4 discussions Minimum 110 Words with refrences.

Discussion 2.1

Name and describe the three formats for digital forensics data acquisitions.

Discussion 2.2

You have been called to the scene of a fatal car crash where a laptop computer is still running. What type of field kit should you take with you?

Discussion 3.1

What are the functions of data run’s field components in an MFT record?

Discussion 3.2

What’s the advantage of a write-blocking device that connects to a computer through a FireWire or USB controller?  

Module 05 Assignment – Content Centric Networking

As distributed systems become more common, the transmission of content securely, efficiently, and effectively is important. Content-centric networking (CCN) seeks to address these issues.

Write a 5 to 6-page research paper on content-centric networking (CCN). The focus of your research should be on how CCN can facilitate distributed file system architectures. Your references will need to be only from the ACM and IEEE journals. You can find these databases in the school library.

Your paper needs to follow APA formatting.

digital forensic investigation

 

Details:

Suspect “John Doe” has allegedly been hacking public and private websites. We believe he has an accomplice that he may be meeting soon.

After getting a search warrant, first responders collected network traffic and a RAM image of the suspect’s live system. Technicians at the lab collected an offline disk image.

All collected suspect data can be found here.

There are three images:

  • Windows 10 disk image (15GB)
  • Windows 10 RAM image (4.5GB)
  • Network traffic acquisition (32MB)

The investigating member is asking the following questions:

  • Is there any evidence of website hacking?
  • Is there any evidence of a planned meeting? If so, when and where?
  • Please provide any user passwords for further analysis.

Remember, proper documentation and reporting are very important! Good luck!

 

you can download the data for the final here.

There are three images:

  • Windows 10 disk image (15GB)
  • Windows 10 RAM image (4.5GB)
  • Network traffic acquisition (32MB)

Please start downloading from a reliable connection as soon as possible. It is a lot of data, so be sure to process it as soon as you get it.

Networking

Write on the development of Internet2 and how this deployment of this network will impact corporate WANs based on the Internet. Devise a strategy for connecting LANs for a single corporation with four geographically separate entities into a single corporate-wide area network.

Requirements: 

(I) APA format

(ii) Minimum of 4 pages excluding introduction and conclusion

(iii) Minimum 3 references

Background Information for the Campus Network Design Project

  

PART 1 Only.

Background Information for the Campus Network Design Project XUMUC is large online university in the Eastern United States. The university has an enrollment of 90,000 students, mostly online. The students do not live on campus and are scattered around the globe. XUMUC offer courses in the fields of arts and humanities, business, social sciences, mathematics, computer science, the physical sciences, and health sciences. Many of the professors are working professionals with jobs in the business community, and only 5% of the 3000 faculty have offices on main campus. Due to opening of new online universities in the DC metropolitan area, the university has had difficult time attracting new students. The college wishes to attract and retain more students, many of whom leave the state to attend more prestigious colleges. Because of these reasons and others, the State advisory board expanded the Shady Grove campus of XUMUC. Nine states colleges open their branches at Shady Grove location. XUMUC’s management board now wishes to consolidate management functions at its Shady Grove location. The president of XUMUC formed an Advisory Group whose mission was to consolidate IT functions and implement state of the art network to attract prospective students. The Advisory Group was also to determine why prospective students do not select XUMUC. The group determined that many prospective students do not select XUMUC because they perceive the computer facilities at XUMUC to be inadequate. In addition to the computer applications used by the students and professors, the college administration personnel use the College Management System, which is a Novell NetWare client/server application that keeps track of class registrations and student records. The Current Network at Shady Grove Campus: The Shady Grove campus hosts 9 independent universities working independently. The campus has three main buildings and fiber optic cable is used for backbone connections. The campus diagram is shown below. Each building is connected by fiber optic cable. Because most of the students that attend XUMUC do so on a part-time basis, and because much of the faculty have other jobs, the assumption in the past has been that many of the students and professors use computing resources at home or at work and do not depend on the XUMUC network. The current network is shown in Figure -1. Fig:-1 All the LANs at this site use 10-Mbps Ethernet although they can be upgraded to 100 Mbps. Every building is equipped with Category-5 cabling and wall plates in the various offices, classrooms, and labs, though the cabling and wall-plates are not used in some of the buildings. To support users in Building-3, multi-mode fiber-optic cabling was pulled through cabling conduits to Building-1 and Building-2. At the Shady Grove campus, XMUC uses the services of 4 ISPs for internet connections. The college provides 10 Macintoshes and 25 PCs in the Computing Center (in Building-1) for student use. A LAN switch in the Computing Center connects hubs, servers, printers, and the router that connects to the Internet. Shady Grove campus does not have its own web server. For security, packet filtering firewall is used on some routers. The routers have default routes to the Internet and do not run routing protocols. Based on the advice of the Community Advisory Group, the president started the “Upgrade XUMUC Project” with the goal of upgrading the computer and networking facilities. The three network administrators and the Director of Operations for XUMUC formed the Project Task Force. Table:-1 Shady Grove Inventories Subnets Devices Comment UMUC 20 Work Stations UMES 8 Work Stations UMCPTowson 8 Work Stations Towson 4 Work Stations UB 5 Work Stations UMB 15 Work Stations Eastern Shore 4 Work Stations UMBC 12 Work Stations Bowe 5 Work Stations Class Rooms 150 Work Stations Shady Grove Administrations 50 Application server, Data server, and SAN Router 4 2600 series, Slow processing power Switches 10 switches All switches are without port security. No technology to reduce convergence time. Patch Panel 4 Hubs 5 Printers 5 Commercial Type in Copy Centre Network Printers and departments Printers 25 Voice Network: Shady Grove campus has 200 telephones on a separate voice network. IP telephony is used for internal purpose. PSTN (Phone Company) network is used to dial out. The logical diagram is shown below Security: The site recently experienced an increase in network attacks (DoS). The network was recently unavailable for a considerable time because of an attack. IT staff suspects that these attacks are coming from broad range of spoofed IP addresses, but unable to prevent these attacks. They have suggested installing NID so that they can monitor better and stop it while it is happening. Network availability is crucial for the university, because their revenue depends on availability of network. Web server: The director of the site wants to host a web

H7

   Download and read the document and answer all questions in the document. Please see attached document H7 & APA Criteria doc.     

Assignment

 Write short answers, uploaded as a WORD DOCUMENT (300 to 400 words) and attach references 

 

  • 2.1 What are the essential ingredients of a symmetric cipher?
  • 2.2 What are the two basic functions used in encryption algorithms?
  • 2.3 How many keys are required for two people to communicate via a symmetric cipher?
  • 2.4 What is the difference between a block cipher and a stream cipher?
  • 2.5 What are the two general approaches to attacking a cipher?
  • 2.6 Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
  • 2.7 What is triple encryption?
  • 2.8 Why is the middle portion of 3DES a decryption rather than an encryption?

project1

 

Client Specifications for Tetra Shillings Accounting

When developing your plan, keep in mind the following information about the client:

  • All desktops and laptops are currently running Windows 8.1 Enterprise.
  • About half of the laptops are less than a year old and will be retained for the upgrade.
  • All other laptops will be replaced with new hardware in time for the upgrade.
  • All desktop systems will be replaced with new laptops.

Your windows upgrade plan for Tetra Shillings Accounting should be based on Microsoft solutions and best practices and include the following points:

  • The advantages of upgrading to Windows 10, including at least three Windows 10 features that will provide the most benefit.
  • Recommendations for a version of Windows 10 for the upgrade and the install method(s) to be used.
  • At least two automated deployment options.
  • Plans to minimize disruptions to business operations.
  • A strategy that will keep operating systems updated.
  • Two IEEE references.

Exp19_Excel_Ch10_CapAssessment_Movie_Rentals

 

Exp19_Excel_Ch10_CapAssessment_Movie_Rentals

Project Description:

You are the systems manager for Blue City Movies Rentals and you have  been asked to create a report on historical sales data. To complete  your task you will combine and edit data from multiple sources using  Excel’s Power add-ins, XML, and text functions.

Start   Excel. Download and open the file named Exp19_Excel_Ch10_CapAssessment-MovieRentals.xlsx. Grader has automatically added   your last name to the beginning of the filename.

Use Get & Transform (Power   Query) to load the file e10c2Movies.txt   to the existing worksheet starting in cell A1. Be sure to load the   information to the data model.

Rename the worksheet Movies.

Use Get & Transfrom (Power   Query) to load the Account table from the xml file e10c2Contacts.xml into a new worksheet. Be sure to add the   information to the data model.

Rename the worksheet Contacts.

Use Get & Transfrom (Power   Query) to load the Rates table from the file e10c2Rates.xlsx into a new worksheet. Be sure to add the   information to the data model.

Rename the worksheet Rates.

Use Get & Transfrom (Power   Query) to load the StoreInfo table located in the database e10c2Transactions.accdb into a new   worksheet. Be sure to add the information to the data model.

Rename the worksheet StoreInfo.

Use Get & Transform (Power   Query) to load the Transactions table located in the database e10c2Transactions.accdb  in the Power   Query Editor. Use the Power Query Editor to change the  format of the Date   column from Date and Time to Date. Load the edited  data to a new worksheet   making sure to add the information to the data  model.

Rename the worksheet Transactions.

Create a relationship between   the Transactions table Account field and the Account table Account field. 

Create a relationship between   the Transactions table Store# and the StoreInfo table Store#.

Use PowerPivot to create a   PivotTable and clustered column PivotChart Horizontal on a new worksheet.   Name the worksheet TotalEarnings.  Use the Transactions table Date field in the   Filters area, Account  table Type field and Last field in the Rows area, and   Transactions  table Total field in the Values area. 

Add the chart title Total   Earnings.

Use 3D Maps (Power Maps) to   create a geographical visualization of  sales data by store. Use the Store Zip   as the location dimension and  the Transactions Total as the height dimension.   Zoom in as needed to  view results.

Save and close Exp19_Excel_Ch10_CapAssessment-MovieRentals.xlsx.   Exit Excel. Submit the file as directed.