Wk6

I have a subject that will take a paper plus a flow chart that’s redone from the previous one.

blockchain implementation

 In chapter 12, the author introduces issues to address when integrating blockchain apps with legacy applications. Which of the differences between blockchain and legacy systems discussed in chapter 12 do you think would be the one that carries the most risk? How could this risk be realized? (Give at least 2 examples). Briefly describe how you would address this risk in your blockchain app design. 

 Think of three questions you’d like to ask other students and add these to the end of your thread.

  • The questions must be taken from material you read in Chapter 12,

digital evidence

 

In chapter 4, the text mentioned the crime of computer forgery.  Here is a case regarding computer forgery and how digital forensics was able to prove the underlying file was indeed forged.  https://nakedsecurity.sophos.com/2019/01/17/telltale-font-scuppers-bankruptcy-trust-claim/  

Basically, the document claimed to be created (and a printed copy signed and dated as proof, at a time before the fonts used in the document were available.

For this discussion, write 200-250 words on your opinion of this case.  Can you think of other digital artifacts that could be used to prove that a computer file is not what it claims to be?