell A4).
Display “no” if the total monthly cost is not less than or equal to the total monthly amount available.
b. Copy the formula to the appropriate cells for the other vehicles.
c. Display formulas and use the error checking skills learned in this lesson to track down and fix
any errors.
15. Complete the Analysis section using formulas with statistical functions. Use named ranges instead of cell
references in the formulas. Calculate the average, highest, and lowest values for each of the following:
a. Price
b. MPG City
c. MPG Highway
d. Average MPG
e. Maintenance/Year
f. Registration Fee
g. Insurance/Year
h. Amount to Borrow
i. APR
j. Years
k. Loan Payment
l. Gas
m. Maintenance/Month
n. Insurance/Month
o. Total Monthly
Hints:
• Select cells B7:F24 and use Excel’s Create from Selection command to create named ranges for each
row using the labels at the left side of the range as the names.
• Open the Name Manager and review the names Excel created. Notice that any spaces or special
characters in the label names are converted to _ characters in the names.
• To avoid typos as you create each formula, try using Formula AutoComplete to select the correct
range name.
16. Before finishing the project, check the worksheet for errors.
17. Save and close the workbook.
18. Upload and save your project file.
19. Submit project for grading.
Step 2
Upload &
Save
Step 3
Grade my
Project

Create a security infrastructure design

Scenario: Create a security infrastructure design

Overview: Now that you’re super knowledgeable about security, let’s put your newfound know-how to the test. You may find yourself in a tech role someday, where you need to design and influence a culture of security within an organization. This project is your opportunity to practice these important skillsets.

Assignment: In this project, you’ll create a security infrastructure design document for a fictional organization. The security services and tools you describe in the document must be able to meet the needs of the organization. Your work will be evaluated according to how well you met the organization’s requirements.

About the organization: This fictional organization has a small, but growing, employee base, with 50 employees in one small office. The company is an online retailer of the world’s finest artisanal, hand-crafted widgets. They’ve hired you on as a security consultant to help bring their operations into better shape.

Organization requirements: As the security consultant, the company needs you to add security measures to the following systems:

  • An external website permitting users to browse and purchase widgets
  • An internal intranet website for employees to use
  • Secure remote access for engineering employees
  • Reasonable, basic firewall rules
  • Wireless coverage in the office
  • Reasonably secure configurations for laptops

Since this is a retail company that will be handling customer payment data, the organization would like to be extra cautious about privacy. They don’t want customer information falling into the hands of an attacker due to malware infections or lost devices.

Engineers will require access to internal websites, along with remote, command line access to their workstations.

Grading: This is a required assignment for the module.

What you’ll do: You’ll create a security infrastructure design document for a fictional organization. Your plan needs to meet the organization’s requirements and the following elements should be incorporated into your plan:

  • Authentication system
  • External website security
  • Internal website security
  • Remote access solution
  • Firewall and basic rules recommendations
  • Wireless security
  • VLAN configuration recommendations
  • Laptop security configuration
  • Application policy recommendations
  • Security and privacy policy recommendations
  • Intrusion detection or prevention for systems containing customer data
  • https://eazyweezyhomeworks.com/programming-problems/

 

 

 

 

**** This is an example*** I found same assignment on Chegg.com****

 

Introduction

This document describes how the functional and nonfunctional requirements recorded in the Requirements Document and the preliminary user-oriented functional design based on the design specifications.

Furthermore, it describes the design goals in accordance with the requirements, by providing a high-level overview of the system architecture, and describes the data design associated with the system, as well as the human-machine scenarios in terms of interaction and operation. The high-level system design is further decomposed into low-level detailed design specifications including hardware, software, data storage and retrieval mechanisms and external interfaces.

Purpose of the Security Infrastructure Design Document

The Security Infrastructure Design Document helps to document and track the necessary information required to effectively define architecture and system design in order to give the guidance on the security architecture of the IT environment that is going to be established.

  1. General Overview and Design Approach

2.1 General Overview

The client requires an IT infrastructure to perform their business activities that involve e-commerce applications and internal VPN access for their customers as well as employees with a high priority on the security and privacy of customer information and of the client’s as well

2.2 Assumptions/Constraints/Risks

Assumptions

It has been assumed that the employees are increased by 5% every year thereby reflecting the usage of the network bandwidth and increase of the devices that are connected to the enterprise network infrastructure.

Constraints

The following are the key considerations associated with the security of the infrastructure:

  • Authentication system
  • External website security
  • Internal website security
  • Remote access solution
  • Firewall and basic rules recommendations
  • Wireless security
  • VLAN configuration recommendations
  • Laptop security configuration
  • Application policy recommendations
  • Security and privacy policy recommendations
  • Intrusion detection or prevention for systems containing customer data

Risks

Since the infrastructure is meant to carry out the e-commerce related transactions that may involve third party merchant authorizations and financial related issues, a strict security mechanism needs to be enforced so as to ensure that there is no such issue related in customers transactions as it may affect the reputation of the organization.

Additionally, there should be a backup mechanism to take the data backups at regular intervals to deal with any unwanted situations like system failures, attacks by intruders etc.,

2.3 Alignment with Federal Enterprise Architecture

The proposed architecture strictly complies with federal Enterprise architecture, All the protocols being used, and the hardware interfaces used compiles with the industry standards as specified so as to ensure compatibility of the networks as well as the security in compliance with CMS Enterprise Architecture (EA)

  1. Design considerations

3.1 Goals:

The following are the desirable outcomes of the security infrastructure proposed to be implemented in the organization:

  • An external website permitting users to browse and purchase widgets securely.
  • An internal intranet website like that of a VPN for employees to use
  • Secure remote access for engineering employees
  • Reasonable, basic firewall rules
  • Wireless coverage in the office
  • Reasonably secure configurations for laptops
  • Privacy of the user data

3.2 Architectural Strategies

For external website to perform purchase activity by customers:

In order to provide a secure e-commerce transaction, the following are the primary which security goals include:

  • Protecting confidentiality of the data
  • Making sure that unauthorized persons or systems cannot access the information of users;
  • Making sure that the information accessed is genuine;
  • Making the data accessible and usable;
  • Logging the transactions for further reference and support activity
  • Verifying the authenticity of a person to perform a transaction.
  1. For intranet website accessed by employees:

Since the data is accessed by the company employees only it should be only available to company’s level of access making it private from other information being maintained on the infrastructure So,the following are the considerations in this case:

  • Making sure that the access is within their intranet by implementing a firewall mechanism
  • Specifying the authentication mechanism to access the website by the employees
  • Supervising the activities and user management on the website by an administrator
  1. Secure remote access for engineering employees

We can perform safe implementation of remote access control objectives based on the following security considerations:

Device type: What device types require remote access?

Role: What remote access is appropriate for that role given the device used?

Location. Is access from a public location, another company site, internal wireless, etc.?

Process and data: What processes and data are accessible given the first three access characteristics?

Authentication method: Does the need for strong authentication increase based on the device used, where it is used, and what it is allowed to access?

  1. Basic firewall rules to be implemented:

Block by default – to block all incoming and outgoing connections

Allow specific traffic – only allow specified IP addresses

Allow Inbound-only allowing intranet users

  1. Wireless coverage in the office

Can be provided with an 802.11 WLAN adapter/router with PSK(pre-shared key) configuration or a login based limited access to company WIFI by the employees

Security considerations: Should be Password protected and metered

  1. V-LAN Configuration:

VLAN network segmentation creates security zones that enables flexible and strong control of what a remote user can access. security zones separating incoming traffic from internal resources. Using dynamic VLAN assignments and access control lists, we can control user access based on the conditions

  1. Laptop Security configuration:

One of the most vulnerable parts of the infrastructure is the laptop computers that employees use. These devices can be responsible for bringing in viruses or malware or causing the organization to lose sensitive data. This can be checked using the techniques such as:

  • Encrypting the disks on the laptops
  • Ensuring Antimalware/Antivirus are up to date in regular intervals
  • White listing the devices on the network
  • Running a product such as System Center Configuration Manager, LANDesk, Altiris, or some other systems management platform
  1. Application policy recommendations
  • Integrate secure coding principles in all software components of infrastructure.
  • Perform automated application security testing as part of the overall application testing process.
  • Development and testing environments should redact all sensitive data or use de-identified data.
  • Compliance with industry standard data policies and protocols
  1. Security and privacy policy recommendations

Explain How the organization Collects and Use Personal Information

  • Cookie Policy– Cookies are used to store user preferences or shopping cart contents. Clearly explain your cookie practice.
  • How organization will Share Customer Information– Customers need to know that their data will only be used to complete the transaction and that any further use of that data (including selling or distributing it) requires their consent.
  • Contact Information– Make it easy for your customers to contact you or file a complaint.

Display Privacy Policy Make sure new customers or users have easy access to your policy mandatorily

Publish Email Opt-Out Policies – Include opt-out options in your email marketing

Get a Seal of Approval – Third party validation of your online privacy and security policy can enhance your credibility. And trust of security

Intrusion detection or prevention for systems containing customer data

As the demand for E-Commerce grows on the Internet so will the increasing potential for E-Commerce sites to be attacked. Implementing security methodologies pertaining to an E-Commerce environment is not a simple thing. It should consider various threats and anomalies that can cause an attack. This can be achieved though penetration testing and reverse engineering to detect by signature or by an anomaly. This can be achieved by a third-party IDS system readily available in the market

Summary

Thus, we can conclude the report of the security infrastructure of the organization has been assessed and recommendations were made as required for the proposed environment as specified

Key assets being protected:

Customer information, Company related information

Key threats to protect against:

Intrusion to website, Data Loss

Key activities to protect against:

Customer purchase of artifacts, payment transactions, employee data

Relative ranking of fundamental security goals:

This is an important exercise for every organization as part of the risk mitigation planning process. For this project, the ranking came out like this:

Confidentiality: high

Integrity: high

Availability: medium

Auditability: medium

Nonrepudiation: N/A

 

 

Assignment 2

WEEK 1

 

In order to complete the labs, you must install WAMP, the development server, and a PHP editor of choice, on your Windows computer.

A.                Install the WAMP Development Server following steps in Appendix B.

Install the PHP Editor Tools following steps in Appendix A

For the power users that want to step up from editing using Notepad, install one of these preferential PHP code editor:
⧫    Microsoft Windows WordPad Editor (an optional improvement)

⧫    Microsoft Web Expressions 4.0 (the recommended improvement)

⧫    Microsoft Visual Studio Editor (an optional improvement) Complete Lab Work:

 

o   Discovery Project 1-1 (p.72)

o   Discovery Project 1-2 (p.72)

o   Discovery Project 1-3 (p.73)

o   Discovery Project 1-4 (p.73)

 

WEEK 2

 

●  Save any coded PHP programs and scripts in the directory C:\wamp64\www\Wk2Exercise where you will ZIP and Submit the weeks PHP scripts and programs.

●  Submit the completed Exercises (Zip file of Wk2Excercise) directory to the dropbox under the Week1: Assignment submission area as an attachment.

Reinforcement Exercises

o   Exercise 4-1 (pages 221-224)

o   Exercise 4-2 (pages 224-227)

o   Exercise 4-3 (page 228)

o   Exercise 4-4 (page 228)

o   Exercise 4-5 (page 228)

 

o   Exercise 5-1 (pages 288-289)

o   Exercise 5-2 (pages 289-291)

o   Exercise 5-3 (page 291)

o   Exercise 5-4 (page 291)

o   Exercise 5-5 (pages 291-292)
o   Exercise 6-1 (pages 369-373)

o   Exercise 6-2 (page 373)

o   Exercise 6-3 (pages 373-376)

o   Exercise 6-4 (page 376

o   Exercise 6-5 (page 376)

 

 

2.Establish a procedure for your organization on how to validate a new forensics software package. Write 3 to 4 pages outlining the procedure you plan to use in your lab

.You have just been hired to perform digital investigations and forensics analysis for a company. You find that no policies, processes, or procedures are currently in place. Conduct research to find information, and then create a policy and process document (3 to 4 pages in length) to provide the structure necessary for your lab environment. Be sure to cite your online sources and follow APA formatting.(3,4)

2.Establish a procedure for your organization on how to validate a new forensics software package. Write 3 to 4 pages outlining the procedure you plan to use in your lab. Be sure to cite references, such as the ISO standard or NIST, to support your procedure. Make sure you use APA formatting.(chapter 5,6)

3.As part of the duties of a digital forensics examiner, creating an investigation plan is a standard practice. Write a 3 to 4 (not including title or reference page) page paper that describes how you would organize an investigation for a potential fraud case. In addition, list methods you plan to use to validate the data collected from drives and files such as Word and Excel, with hashes. Specify the hash algorithm you plan to use, such as MD5 or SHA1. Make sure you follow the grading rubric and write your paper in APA format.(chapter 9,10)

4. A mother calls you to report that her 15-year-old daughter has run away from home. She has access to her daughter’s e-mail account and says her daughter has a number of emails in her inbox suggesting she has run away to be with a 35-year-old woman. Write a 2 to 3 page paper/report (not including title or reference page) explaining how you should proceed. Make sure you adhere to the grading rubric and write the report in APA format.(chapter 11,12)

· 3-4 pages in length  (excluding cover page, abstract, and reference list)

· APA format, Use the APA template located in the Student Resource Center to complete the assignment.

· Please use the Case Study Guide as a reference point for writing your case study.

Refere text book :