FTK imager lite & Autopsy

1) What type of device or system did you select to conduct your forensics investigation?

2) What tool did you use for the data capture? 

3) What did you learn from the experience?

· No Plagiarism 

· APA Format required

· Each Answer Should be 350 words without References.

!!! NEED 2 ANSWERS FOR THIS QUESTION WITH 0% PLAGIARISM!!!!

!!! One Answer using FTK IMAGER LITE Tool !!! 

!!! Second Answer using Autopsy Tool !!! 

Wk 1 – Apply: Identifying and Mitigating Risks

Assignment Content

  1. You’ve been learning about various vulnerabilities and their associated risks this week. Keep in mind that companies are not always able to fix all their discovered vulnerabilities.

    Select an organization of your choice and research 5 of their most common vulnerabilities, threats, and risks.

    Write a 2 – to 3-page recommendation on the steps the organization should take to remediate or mitigate these vulnerabilities, threats, and risks.

    If you found actual examples of an organization’s vulnerabilities, risks, or threats, describe how the organization approached remediation and/or mitigation. Annotate those that were fixed or unable to be fixed.

    Include impacts to the organization in terms of people, network, data, or reputation.

    Cite references as necessary to support your assignment.

    Format your citations according to APA guidelines.

    Assignment checklist: 

    1. The total paper must be 700 – 1050 words (about 2-3 pages but I will be looking at word count) 
    2. Use the bullets or key points in the instructions and create corresponding heading and sub headers. This way it will be obvious that you hit the key points 
    3. Include at least one references that are properly cited 
    4. Any images must have a caption and referenced in the paper. 
    5. Combine the screenshots and the remainder of the assignment into one APA formatted document. If you submit the assignment in multiple parts you will lose points   
    6. Follow APA format (fonts, etc) – For details on the formatting see the UOP library tab. 

Safe Harbor Provisions

Write an essay of at least 500 words discussing the Safe Harbor provisions under HIPAA.  

Do not copy without providing proper attribution. This paper will be evaluated through SafeAssign. 

Write in essay format not in outline, bulleted, numbered or other list format.  

Use the five paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaninful title.

Include at least one quote from each of 3 different articles. Use the Research Databases available from the Danforth Library, not Google.   Place the words you copied (do not alter or paraphrase the words) in quotation marks and cite in-line (as all work copied from another should be handled). The quotes should be full sentences (no more, less) and should be incorporated in your discussion (they do not replace your discussion) to illustrate or emphasize your ideas.

Cite your sources in a clickable reference list at the end. Do not copy without providing proper attribution (quotation marks and in-line citations).

http://blog.securitymetrics.com/2014/05/hipaa-faq.html

https://www.hitechanswers.net/hipaa-hospitals-five-reasons-medical-data-storage-often-not-compliant/

https://www.careersinfosecurity.com/2-million-hipaa-penalty-after-patient-data-exposed-on-web-a-9465

https://www.medscape.org/viewarticle/810563_2

https://www.bankinfosecurity.com/ocr-considering-hipaa-privacy-rule-enforcement-changes-a-10750

Discuss, in your own words using 500 words or more, how virtualization may create it's own security vulnerabilities.

Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.

Use at least three sources. Use the (https://libguides.nec.edu/az.php) Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. 

AmazonEcho

  

Instructions

1. Please read these two articles: 

· Using forensics against a fitbit device to solve a murder:  https://www.cbsnews.com/news/the-fitbit-alibi-21st-century-technology-used-to-help-solve-wisconsin-moms-murder/

· How Amazon Echo could be forensically analyzed! https://www.theverge.com/2017/1/6/14189384/amazon-echo-murder-evidence-surveillance-data

2. Then go around in your residence / dwelling (home, apartment, condo, etc) and be creative.

3.  Identify at least five appliances or devices that you THINK could be forensically analyzed and then identify how this might be useful in an investigation. Note – do not count your computer or mobile device. Those are obvious!

4. I expect at least one paragraph answer for each device. 

Why did I assign this? 

The goal is to have you start THINKING about how any device, that is capable of holding electronic data (and transmitting to the Internet) could be useful in a particular investigation! 

750 words: Select an organization that has a Global platform and describe the following.

Portfolio Project: Select an organization that has a Global platform (they operate in more than one country), that has demonstrated operational excellence.  

Perform the following activities:

1. Name the organization and briefly describe what good or service they sell and where they operate.

2. Note how they are a differentiator in the market.

3. Note the resources used to ensure success in their industry (remember resources are comprised of more than just people).

4. Explain what actions the company took to achieve operational excellence.

Assignment

 

Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

Use your own words and do not copy  the work of another student.

Data Acquisition

Research some tools that would be valuable in collecting both live memory images and images of various forms off media. Put together a shopping list for your manager that includes tools needed  to be purchased. Include a price if applicable.

Write your answer using a WORD document.