Discipline: Computer Science

network administrationnetwork administration

There are several different firewall architectures available: Main Border Firewall Screened Firewall Internal Firewall Host Firewall DMZ Firewall In this discussion, you are to describe each of these and describe when they could/would be used. Additionally, how can these be layered and used together to provide better security? What could be a disadvantage to using […]

Computer Architecture March 22Computer Architecture March 22

Amazon Pay by Palm? https://youtu.be/4WaOq3wQlxI Read Article: Police Used 911 Call Analysis to Arrest a Mother on Murder  Discussion Questions:  How does Amazon’s pay by palm work? What are the privacy-related issues with storage of palm and other biometric data?  What are some potential risks with using Amazon’s Pay by palm innovation?  Which states have […]

Week 3Week 3

 In order to complete assignment #3 you will need to answer the below questions. Please complete the questions in a Word document and then upload the assignment for grading. When assigning a name to your document please use the following format (last name_Assignment #3). Use examples from the readings, lecture notes and outside research to […]

DiscussionDiscussion

– need to write one page   In 50-100 words, please explain in your own words how threats are modeled and assessed in the cybersecurity world.  In 50-100 words, please explain the vulnerabilities of applications and how they are mitigated. In 50-100 words, please characterize the risks involved in Mobile and Internet of Things (IOT) […]

IT 275 Unit 3 LabIT 275 Unit 3 Lab

  Unit 3 Lab: Adding a Hard Drive Outcomes addressed in this activity: Unit Outcomes: Modify the system to add storage devices, such as disk drives, to the system. View available disks. Partition disks. Course Outcome: IT275-2: Configure the key features of the Linux operating system. Purpose This lab focuses on adding a hard drive to […]

Computer Science AssignmentComputer Science Assignment

 Review The Power of Good Design and select three of the ten principles noted for good design. Next in R, utilize these three principles in a problem that you will solve. First note the problem to solve, the dataset (where the information was pulled from), and what methods you are going to take to solve […]

Computer ForensicsComputer Forensics

 You are required to write a 7-10 page research paper, double-spaced, on a current topic within the realm of digital forensics. The topic needs to be approved by the instructor when you submit the Abstract (Week 7). The paper has to be well referenced. This is defined by having at least two “peer reviewed” references […]