Digital Forensics

 

Mr. Fahad Naseem, and Mr. Ronald Joseph FBI Agent.

 Mr. Fahad Naseem was arrested in connection with the kidnapping and killing of journalist Daniel Pearl and admitted sending ransom e-mails using his Laptop. The laptop and handwritten versions of the e-mails were found in his possession. 

  • On the Contrary-A, Naseem later retracted his confession and the defense attorney asserted that logs from Mr. Naseem’s Internet Service Provider (ISP) indicated that Mr. Naseem’s account was not active and connected to the Internet at the time the e-mails were sent. 
  • On the Contrary-B

Naseem’s defense attorney claimed that the compromised Laptop produced in court had a different serial number from the one that was initially recorded in police records; hence, documentation relating to the computer and evidence in the case was inconsistent. 

  • On the Contrary-C

Documentation presented in court indicated that the Federal Bureau of Investigation (FBI) agent, Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002. In contrast, documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002, and the court denied the appeal, including the following explanation.

  • On the Contrary-D

The lead investigator Mr. Shaikh Naeem recovered the Laptop labeled (connection No. 66) retrieved from the accused, Mr. Fahad Naseem, on November 2, 2002, was provided to Mr. Ronald Joseph, FBI agent, who examined, conducted the forensic investigation, formulated his report, and conveyed evidence to the Consulate General of the United States of America. 

  • The report’s content asserted that the Black Soft Computer came with “Proworld” written on the exterior of the Laptop, and upon opening the case, a Dell Latitude Cpi laptop was discovered. 
  • The Laptop was identified in the report produced by this witness to be of model PPL with Serial number ZH942 located inside the Laptop as an IBM travel star hard driver [sic], confirmed to have been removed from the Laptop.
  • During examination, the label on the hard drive was identified as a system with 4.3 GB storage capacity, and serial number OKLA24302 on the outside of the laptop.  
  • After examining Exhibits, Mushernama who recovered the Laptop asserted that without a doubt whatever, the compromised Laptop is the same equipment that was seized from the accused, Mr. Fahad Naseem on November 2, 2002. 
  • On the Contrary-E

The forensic investigation report confirmed that the same Laptop was recovered on April 2, 2002 by the defense team. Availability of the Laptop at the American Consulate on April 2, 2002 is not unnatural and impossible because Marianne Pearl filed a complaint with the police on April 2, 2002, hours when the case was in the at the hands of the Investigating Agency.

Questions 1. As an Aspirant and Hopeful Digital Forensic Investigator:

1:1. Submit concluding evidence to the public and the court substantiating that Mr. Fahad Naseem is guilty of kidnapping and killing Mr. Daniel Pearl, the journalist.

1:2. Submit concluding evidence to the public and the court demonstrating that Mr. Ronald Joseph examined Mr. Naseem’s Laptop between February 4 and 7, 2002, whereas documents indicated that the Laptop was not seized from Mr. Naseem until February 11, 2002.

1:3. Submit concluding evidence to the public and the court attesting that Mr. Naseem’s Laptop’s availability at the American Consulate on April 2, 2002, is unnatural and unrealistic occurrences. 

Database IT244

1Draw the corresponding ERD for the following Employee Database

2Normalize the following Schema with the given functional dependencies into BCNF
3Explain in your own words why the Student-Dept relation is not in 4NF. Then, convert the Student-Dept relation in 4NF. Also, provide the justification for each step you perform during normalization (4NF). Note: The SportActivity here means any sport a student is participating in. For example, a student with ID = 123 can participate in soccer and badminton
4In your own word, explain why do designers use Denormalization? What is the limitation of using Denormalization? Name and explain a better alternative approach than Denormalization.

Organizational Analysis

Each student will write an 5-7 page paper on a conflict that he or she experienced in an organizational setting.  The submission must be typed, double-spaced, and have uniform 1-inch margins in 12-point Times New Roman font.  The organizational analysis will contain the following sections:

  • Background and history that led to the conflict?
  • How/why did the conflict escalate?
  • How was the conflict resolved?
  • What would the student have done differently, based on what he or she has learned in the class?

Access control Assignment 9

Discuss the benefits of technology to support Access Control.

Length, 2 – 3 pages.

All paper are written in APA formatting, include title and references pages (not counted). Must use at least two references and citations.

Please reference the rubric for grading.

Chapter 4 – discussion question #1-5 & exercise 1 When submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to s

 Assignments Choose any 2 questions each week: Must provide a heading to identify which Chapter and which Questions were chosen. Must be a WORD document with APA formatting. (300-400 words)   

Discussion #2: What are the main reasons for the recent popularity of data mining? 

Discussion #3: Discuss what an organization should consider before making a decision to purchase data mining software. 

Discussion #4: Distinguish data mining from other analytical tools and techniques.

 Discussion #5: Discuss the main data mining 

Discussion 6 – Info Tech Import Plan Response to peers

Please write a post for the two documents with 150 words each substantive. A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

1: Business strategy Analysis

 

Imagine you are preparing for an interview with a company as an IT manager. Part of the interview process is providing a work sample. You must provide an analysis of Amazon’s business strategy and explain what part IT governance functions in Amazon reaching their strategic goal to demonstrate your understanding of IT governance and IT strategic vision.  

Research at least 2 articles on Amazon’s business strategy.

Develop a 1- to 2-page checklist detailing the main points Amazon’s IT department should consider to be properly aligned to Amazon’s strategic business plan. Include relevant laws, regulations, and industry standards that would impact the business plan, such as PCI standards and SOX regulations. 

Write a 1- to 2-page summary of how Amazon’s IT Governance works with the Strategic Business Plan to achieve continued success and growth.

Format your citations according to APA guidelines.

Submit your assignment.