Computer Forensic discussion week 3

Storage Format for Digital Evidence ” 

  • As an investigator, you are responsible for protecting the integrity of the data you collect from a hard drive.
  • Discuss the method used to create data images. Using your favorite web browser and search engine, search the Internet for a third party tool capable of creating an exact copy of a hard drive. Provide a description of the tool and share the link with your classmates. Compare and contrast the viable use of a Linux tool versus a proprietary tool. Are their advantages to using one over the other? Justify your answer. 

AES and DES

Compare AES and DES. For each of the following elements of DES, indicate the comparable element in AES or explain why it is not needed in AES.

  1. XOR of subkey material with the input to the f function
  2. XOR of the f function output with the left half of the block
  3. f function
  4. permutation P
  5. swapping of halves of the block

research paper

 

The Final Portfolio Project is a comprehensive assessment of what you have learned during this course.  

The Final Project has two parts: Limitations of Blockchain and Emerging Concepts.

Blockchain continues to be deployed into various businesses and industries. However, Blockchain is not without its problems.  Several challenges have already been associated with the use of this technology.  Identify at least 5 key challenges to Blockchain. Additionally, discuss potential solutions to these challenges. Lastly, please discuss if we will see the limitations to blockchain be reduced or mitigated in the future.  

There are several emerging concepts that are using Big Data and Blockchain Technology. Please search the internet and highlight 5 emerging concepts that are exploring the use of Blockchain and Big Data and how they are being used.

Conclude your paper with a detailed conclusion section which discusses both limitations and emerging concepts. 

The paper needs to be approximately 6-8 pages long, including both a title page and a references page (for a total of 8-10 pages). Be sure to use proper APA formatting and citations to avoid plagiarism.

Your paper should meet the following requirements:

• Be approximately 6-8 pages in length, not including the required cover page and reference page.

• Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

• Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Public-Private Partnerships for Cybersecurity

  

For this research project, you will help identify best practices and strategies for encouraging business participation in public-private partnerships designed to improve cybersecurity for various critical infrastructure sectors. Your deliverable will be a research report that provides an overview of existing public-private partnerships, the types of cybersecurity improvements such partnerships address, the potential benefits to industry partners, and the potential risks and/or costs in resources. Your report should also address the types of due diligence activities a company should engage in before committing to participation in information sharing and other public-private partnership activities.

Research:

1. Read / Review the Weekly readings.

2. Research the concepts and structures for public-private partnerships as a means of furthering public policy goals. Your starting resources are: 

a. What are Public Private Partnerships (World Bank) http://ppp.worldbank.org/public-private-partnership/overview/what-are-public-private-partnerships 

b. The Policy Cycle http://www.policynl.ca/policydevelopment/policycycle.html  

3. Research existing or proposed public-private partnerships in cybersecurity and critical infrastructure protection.  Here are some sources to get you started:

a. http://www.lawandsecurity.org/Portals/0/Documents/Cybersecurity.Partnerships.pdf 

b. http://csis.org/files/publication/130819_tech_summary.pdf 

c. http://www.hsgac.senate.gov/hearings/strengthening-public-private-partnerships-to-reduce-cyber-risks-to-our-nations-critical-infrastructure

d. http://www.hsgac.senate.gov/download/?id=66d59b29-25ac-4dc1-a3af-040dcfe3bd38

e. http://www.hsgac.senate.gov/download/?id=5a70808b-ff76-411d-9075-5b21c7398bf5 

4. Research the DHS-led public-private partnership for Critical Infrastructure Cybersecurity improvements. You should also review the requirements and provisions of the NIST Cybersecurity Framework for Critical Infrastructure Protection. Research why DHS is encouraging the adoption of the NIST framework.

a.  https://www.dhs.gov/ccubedvp 

b. https://www.us-cert.gov/ccubedvp 

c. https://www.us-cert.gov/sites/default/files/c3vp/smb/CCubedVP_Outreach_and_Messaging_Kit_SMB.pdf  

5. Find additional sources that provide information about public-private partnerships for cybersecurity, i.e. Information Sharing and Analysis Centers (ISACs) or Information Sharing and Analysis Organizations. Here are two overview/irectory web pages to help you get started.

a. http://www.dhs.gov/isao

b. https://www.nationalisacs.org/member-isacs  

Write:

Write a five- to seven-page research report that includes a summary of your research. At a minimum, your report must include the following:

1. An introduction or overview for public-private partnerships that provides definitions and addresses the laws, regulations, and policies that permit this type of cooperation between federal, state, and local governments and private companies. This introduction should be suitable for an executive audience.

2. A separate section that provides an overview of public-private partnerships for cybersecurity that addresses the types of activities contributed by a company (e.g. information sharing, development of threat intelligence, development of risk profiles, etc.).  You should provide three or more specific examples.

3. An analysis of whether participation in a public-private partnership is likely to have benefits for businesses (with specific examples of those benefits). After you address the benefits, address the problem of costs and/or risks which a company could expect to face (with at least three or more specific examples).  (One risk to consider is how a partnership exposes information about company operations to the federal government.) 

4. A set of recommendations or best practices for companies to engage in before committing to participation in a public-private partnership for cybersecurity. (Address the requirement for due diligence in decision-making.) 

5. A separate closing section in which you summarize your research and recommendation(s).

Submit For Grading 

Submit your work in MS Word format (.docx or .doc file) using the Project 6 Assignment in your assignment folder. (Attach the file.)

Additional Information

1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your 5- to 7-page research report should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper. 

3. Your paper should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts Review for recommended resources.

4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the “professional appearance” requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,DEC2018).docx.  

5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment’s page count. 

6. You should write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.  

7. You must credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).

linux

1.  For this discussion board you will need to research the impact that storage performance factors can have on virtualization and formulate a summary.  

2.   For this discussion board you will need to research the different text editors available in Linux and write up a comparison of each.  Your comparison should include a recommendation as to the editor you feel would be most useful and why.   

discussion1

1. Discussion—

  • Identify the business impact of several access controls.
  • Identify mitigation techniques for weaknesses of each of the access controls.

Assignment RequirementsRead the worksheet named “Mapping Business Challenges to Types of Control” and address the following:

Using what you have learned about access controls, identify the business impact of the challenge, and identify an access control method that will mitigate the impact to the business.

Discussion

In today’s world, both government and the private sector are struggling to provide a secure, efficient, timely, and separate means of delivering essential services internationally. As a result, these critical national infrastructure systems remain at risk from potential attacks via the Internet.

It is the policy of the United States to prevent or minimize disruptions to the critical national information infrastructure in order to protect the public, the economy, government services, and the national security of the United States.The Federal Government is continually increasing capabilities to address cyber risk associated with critical networks and information systems.

Please explain how you would reduce potential vulnerabilities, protect against intrusion attempts, and better anticipate future threats.

Perform a Vulnerability Assessment of your place of employment or living area. (Security)

Vulnerability Assessment

Topic: Perform a Vulnerability Assessment of your place of employment or living area. If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities.

Instructions: Please download the Assignment 1 Vulnerability Assessment template (MS Word), which is already in APA 7 format, using size 12 Times New Roman font, 1-inch margins, TOC, Headings and Reference page. If you insert images or tables in your report make sure you label them appropriately according to APA.

Please refer the attached template document for preparing the assessment.

For this assignment: The 4 Heading-1s are required. Each Heading-1 must have at least 3 Heading-2s. Each Heading must have at least 2 properly formatted paragraphs with 3 properly formatted sentences each. 

Discuss the risk and costs of compromised data integrity breaches. Focus on integrity not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc.

 

In 500 words or more, discuss the risk and costs of compromised data integrity breaches. Focus on integrity, not confidentiality. Look at military, education, science, medicine, finance, utilities, municipalities, etc.

Use at least three sources.  Use the https://libguides.nec.edu/az.php, not Google.  Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragraphs.

Required Readings:

https://www.wombatsecurity.com/blog/scary-data-breach-statistics-of-2017

https://www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html

https://www.army-technology.com/news/us-dod-suffers-massive-data-breach/

http://www.healthcareitnews.com/projects/biggest-healthcare-data-breaches-2018-so-far

https://www.investors.com/news/technology/bitglass-experiment-shows-how-stolen-data-gets-into-criminal-hands-after-breach/

https://www.computerweekly.com/opinion/Security-Think-Tank-Data-integrity-breaches-the-challenge-facing-banking

https://www.cimcor.com/blog/five-industries-in-greatest-danger-of-a-data-breach

https://securityintelligence.com/know-the-odds-the-cost-of-a-data-breach-in-2017/

https://www.rapid7.com/db/modules/

Software Quality Paper

For this assignment, imagine you are working as a Quality Consultant for Big Data organizations. You have been contracted by Logis-Study – a pharmaceutical test subject results and tracking application for large scale longitudinal studies.

Logis-Study is planning on creating a new application that will be used by researchers and scientists to access and contribute data to the system.

Logis-Study needs to be able to make updates to the system rapidly – new studies are often added and need to be able to quickly integrate with the larger system.

The CEO has a number of questions regarding Software Quality and Quality Management. She has contracted you do write a summary report for her.

She would like to know the following:

• Which development methodology should Logis-Study use?

• What are some of the Quality standards and do they need to be followed? Why or why not?

• What type of team should be hired (QA, QC, Testing) and why?

• Identify any quality costs and how/when the application testing should be performed.

Please create a summary report (2-3 pages) outlining your responses. The report should use appropriate business language and any references should follow the APA format.