500 words

 

Write at least 500 words fractional ownership and it’s relation to  cloud computing. Use at lesat one example from another industry.    

Use at least three sources. Include at least 3 quotes from  your sources enclosed in quotation marks and cited in-line by reference  to your reference list.  Example: “words you copied” (citation) These  quotes should be one full sentence not altered or paraphrased. Cite your  sources using APA format. Use the quotes in your paragaphs

Digital Forensics

 

Cybercrime Law, Computer-Integrity Crime, Fraud, and Abuse.

 Preamble.

Integrity of evidence, cyber-crime, fraud, and abuse are prefaced on the assumption that computer and internet technologies are designed to make life easier for a public and private organization, the judicial system, and forensic investigators; it has, unfortunately, made life incredibly challenging and enduring in all levels of forensic investigation. Cyber-crime, fraud, abuse, are open-ended criminal operations, allowing unauthorized users to obtain information from various sources against a target organization. Naturally, criminals are endowed with extraordinary skills and expertise to break into any organization’s secured network center. Most criminal are have access automated freeware tools available on computer and Internet and breaks into the organization’s secured network system, data, assets, resources, to make forensic investigation exceedingly tricky. Most organizations and the global community are actively using computer and internet technologies to build four walls around security data storage centers, creating an opportunity for forensic investigator’s ability to produce reliable evidence. Similarly, organizations and the global defensive approach require a proactive plan of action to guide against data breach. This section examines the primary federal statutes used to prosecute cybercrime. The focus is on the Computer Fraud and Abuse Act and the statutes criminalizing identity theft, child pornography, and copyright and trademark offenses (Casey, 2011: 86-95).

Computer Fraud and Abuse Act  

The Computer Fraud and Act, Abuse is the primary source of federal law related to computer cybercrimes, and approval of the Computer Fraud and Abuse Act (CFAA) in 1986. The amendments were designed to update specific Arts provisions in light of advancements in computer and internet technologies and to address loopholes that existed in earlier versions of the Act. Criminals gaining unauthorized access to a computer, disseminating malware, launching denial of service attacks, trafficking passwords, and using computers and the internet to commit fraud. Criminals are sophisticated and can intentionally use the computer and internet technologies without authorization.   

Research Question 2:1. Develop a measurable research framework of hos computer fraud and Abuse Act (CFAA) can play a role during the forensic investigation and impact on conclusive evidence in court. 

Research Question 2:2. To what extent can the computer fraud and Abuse Act (CFAA) of 1986 empowers forensic investigation to bring cyber-crime, fraud, and abuse to justice.

 Situation 1.      

Naturally, criminals often retain extraordinary skills and expertise to break into any

organization’s secured network center. The criminal fully utilizes automated freeware

tools available on computers and the Internet and breaks into the organization’s secured network system, data, assets, resources, and makes forensic investigation exceedingly.

  • These extraordinary skills, expertise, and availability of automated freeware tools are creating a considerable obstacle against the forensic investigation process. We are the nation of law.

Question 2:3. Develop a measurable research framework of amendment items needed to strengthen the computer fraud and Abuse Act (CFAA), and expand forensic investigator authority over criminal activities.  

Case Study

 This weeks assignment you will be reading two different journal articles, one on Firefox and one on Chrome. I want you to write a 2-3 page summary on what you learned including the techniques used, how each is different and the end results. You should have a title page and your 2-3 page summary should include your opinions on all the information as this is not a research paper. 

exercise 2-1

 In your text editor, use XHTML scripting to develop the Chinese zodiac template page, which will include five sections: Header, Footer, Text Navigation, Button Navigation, and Dynamic Content. These sections will be populated with five include files. Use a table layout with CSS formatting or lay out the entire site with CSS. For this initial layout page, insert a placeholder in each section (i.e., [This is the header placeholder]) to identify the content that will be included later. Save the file as index.php, upload it to the ChineseZodiac folder, and view the file in the Web browser to verify that it displays as intended. 

Emerging Threats and DIscussion

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

Please make your initial post and two response posts substantive. A substantive post will do at least TWO of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

project management and computer forensic

Project risks can/cannot be eliminated if the project is carefully planned. Explain.

What are the major differences between managing negative risks versus positive risks (opportunities)?

Why is slack important to the project manager? What is the difference between free slack and total slack?

Review the document on Searching and Seizing Computers and Obtaining Electronic Evidence in Criminal Investigations at https://www.justice.gov/sites/default/files/criminal-ccips/legacy/2015/01/14/ssmanual2009.pdf. Prepare a one-paragraph summary of three challenges you may encounter when executing a search and seizure of digital evidence.

What is a first responders’ toolkit? Describe the procedures for creating a first responder toolkit.

Identify best practices in digital forensic investigations: Perform a web search for best practices in digital forensic investigations. Prepare a list of the top 5 best practices, based on your research. Include links to any resources that you use.

What is an investigative report? Why are the reports important? Who is responsible for the report?

Mitigation Plan Creation

 

  • As the HU Investment Firm cybercrime expert, you are required to create a Cybercrime Mitigation Plan. The overall cybercrime mitigation plan should be written with a minimum of two to three sentence description of what the outline will cover under each section. 
  • COPY THE CONTEXT FROM UNIT 5
  • Use the following website as a guide to creating your Risk  Mitigation Plan

Keep the following structure in mind as you develop your mitigation plan. You want to avoid or transfer as much serious risk as possible and have a detailed mitigation plan for the remaining risks.

Write your formal Mitigation Plan and ensure you include the following components:

  • Understand the users and the needs of the users
  • Research what the experts say about the needed mitigation for every element. Include that support in your report.
  • Identify and evaluate recurring risks and explain in detail the plan to mitigate those risks
  • Identify and explain opportunities to improve the system in order to reduce the negative impacts of some events
  •  Propose a plan to promote collaboration and dialogue about risk management and mitigation planning
  • Ensure that your writing is professional, well-supported, and easy to understand for non-IT people

Computer Forensics

Turn in your final paper, discussing your analysis of a real-world dataset using the tool or your choosing. Discuss the tool and the dataset before going into the steps that you took. Explain each step and detail what was uncovered. (3-5 pages APA format)

Your paper should highlight the following:

What tool did you research and why?

What data did you find, and what drew you to it?

What analyses did you research, and why were they relevant to the data/tool?

What did you learn going through the process?

Create a 3-5 slide discussing your project. Highlight the key areas and include a PPT slidedeck in your submission.

final project

     

11page   paper
use the book too that’s been provided

Scholar   reference

And prepare the PowerPoint slide too of the  paper with a diagram as much as possible 

Instructions

 

Pick one of the below operating systems and present information on the operating systems, and your thoughts comparing the selected operating system with other systems.

small description of all the operating systems listed

why it is best than the rest of all also includes the pros and cons of the chosen one.

good reasoning behind choosing this

what are the future program and aim 

big company that uses this operating system
some diagram to explain in the presentation slide must be included

Also, explain some topics from the book for these operating systems

· Windows 

· Linux 

· Unix

· Android

· iOS

Artificial Intelligence

Part a) 

1)      Discuss the difficulties in measuring the intelligence of machines.

Required: 200+ words

2)       Explore the AI-related products and services of Nuance Inc. (nuance.com). Explore the Dragon voice recognition product. 

Required: 200+ words

Part b) 

1)      Discuss the process that generates the power of AI and discuss the differences between machine learning and deep learning.

Required: 150+ words

Checklist:

Part ‘A’ and Part ‘B’ answers should to be attached as two separate documents. 

Both part ‘A’ and ‘B’ must adhere to APA formatting guidelines

At least two references for each part

Plagiarism report for both.