Challenges a computer forensics investigator faces when investigating the cloud and recommendations to assist the investigation.

Challenges a computer forensics investigator faces when investigating the cloud and recommendations to assist the investigation.

Compare and Contrast different types of performance management models and analyse the relative advantages and disadvantages of them for both employers and employees.

Compare and Contrast different types of performance management models and analyse the relative advantages and disadvantages of them for both employers and employees. There should be one example presented of practice to demonstrate how and what type of performance management methodologies, tools and techniques are being used to suit the unique organisational environment and how HR has prepared the business and its people to meet and adapt to new challenges.

Create a database schema that supports the company’s business and processes.

1. Write a five to ten (5-10) page design document in which you:

a. Create a database schema that supports the company’s business and processes.

b. Explain and support the database schema with relevant arguments that support the rationale for the structure. Note: The minimum requirement for the schema should entail the tables, fields, relationships, views, and indexes.

c. Create database tables with appropriate field-naming conventions. Then, identify primary keys and foreign keys, and explain how referential integrity will be achieved.

d. Normalize the database tables to third normal form (3NF).

e. Create an Entity-Relationship (E-R) Diagram through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.

f. Explain your rationale behind the design of your E-R Diagram.

g. Create a Data Flow Diagram (DFD) through the use of graphical tools in Microsoft Visio or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length but must be included in the design document appendix.

h. Explain your rationale behind the design of your DFD.

i. Create at least two (2) sample queries that will support the organizational reporting needs.

j. Create at least two (2) screen layouts that illustrate the interface that organizational users will utilize.

Section 2: Revised Gantt Chart / Project Plan
UPDATE attached GNATT chart

Use Microsoft Project or an open source alternative, such as Open Project, to:

2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 2: Business Requirements, with all the project tasks.

Why? Are there any connections to other readings or other things you’ve thought about or encountered?

Which reading this week is the most interesting to you (Ch. 4, Ezell, or Meyer)? Why? Are there any connections to other readings (in our class or in other classes), or other things you’ve thought about or encountered? What points do you want to remember? write c. 300-500 words.

Evaluate a complex marketing environment in order to analyse opportunities and develop an appropriate marketing strategy.

Evaluate a complex marketing environment in order to analyse opportunities and develop an appropriate marketing strategy.

Explain each network device’s function and your specific configuration of each networking device.

Write a paper in which you complete the following:
Overall network diagram
Datapath diagrams (one for each of the steps in the scenarios below)

Part 1
1a. create a diagram showing the overall network you’ve designed, from the user or endpoint device to the Internet cloud, and everything in between, in which you:
Follow the access, core, distribution layer model.
Include at a minimum:
The authentication server (i.e. Microsoft Active Directory)
Routers
Switches (and/or hubs)
Local users
Remote users
Workstations
Files share (i.e. CIFS)
Mail server
Web servers (both internal and external)
Firewalls
Internet cloud
Web proxy
Email proxy
FTP server (for internal-to-external transport)
1b. Explain each network device’s function and your specific configuration of each networking device.
1c. Design and label the bandwidth availability or capacity for each wired connection.

Part 2
2a. create a Datapath Diagram for the following scenario:
Local user sends email to a Yahoo recipient. Local (corporate) user having email address jonny.hill@ sends an email to user534@.
Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
Include path lines with arrows showing directions.
2b.create a Datapath Diagram for the following scenario:
Local user, Jonny Hill, transfers file using ftp through the Internet to another company’s site (). He has to access the secure shell using his active directory credentials to authenticate to the ftp server (Linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to .
Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
Include path lines with arrows showing directions.
2c. create a Datapath Diagram for the following scenario:
Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop, DT-Corp534-HellenS. Hellen uses a browser to initiate her VPN connection. By browsing to , she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built.
Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination.
2d. Explain how your overall design protects the organization from both inside and outside attacks. Give examples.
2e. Explain how your layered design compensates for possible device failures or breaches in network security.
2f. Determine whether any possible bottlenecks exist in your design.
2g. Explain how to make the file transfer process more secure.

Analyse and design a suitable solution using any IoT development board

Analyse and design a suitable solution using any IoT development board

like raspberry pi/ Arduino/ ESP32/ ESP8266, etc and with different services/ sensors.

Describe the difference between a policy and a law and provide an example of each.

Scenario

You are the newly hired Human Resources Manager for Diamond Express, Inc., a customer service and sales organization that has been in operation for 2 years. You were hired to develop a fully functioning human resources department that will provide enhanced HR services for the 150 employees and the leadership team. Over the past 2 years, the human resources functions have been spread among several individuals within the organization, including an administrative position, which processed paperwork, and the management team, which typically handled their own human resources issues.
The CEO recognized the need to bring in an HR professional who will provide more strategic support for the organization to help with their aggressive expansion goals. You are aware that there may be initial resistance from the management team; therefore, you plan to schedule one-on-one meetings with each manager, where you will get to know each manager’s leadership styles, department functions, as well as needs and challenges. You also plan to hold communication sessions with employees to introduce yourself and discuss your role in helping them with HR needs they may have. You realize that for many people trust is earned, and it may take some time for the management team and employees to feel comfortable with you. You are prepared for this!
Before you can begin addressing organizational issues, it will be important to engage in an organizational analysis to identify current issues and set a baseline for your work. This process consists of familiarizing yourself with the company background and assessing existing challenges and issues.
The critical areas in which you intend to focus initially include staffing, policy review, training, performance management, pay practices, benefits, career development/recognition, and retention. You are aware that because the HR functions are currently spread among several individuals within the organization, it is highly likely that procedures and policies are inconsistent within the organization. Through the centralization of these functions under the “HR umbrella,” consistency should be restored. However, this must be done carefully since the individuals involved feel personal responsibility for their functions.
You are very much aware that any initiatives you recommend must be tied to the corporate goals and designed to support the CEO’s vision for the company. If you are to align yourself as a true business partner, you will need to be prepared to provide financial data and other concrete figures to support your recommendations. For example, in your brief time with the company, you quickly recognized an issue with employee turnover. In presenting recommendations, for addressing turnover, remember to include the financial benefit to the company—how a reduction in turnover increases productivity and reduces expenditures. Demonstrating the return on investment for your recommendations will be essential to your providing value-added service to the organization.
Additionally, with all strategies and policies you recommend, you will keep in mind the culture and values of the company and how you can help to support those values through your recommendations. HR policy can either detract from or enhance company performance. You intend to demonstrate, through your recommendations, that you are a strategic business partner focused on helping the company to achieve its goals and remain competitive.
You realize this will be a challenge and know that effective communication and relationship building will be critical and will help to facilitate the changes to be made. You have considered what will be required, and you are prepared and eager to make a difference!

Assignment 1: 400 words

Organizations must abide by federal, state, and local laws and regulations. Breaking the law may have consequences such as fines, lawsuits, and even shutdown of corporate facilities. To maintain compliance, organizations develop policies that guide the ethical behavior of employees. In order to explore the differences between laws and policies, please discuss the following:
Describe the difference between a policy and a law and provide an example of each.
Does a company policy override a local, state, or federal law or does a local, state, or federal law override a company policy? Provide justification for your reasoning.
Research and describe an example of an incident when a company broke a federal, state, or local law. What were the consequences of breaking the law? What policies did the company change because of the incident?

Assignment 2 – 1200

Within organizations, the human resources department is considered an ally by some managers and a barrier by others. The legal requirements of managing HR require you to be the dispenser of policies, procedures, and rules at times and a trusted counselor and guide at other times. There are varying perspectives on the value HR policies bring to an organization. In other words, the policies, procedures, or rules may be viewed as tools that help or hinder leaders from managing their people and will either detract from or enhance company performance. When not properly aligned with the company’s goals, they can negatively affect the success of the organization. You know that you need to review the current HR policies, procedures, and rules and anticipate that you may be recommending changes, additions, or deletions. Because you are still new and solidifying your position within the company, you are concerned that missteps now will cost you your “place at the table.”
You decide to consult with your mentor-an experienced, powerful HR executive at another company. She presents the following for you to consider:

  • What steps will you take in your policy, procedure, and HR rules review with the jewelry company?
  • What will that involve? As you consider their HR policies, how will you ensure they are effectively aligned with what you see as the company’s goals?
  • If you find areas where policy revision is needed, how will you present your recommendations?
  • How do you feel your recommendations will be viewed?
  • Do you anticipate resistance? If so, what plan do you have to overcome that?
  • What do you see as the possible outcome from policy revision in terms of impact on the company’s performance?

 

Describe mobile investigative challenges and the techniques and technologies available to perform mobile forensic examinations.

In this project, you will write a 13- to 21-page white paper that describes the current state of mobile incident response and investigation. The context is that as a forensic investigator, you are providing an objective overview of mobile technology and digital forensic and incident response capabilities for a law enforcement unit that has limited experience and capability with mobile forensics.

Your white paper will describe mobile investigative challenges and the techniques and technologies available to perform mobile forensic examinations. You will also provide your perspective on the future of mobile forensics—the biggest threat to mobile forensics in years to come, and the biggest opportunity for investigators of mobile cybercrime. The most successful papers will include references to resources outside of the classroom.

There are five steps in this project. Each step focuses on one required element of the paper to be submitted at the end of this project.

Explain any 5 ways in which corporations can use tax havens to avoid corporate income taxes in their home countries.

What are tax havens? Choose a tax haven of your choice from the list provided below and highlight any 7 advantages that it offers in comparison to other countries that helps it attract offshore funding.

For instance, low or zero tax rates, banking secrecy etc. Be concrete and specific with regard to the tax haven that you have selected and not general.List of tax havens

:a.Switzerland

b. Ireland

c.Mauritius

d.Luxembourge.Bahamasf.Isle of Mang.Cayman Islandsh.Bermudai.Monaco

Question 2:Explain any 5 ways in which corporations can use tax havens to avoid corporate income taxes in their home countries.

Question 3:Do you think tax havens are healthy for the global financial system? Why do you think so?

Do you have any four innovative suggestions that could help solve this problem of unhealthy tax competition?