My Dream Computer

My Ideal PC

#1. Introduction

Understanding that life is continuous learning and discovery process has, over the years, fueled my need and wish to build my dream computer. In my early days, I used to dream of having a computer that was just stylish, had cutting-edge designs and that could support and play my favourite computer game, Grand Theft Auto. My entire perspective about computers changed when I joined this class and was introduced to another dimension of computing       

Anyone who dreams or wishes to have a computer envisions a device that can satisfy their immediate and future needs. As a perpetual student, I would desire to acquire a superior pc that will guarantee an excellent experience during the execution of my work and leisure. Computer systems vary and can be categorized in the lines of their storage capacity, processing capabilities and speeds, their output video and sound quality, their workability, speciality among other features. This is for the reason that there are several computer brands in the market today such as Dell, Apple, Toshiba, HP, Asus among many others that all compete to different customer needs. Such electronic-based firms have concentrated on satisfying client needs that they offer a wide range of models of machines in which customers can pick from. With the Continuous innovation and accomplishments in systems hardware capabilities, computers are bringing imaginations closer to reality. (O’Neill (née McLoone) & Robshaw, 2010)

My computer needs are practically based on the ability to have lighting processing speeds and vast storage capacities. Playing computer games is not something I do very often but I spend countless hours on Youtube and other social networking sites watching videos, reading content and liking pictures, therefore, I would consider the good screen size and its optimum resolution capability. Downloading documents, audio files, videos and software’s is very important especially for future references offline. According to Aswani (2010), PCs should be equipped with high resolutions and graphics capabilities, which is crucial in gaming. To be able to store everything I need continuously, I need a hard disk with terabyte storage and above. Such HDD size will allow me to partition my storage and arrange school-related data and leisure accordingly. I would also like a to accommodate the Linux operating system in dual boot mode therefore good storage will surely come along way.

 Additionally, a good set of output speaker will be imperative since I listen to many music genres and watch many videos every day. As a perpetual scholar, always researching something new, internet capability is of primary concern. The ability to be able to quickly surf the internet without encountering processing issues despite running multiple programs such as a word processor in the background is crucial as it ensures completion of assignments and academic papers. My coding projects and classes utilize a sizeable amount of memory and processing power therefore that too will come into play as well.

Security of my documents and files is also a key factor in my dream computer as unauthorized users will not be granted access to my files. Computer attacks such as viruses and ransomware are continuously increasing in the modern world, there is a need to have measures such as firewalls and antiviruses that can contain this situation. Portability of the computer will be essential since I will be constantly on the move from one classroom to the next. An effortlessly portable and less strenuous computer will be of high consideration.

#2.  Computer Specifications

The motherboard would be the first thing I select after choosing a good exterior casing to enclose all the computer components such as the power supply, 2.0 ports, audio and video ports and the cooling fans. When choosing a good casing, the Sentey Slim 2421 Flex Case with LCD Case comes in mind as it can support both Mini ITX and Micro ATX motherboards. Additionally, its stylish compact design and black glossy exterior outlook support most if not all power supplies available in the market as well as the profile cards. It also has a unique sliding bay that supports video and audio ports, 4*2.0 USB ports as well as a cooling fan compartment. After assessing the casing, I would look for the motherboard and I settled on the Asus P5Q Pro Turbo Motherboard. This motherboard is equipped with 4 RAM slots with 2*240 pin DIMM which I consider adequate for my envisioned use. Choosing a good CPU is a very important step since it is the brain of the computer. Therefore, the CPU I have chosen for my dream computer is the 8-core AMD FD9590FHHKWOF FX-9590 8-core 4.7 GHz Socket AM3+ 220W. This guarantees high optimized processor speeds of 4.7GHz as well as high power since it has 8 cores powered by a 64bit data width. These speeds will largely contribute when running multiple computer programs simultaneously.

After picking the CPU, the next logical step would be to get a good CPU cooler to control the overheating of pieces of equipment due to high processing speeds its subject to and in the long run this will reduce wear and tear. A good CPU Cooler for my computer would be the be quiet! Dark Rock Pro 3 67.8 CFM Fluid Dynamic Bearing CPU Cooler. This quiet cooler as suggested in the name is a great way to cool down the PC so that I can simultaneously listen to my playlist rather than listen to the sound of a roaring fan.

Once the CPU fan is installed, getting a good RAM is the next step toward attaining a Dream Computer. With the motherboard, I selected supporting four 240 pin DIMM – adding a good memory package of Corsair Vengeance Blue 16GB (2×8 GB) DDR3 1600MHz (PC3 12800) would adequately boost my machine. With adequate RAMs in place, A good internal storage device such as 4TB 3.5” 5900RPM Seagate Hard Drive and also an external 2TB Western Digital hard drive would guarantee that the system has a large amount of storage. The external drive would secure my backed-up data should anything physically happen to the computer. In the past, I have lost my data as a result of hard disk failure and it is such a disaster trying to access assignments and important documents once the drive is has malfunctioned. A backup is extremely necessary for important data.

As an entertainment pc, my computer would be a more of a working system therefore I would opt for a faster and quieter machine that would make zero noises during use. Nonetheless, my audio and video features would need to be of top-notch quality so that I can listen to the tons of music albums while I work or relax. I chose the Z PCIe 24-bit 96 kHz sound card from Creative Labs for these capabilities. While the cost of this peripheral is well below $100, the card can produce a relatively excellent signal to the ratio of noise to close to 116db creating a crystal sound when recording sound or listening to audio files. To adequately get in full the clarity of the sound, a good set of speakers would have to be used hence prompting the adoption a surround sound system that is firstly certified by the THX, can effectively yield good sound within the right amount of power and that can be durable over an extended period.

The next component in my computer would be an appropriate video card that would take pictures and videos on my display monitor come to life. Gaming may not be my hobby but I do enjoy watching funny video clips on crisp display, therefore, i would select the EVGA GeForce GTX TITAN X 12GB SC. As pointed in the name, the component comprises of an inbuilt fan for self-cooling, a support 4-way SLI, a 12GB memory and a 1.13GHz core clock. While the rest of the components are worth well under $1000, this expensive component clocks over and above $1000 and is probably the most expensive part of the dream computer puzzle.

With such a graphics card in place, the rightly sized monitor with optimal resolution would do justice to the other components. I would select the 23” Acer H236HLbid with a 1920*1080 widescreen resolution capability, a 60Hz refresh rate, 16:9 aspect ratio and a response rate of 5ms to adequately deliver the expected output. With all hardware in place, a proper power supply system would be required to guarantee that all devices can be adequately powered up and that there is no wattage loss of any kind. I estimate that all selected devices would require a projected wattage 265W. this would therefore require certified and relevant power supply hence the ATX power 80+ Gold Certified 750W EVGA. While this option carries a lot more power than I essentially require, I am not troubled by the system overload I might experience as a result. Additionally, installing an uninterruptible power supply (UPS) would be a logical decision as it would serve as a battery backup in case of a drop in voltage to deplorable levels or a failure in the main power supply. A UPS would therefore guarantee the correct and orderly systems shutdown of the computer and other connected devices.

Finally, with almost all the key components in place, the remaining piece to finish my dream computer would be a mouse and Logitech illuminated keyboard to allow to the access relevant applications that would also need to be installed in the system. when looking for software to install in the system, I will consider software’s that will be compatible with the Windows operating software. I would make certain have installed the entire Microsoft suite to guarantee that my classwork is handled smoothly going forward. I would also install a relevant integrated development environment (IDE) and compiler to help me handle my programming classes. For my entertainment, I would install social networking applications such as Instagram, Twitter, Tiktok and iTunes. Nonetheless, security is a top priority therefore I would install antivirus such as Kaspersky and execute firewalls that would protect my system against malware, viruses and unwanted intruders to the system.

#3. Diagrams of

ComponentSpecificationPictureRationale (Reason for Purchase)Cost Estimate (Amazon.com)
KeyboardLogitech IlluminatedThis part has an excellent backlight that aids during data entry. Its slim has letter etching on every key added shortcut ay the top of the component$90.00
CPU Coolerbe quiet! Dark Rock Pro 3 67.8 CFM Fluid Dynamic Bearing CPU CoolerThis part guarantees an effective cooling system with increased air circulation and less noise$89.99
ProcessorAMD FD9590FHHKWOF FX-9590 8-core 4.7 GHz Socket AM3+ 220W  This processor is a super-speed component with an 8-core with its clock speed set at 4.7 GHz$245.00
MotherboardAsus P5Q Pro TurboThis part has exceptional overlocking and top-class capacitors. Its power design is comprised of an 8-phase layout, it has a great express gate and an intelligent energy-saving system.$289.99
RAMCorsair Vengeance Blue 16GB (2×8 GB) DDR3 1600MHz (PC3 12800)   This component is having high performance and can dissipate heat as a result of its aluminium design$74.99
Hard disk-4TB 3.5” 5900RPM Seagate Hard Drive -2TB Western DigitalThese components act as System files storage and provide Backup$65.00 $99.99
An Operating SystemWindows 10 Pro  This part is the latest version of the Microsoft OS Windows. Its key features include automatic work saving, quick and easy access to features.$165.00
Graphics cardEVGA GeForce GTX TITAN X 12GB SCThis item provides a graphic performance with 4k capabilities, 7010 MHz effective memory clock and is a virtual reality ready$1,150.00
Sound CardCreative Labs Z PCIe 24-bit 96 KHzThis component supports the production of crisp sounds$119.99
MonitorAcer H236HL bid 23-Inch Widescreen LCD Monitor  This item has excellent resolution and an IPS colour performance feature$289.99
AntivirusKaspersky Total SecurityThis part secures the system and blocks dangerous threats. Easy user interface and has regular updates$29.99
TOTAL (Excluding Taxes)   $2709.93

#4. Summary

The most important components during specification is the graphics card, RAM, storage, processor among others. I have come to understand that there are different features a system offers and have been able to compare the various merits of using a high-end computer. Secondly, I have learnt that there are several computers in the market today all created to serve a particular niche, therefore, a computer I not just a computer if it has not been tailored to cater for your direct needs. Additionally, I have learnt that in the assembly of computer parts to make your dream computer, the purpose of the dream computer must stand out in choices and the decision-making process concerning the ability of technological incorporation into the system. I am an enthusiast and more importantly a student about life, therefore, owning a superior system that can service my desires and needs such as fast processing, durable and sizable storage spaces can go a long way in helping me achieve set objectives on time.

With The overload in computer brands and components in the market today, it has been extremely challenging, confusing and overwhelming to get the right product to match my needs due to product similarity, ambiguity and most importantly information overload (Nieman, 2009). Nonetheless, if I had the chance of building this system according to my personal needs, the biggest thing that would concern me other than the costs would have to be the compatibility of the individual components since a mismatch would mean that the system would not work smoothly or even work at all.

References

Aswani, K., & Srinivas, S. (2010). Concept lattice reduction using fuzzy K-Means clustering. Expert Systems with Applications, 37(3), 2696-2704. doi:10.1016/j.eswa.2009.09.026

Nieman, A. (2009). Cyberforensics: Bridging the law/technology divide. Journal of Information, Law & Technology, (1). Retrieved from http://go.warwick.ac.uk/jilt/2009_1/nieman

O’Neill (née McLoone), M., & Robshaw, M. (2010). Low-cost digital signature architecture is suitable for radio frequency identification tags. IET Computers & Digital Techniques, 4(1), 14-26. doi: 10.1049/iet-cdt.2008.0165

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now

Use SSL Labs to test and score the TLS certificate of your company, school, or personal website.

ISEC 650 Homework 8

Please use APA style formatting.

Question-1

Network administrators hide the IP addresses of the internal workstations and servers from the Internet by enabling Network Address Translation (NAT) on perimeter devices. Does this mean that these internal endpoints are secure? Does NAT contribute to the security of the networks? Explain and justify your responses. Please review existing literature for the security implications of NAT.

Question-2

Use SSL Labs to test and score the TLS certificate of your company, school, or personal website. (Note that you should find a TLS-configured website)

https://www.ssllabs.com/ssltest/

Share the screenshot of the result like below. Summarize the discovered weaknesses of the TLS certificate. If there is no weakness discovered, please summarize the top-notch security features of the TLS certificate.

Question 3 – Weekly Learning and Reflection

In two to three paragraphs of prose (i.e., sentences, not bullet lists) using APA style citations if needed, summarize and interact with the content that was covered this week in class. In your summary, you should highlight the major topics, theories, practices, and knowledge that were covered. Your summary should also interact with the material through personal observations, reflections, and applications to the field of study. In particular, highlight what surprised, enlightened, or otherwise engaged you. Make sure to include at least one thing that you’re still confused about or ask a question about the content or the field. In other words, you should think and write critically about what was presented and what you have learned through the session. Questions asked here will be summarized and answered anonymously in the next class.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now

Compare and contrast host and network-based intrusion detection systems.

Please use APA style formatting.

Question 1

Compare and contrast host and network-based intrusion detection systems. If restricted to choosing only one solution, would you select HIDS or NIDS? Provide rationales for your selection.

Question 2

Can an Intrusion Detection System and Intrusion Prevention system be alternatives? Please explain.

Question 3

Describe the role of distributed systems in the detection of attacks.  

Question 4

Describe the role of honeypots in the discovery of attacks.

Question 5 – Weekly Learning and Reflection

In two to three paragraphs of prose (i.e., sentences, not bullet lists), using APA style citations if needed, summarize and interact with the content covered this week in class. In your summary, you should highlight the major topics, theories, practices, and knowledge covered. Your summary should also interact with the material through personal observations, reflections, and applications to the field of study. In particular, highlight what surprised, enlightened, or otherwise engaged you. Include at least one thing you’re still confused about or ask a question about the content or the field. In other words, you should think and write critically about what was presented and what you have learned through the session. Questions asked here will be summarized and answered anonymously in the next class.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now

Discuss how computer forensics investigations pertain to the law and trying of cases.

Suppose you were recently hired for a new position as the computer forensics specialist at a medium-sized communications company. You have been asked to prepare a presentation to the Board of Directors on your main duties for the company and how your position could help achieve business goals based on security and confidentiality. You are also aware that the company has just had some issues with employee complaints of ongoing sexual harassment over email and instant messaging systems but has been unable to obtain adequate evidence of any kind.

Write a two to three (2-3) page paper in which you:

  1. Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist.
  2. Provide an overview of how computing devices are used in crimes of today and how these crimes can affect a company’s data and information.
  3. Discuss how computer forensics investigations pertain to the law and trying of cases.
  4. Explain how you could assist in investigating the potential ongoing sexual harassment complaints and determine how you would communicate this to the Board of Directors.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

 

  • Identify the role of computer forensics in responding to crimes and solving business challenges.
  • Outline system forensics issues, laws, and skills.
  • Use technology and information resources to research issues in computer forensics.
  • Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now

Develop a piece of communication using words, pictures, diagrams and/or charts. You might like to use PowerPoint, Word, Publisher or some other similar computer program. Design your piece of communication to communicate to the manager of the service. You are communicating a rich and deep understanding about “value in the exchange” in the context of a branded service.

Develop a piece of communication using words, pictures, diagrams and/or charts. You might like to use PowerPoint, Word, Publisher or some other similar computer program. Design your piece of communication to communicate to the manager of the service. You are communicating a rich and deep understanding about “value in the exchange” in the context of a branded service..

Develop a piece of communication using words, pictures, diagrams and/or charts. You might like to use PowerPoint, Word, Publisher or some other similar computer program. Design your piece of communication to communicate to the manager of the service. You are communicating a rich and deep understanding about “value in the exchange” in the context of a branded service.

You have three pieces of assessment in this course.
1. 20% Assignment 1 – focuses on “unpacking” value in the exchange.
Valuing a service experience
The two assignments centre on a service experience, in which you are the client. Because you are a client of the service – you are also the target market (audience) for the service. You are developing a piece of communication for the manager of the service (the manager is your audience). You are providing the manager with information about their target audience (you). Managers use information about their target audience to improve their service delivery (value in the exchange) and/or as an opportunity to expand or extend value co- creation. For a manager to develop strategy and ways to add/create/extend value for their target market (you), firstly, the manager must understand their target audience (you).
The assignment gives you an opportunity to build self-awareness skills by asking you to self-reflect and to learn more about yourself as a consumer.
A service experience
Please think carefully when selecting your service experience. Ideally, the service experience you choose should be one that is personally relevant to you, and therefore, easy to write about (e.g. gym, beauty spa, playing sport, going to the movies or a regular restaurant or uni). The service experience ideally would be something that you engage with (as a client/consumer) at least twice a month, and preferably, an experience you engage with on a more regular basis (e.g. once a week or more).
Some examples that are suitable to choose for your assignments are:
Choose 1 from this A to F topic
a) Gym membership and regular attendance
b) Playing member of a sporting club
c) Regular at a favourite cinema
d) Regular at a favourite restaurant
e) Regular at a favourite massage or beauty spa
f) University education (online or on-campus student experience)
Before selecting your service experience, you might like to read the assignment instructions.
Assignment 1 – Value in the exchange (20%)
Task
Develop a piece of communication using words, pictures, diagrams and/or charts. You might like to use PowerPoint, Word, Publisher or some other similar computer program. Design your piece of communication to communicate to the manager of the service. You are communicating a rich and deep understanding about “value in the exchange” in the context of a branded service. The specifics of this assignment are below.
1. Select a branded service that you engage with on a regular basis (at least twice a month). The service could be a favourite restaurant that you go to on a regular basis or a business that provides you with a regular massage and beauty treatments, or a favourite cinema where you watch movies, or regular sporting activity you play (e.g. futsal, golf or football) or a gym where you regularly exercise. The service should be branded – that is have a brand name that is easily recognisable (e.g. Snap Fitness or City Golf Club or Grill’d).
2. Identify the service (product) and brand. For example, Grill’d is the brand and the service (product) is a restaurant. Snap Fitness is the brand and the service (product) is gym membership. City Golf Club is the brand and the service (product) is golf. Once you have identified the service (product) and brand, please develop a title for your assignment. Please make sure that the name of the brand and the service are in the title of your assignment. Your assignment should have a title page. The title page should also have a date, your name and student number on it and act as a cover page for your assignment.
3. Select a method for presenting your assignment. You may choose to develop your assignment in Word or PowerPoint (or similar). If you are using PowerPoint, please place your written material in the “notes section” of
PowerPoint. If you are using Word, please insert your diagrams and pictures with the words – that is insert the illustrations as close to as possible to the words. This way the pictures and diagrams provide meaning to the words. Do not insert pictures and diagrams in an Appendix. Regarding your pictures and diagrams, please ensure you correctly label all of them and reference those you have not developed yourself (using Harvard AGPS).
4. When developing your assignment, please aim the assignment at the CEO or the management team of the branded service. As such, write your assignment in second or third person. Essentially, you are providing the management team (or CEO) with information about their target audience (you).
5. The assignment should be no longer than 1200 words or 10 slides (if using PowerPoint). Please write your assignment using the active voice (you may want to look up the difference between active and passive voice in written communication). The active voice is a clearer and a more persuasive form of written communication. Professional marketers communicate persuasively. We are judging you on your written communication. The active voice is preferred.
6. You are to develop an assignment that has a structure similar to below
a. Title page (no more than eight words in the title)
b. Introduction (100 Words)
c. Value equation (300Words)
d. Decision making perspectives (250Words)
e. Risk and involvement(200Words)
f. Atmospherics(200Words)
g. Conclusion(150 Words)
7. The title page should have a catching title limited to eight words or less. Ensure your student name and student number are on the title page.
8. In your introduction section, briefly introduce the service (product; product category) and brand (no more than one page or one slide). If you provide
any history or background to the service (and brand), write no more than a paragraph and please ensure you reference any material using Harvard AGPS (http://www.usq.edu.au/library/referencing/harvard-agps-referencing-guide
). If you are unsure what referencing is, or why we reference material, please visit the library or click on the following link to find out more http://www.usq.edu.au/library/referencing .
9. The value equation for the branded service should include all of the benefits (utilitarian, hedonic, social and other) as well as all of the costs associated with the service (refer to the valuation equation in the materials).
a. Clearly differentiate and categorise the costs and benefits. You may like to construct a diagram to show your customer value equation for the target audience (you). If you do draw a diagram, label the diagram and discuss the diagram.
b. The value equation should clearly identify the value associated with the brand/service. You are trying to demonstrate to or show management “customer value” for the target audience (you).
10. Of the various decision making perspectives, identify which one(s) are the most fitting for your service (e.g., which did you go through when making the initial and subsequent decisions).
a. Name and describe the different decision making perspectives you undertook.
b. Consider whether the decision-making type is rationale, experiential or behavioural. Refer the materials for information about the various decision-making types.
c. Think about your first visit (decision), consider whether you engaged in extended decision-making or a limited decision the first time; and whether your subsequent decisions to return are habitual or because of brand loyalty.
d. You might like to present a table or a diagram illustrating the relevant decision-making perspective(s) for your target audience (you). Refer to your table(s) or diagram(s) and write in detail the decision-making perspective(s) you went through to help the manager understand decision making from the perspective of the target audience (you).

11. Describe the concepts of risk and involvement (and ensure you reference your findings when you use them in your assignment). Refer to your materials or locate information from e-books or the Internet to help you understand and explain these concepts.
a. Identify which types of risk you experience and explain to what extent you experienced these risks.
b. Similarly explain the extent of your involvement with the consumption of the service when experiencing (consuming) the service (on a regular basis).
12. Explain the impact (influence or affect) of atmospherics on the consumption of the branded service.
a. For example, explain how the lighting, any smells, the colours, the floor layout, any spacing of equipment or the spacing of tables, the people (customers/staff), any crowding etc. influences your value perceptions (positively/negatively). In your materials, there is information on atmospherics, including the different groupings of atmospherics.
Atmospherics are an important component in a service experience. As such, it is important for managers to have a good understanding of the positive and negative impacts of atmospherics on the value perceptions of their target market (you).
13. Conclude your assignment (limit of one page or one slide) by briefly summing up and explaining the value in the exchange. In this section, you might like to assess and prioritise elements that influenced (positively/negatively) or changed/altered your value perceptions during consumption (value in the exchange) and decision-making (value in the exchange).
a. Consider that this section is useful to a manager as it provides him/her direction about the elements that are most valuable to the target audience. This is important to a manager when developing strategies to co-create value.
14. Save your assignment document as follows:
Student number_MKT1002A1
Please insert diagrams or picture of brand as require and also give referencing to used diagrams and picture if you don’t create by your self.
At least 10 references are required at th

Develop a piece of communication using words, pictures, diagrams and/or charts. You might like to use PowerPoint, Word, Publisher or some other similar computer program. Design your piece of communication to communicate to the manager of the service. You are communicating a rich and deep understanding about “value in the exchange” in the context of a branded service.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now

Topics Computer Forensics Forensic Nursing Serology/Biology

Topics Computer Forensics Forensic Nursing Serology/Biology.

Description
Students will write a scholarly paper that is a minimum of 8-10 pages in length (8-10 pages excluding the title page, abstract, and reference page) References may be found in the APUS library or search engines such as Google Scholar. The paper must include at least five, peer-reviewed sources that cover your chosen topic from the list below. Keep in mind that 5 is the minimum. A good quality research paper usually contains in excess of 10. Sources should be less than 10 years old and if using statistical data, it should be less than 5 years old. Do not forget to use in text citations to credityour sources.

Note that references used for your research need to be peer-reviewed/scholarly journals. These journals typically have the following characteristics: 1. articles are reviewed by a panel of experts before they are accepted for publication; 2. articles are written by a scholar or specialist in the field; 3. articles report on original research or experimentation; 4. are often published by professional associations; 5. utilize terminology associated with the discipline. Use of newspapers, news magazines, and similar periodicals must be kept to a minimum, and will be acceptable only as sources for supplementary information. References like “Wikipedia,” “Psychology Today,” and “Court TV” are not primary sources, are not peer reviewed (reviewed for empirical integrity, accuracy, and authenticity), and are not appropriate references for scholarly writing (with the possible exception of use for anecdotal background information).

Research Paper Topics Computer Forensics Forensic Nursing Serology/Biology (CODIS database) Fingerprint Analysis (AFIS and IAFIS database) Touch DNA Analysis Ballistics (NIBIN database) Digital Photography Video Analysis The paper should be of high quality, free of spelling and grammatical errors, and of original work. Plagiarism will not be permitted and occurrences of it will result in the procedures outlined in the “Student Handbook.” PLEASE DO NOT DIRECT QUOTE… WHEN QUOTING PLEASE

Topics Computer Forensics Forensic Nursing Serology/Biology

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now

Killing with keyboards

Killing with keyboards.

Topic: Killing With Keyboards

Please look at the file “Killing With Keyboards,” from the class Course Materials/copied resources (file is 14840keyboard.pps), then answer the following questions: What is at risk here? Identify 5 possible threats and 5 vulnerabilities in this scenario. Discuss measures that could be taken to reduce the risks.   250 words

killing with keyboards

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now

Most of the posts I have looked at from other classmates start with some definition of Artificial Intelligence (AI). I like the one that defines AI as a sub-field of computer science with the goal of enabling the development of computers that are able to

Most of the posts I have looked at from other classmates start with some definition of Artificial Intelligence (AI). I like the one that defines AI as a sub-field of computer science with the goal of enabling the development of computers that are able to.

Most of the posts I have looked at from other classmates start with some definition of Artificial Intelligence (AI). I like the one that defines AI as a sub-field of computer science with the goal of enabling the development of computers that are able to do things normally done by people — in particular, things associated with people acting intelligently (Hammond, 2015). The question then is how we relate this to the world of business. AI producing intelligence is defined in the text as detecting and interpreting signs that indicate a situation which needs attention (Haag, 2016). With this in mind, the biggest advantage I see is that of saving a ton of time and money in the form of man-hours. What took a human with a calculator hours to compute can now take a computer program fractions of a second to perform. The major disadvantages of AI though, aren’t AI’s fault at all but an error in the human programming of the AI or the input of information into the system done by, you guessed it, a human. An example most of us can relate to is military finance. I seriously don’t know of a single person in the military who hasn’t had some issue or error with the finance department at some point in time in their career. Most, if not all, of the time it is someone entering an incorrect code or fat fingering numbers that cause us to receive the incorrect pay or bonus. Higher education institutions can benefit from AI in many ways. One way Southwestern uses AI is through the use of the program called SafeAssign. This AI program simply compares submitted papers with multiple databases throughout the Internet. What used to take dedicated and very thorough instructor hours now takes an AI program no time at all. Not only does SafeAssign save untold man hours, it also does a more complete and accurate job. In our current project of finding the correct AI application to handle financial information for a small business, I feel the phases that will deal with selecting and integrating the best program are phases 4-6. In the development phase, we will be creating or organizing the information we want the AI program to handle and prepare it for testing. In the testing phase, we will take the information and input it into the program to find any issues or “bugs” that result from the information. Finally, we will implement the program by switching over to the chosen program and letting it become the “new normal”, if you will. Hammond, K. (Apr 10, 2015) What is artificial intelligence. What is artificial intelligence (AI), and what is the difference between general AI and narrow AI? Retrieved from http://www.computerworld.com/article/2906336/emerging-technology/what-is-artificial-intelligence.html Haag, S. & Cummings, M. (2012) Information Systems Management. For the Information Age,98-99. New York City, New York: Mcgraw-Hill Irwin

Most of the posts I have looked at from other classmates start with some definition of Artificial Intelligence (AI). I like the one that defines AI as a sub-field of computer science with the goal of enabling the development of computers that are able to

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now

Understanding Motivations For Computer Hacking

Understanding Motivations For Computer Hacking.

Course Objective
Analyze key psychological and sociological issues related to hackers and the potential impact on individual organizations and society as a whole. Answer all 4 topic questions with the minimum to two sources and no more than two paragraphs.
The class discusses ethical and non ethical hacker personalities and motivations, and profiling tools used by law enforcement in combating cyber threats. 
Topic 1: Hacker Motivation and Threat Mitigation
Explain what psychological factors can often motivate hackers (eg, addiction, crime, greed, status, etc….), and give examples where these motivations were a factor in a cyberattack.
What can organizations do to be more proactive in identifying and mitigating hacker threats?
Background:
1. Crime and Punishment: The Psychology of Hacking in the New Millennium [2003 – older but, I believe, still relevant and a solid short introduction]


2. Understanding a Hacker’s Mind: A Psychological Insight into the Hijacking of Identities [2004 – RSA. Also still useful]


3. The Risk Propensity and Rationality of Computer Hackers [2010 ]
Topic 2: Ethical and Nonethical Hackers
As the cybersecurity field expands, the larger community discourse leads to changes in terminology. While some of our course materials may differentiate between the terms “hackers” and “crackers” as threat actors, we will use the terms “ethical hackers” and “nonethical hackers” to make the same differentiation.
How do the profiles for ethical and nonethical hackers differ? Should these psychological attributes make a difference as to the amount of, or nature of the punishment meted out to those who are caught? Why or why not?
Describe how certain factors can also motivate ethical hackers, or those who defend against cyberattacks (sometimes called cyber warriors or cyber patriots)? (eg, revenge, patriotism, fear of government abuse, pride, respect for the law, ownership, anger, retaliation….)
Background:
 Hacking for the Homeland: Patriotic Hackers vs. Hacktivists [2013 – abstract only. 
Topic 3: Hacking as an “Addiction”
Some mental health and criminal justice professionals contend that hacking is an “addiction,” and causes obsessive, risk-taking behavior in a manner similar to illegal narcotics—hackers hack to “get high” from the thrill of breaking into a system and getting away with it. 
Should policy makers look toward treatment, rather than incarceration, as to the disposition of hacker cases? Why or why not?
How do profiles of ethical and non-ethical hackers differ? 
Background: http://bit.ly/PzE9fO.
Topic 4 – Profiling of Cybercriminals
While psychological profiling of criminals is not a new field, should we attempt to profile cybercriminals? 
What sort of things do we already know about the personalities of cybercriminals? 
Do we have enough evidence to indicate there is a distinct psychological pattern that would help in the apprehension of cybercriminals?
Background:
1. Behavioral Risk Indicators of Malicious Insider Theft of Intellectual Property: Misreading the Writing on the Wall [2011 -summary]

 2. Traditional and Cyber Aggressors and Victims: A Comparison of Psychosocial Characteristics [2011]

Understanding Motivations For Computer Hacking

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now

Case Project 4-2 Analysis of Physical Security How secure are the host computers at your school or workplace?

Case Project 4-2 Analysis of Physical Security How secure are the host computers at your school or workplace? Perform an analysis of the physical security to protect these devices. Make a note of any hardware locks proximity readers video surveillance f.

Case Project 4-2: Analysis of Physical Security How secure are the host computers at your school or workplace? Perform an analysis of the physical security to protect these devices. Make a note of hardware locks, proximity readers, video surveillance, fencing, etc. Then look at the hardware security around the hosts themselves. What are the strengths? What are the weaknesses? What recommendations would you make for improving host security? Write a one-page paper on your analysis.

Case Project 4-2 Analysis of Physical Security How secure are the host computers at your school or workplace? Perform an analysis of the physical security to protect these devices. Make note of any hardware locks proximity readers video surveillance f

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Order your Paper Now