assignment-10

 Define several forms of metadata that can be useful to an investigation. How are valuable to an investigator? 

Full Disk Encryption

  

Preamble

An organization chief executive officer (CEO) was suspected of fraud, and digital forensic investigators were assigned to acquire a forensic duplicate of his laptop without his knowledge, and his laptop was configured with full disk encryption. 

Restrain 

The best option was to shut down the laptop, create a forensic duplicate of the hard drive, and decrypt the hard drive using an administrative decryption key. Notably, investigators had insufficient time for such laid down approach. 

Plan of Action

The forensic duplicate of the data must be acquired from the live laptop while the system was left running in the chief executive Officer’s unit. The CEO was called out for an interview germane to the suspected fraud charges. The digital forensic investigators were then, able to interact with the CEO’s laptop, made changes to the system, acquire vital data on the laptop hard drive in an unencrypted format, including deleted data. 

Lack of Decorum 

During the acquisition process, digital investigators documented findings and enabled unauthorized access to concluding evidence. It must be recognized and acknowledged that the fundamental principle for handling forensic investigation in the most unstable environment, such as the CEO’s office, is not a smooth sailing event. Also, forensic investigators must be incredibly careful not to violate any laws and give rise to liability.

Answer All Questions (1:1 – 1:6)

Question 1:1 Do you, as an investigator, believe that forensic investigators charged with the case vehemently violated the laws and rise to liability?

Question 1:2 Do you, as an investigator, have confidence and willing to support digital forensic investigator’s conclusive evidence of this case in court?

Scenario: Try extremely hard to make allowances for forensic investigators’ operation in the most uneven crime scene to avoid breaching the fundamental principle of forensic investigation. 

Question 1:3 Provide a comprehensive plan of action to guide digital forensic investigators in an unbalanced crime scene of this nature. 

Question 1:4 Do you support the option that digital forensic investigators charged with this case should have obtained extra search warrant?

Question 1:5 Describe the Benefits and Drawbacks of Search Warrant on the organization’s Chief Executive Officer in such a given situation.

Question 1:6 Describe the Benefits and Drawbacks of extra Search Warrant on forensic investigators in the same given situation.

Resource assignment fri

Please find at least 5 sites with useful and relevant information that focus on some aspect of blockchain in finance. Include a short summary of the sites and the applicable citations/reference information.

HR 7

minimum 500 words

Discuss the following questions: 1. Discuss Blockchain’s potential application in compensation systems (base wages, incentives, rewards). 2. How can a token economy affect employee compensation? 3. Based on your readings, do worldwide executives believe Blockchain has the potential to radical change the future of organizations? Use the following headings to organize your paper: Introduction, Question 1, Question 2, Question 3, Conclusion, References.

Follow the following writing requirements for all of your discussion prompt responses (note that these writing requirements DO NOT apply to your responses to other students):

Writing Requirements for All Assignments:

  • References MUST be cited within your paper in APA format. Your reference page and in-text citations must match 100%. Papers without in-text citations will earn failing grades.
  • Always include a cover page and reference page with all submissions
  • Your paper must have headings in it. For discussion posts Introduction, Prompt/Question, and Conclusion will suffice as headings.  
  • Provide the EXACT web link for all online sources – do not provide just the home page, but the EXACT LINK – I check all sources
  • No abbreviations, no contractions – write formally
  • Write in the third person formal voice (no first or second person pronouns)
  • Write MORE than the minimum requirement of the word count assigned
  • As always, the word count is ONLY for the BODY of the paper – the cover page, reference page, and / or Appendix (if included) do not count towards the word count for the paper 
  • Indent the first line of each new paragraph five spaces
  • Refer to the example APA paper in the getting started folder under the content tab if you need an example. Also, a power is provided under the information tab that addresses APA format.
  • Use double-spacing / zero point line spacing, a running header, page numbers, and left justify the margins.

Wireless security

  

This week we looked at wireless network security and the issues related to mobile devices. In today’s locked down world with almost everyone working remotely, new challenges that require encryption and cryptography have arisen. And almost everyone is using wireless networks and / or mobile devices. 

Cyber security Managment

 

Learn About creating good password security.

An IT Security consultant has made three primary recommendations regarding passwords:

  1. Prohibit guessable passwords
    • such as common names, real words, numbers only
    • require special characters and a mix of caps, lower case and numbers in passwords
  2. Reauthenticate before changing passwords
    • user must enter old pw before creating new one
  3. Make authenticators unforgeable 
    • do not allow email or user ID as password

Using WORD, write a brief paper of 200-300 words explaining each of these security recommendations.  Do you agree or disagree with these recommendations. Would you change, add or delete any of these?  Add additional criteria as you see necesarry.

Note your Safe Assign score. Continue submitting until your Safe Assign score is less than 25. You have three attempts to complete your assignment.

Attach your WORD doc and then hit SUBMT.

Post-Quantum Cryptography

Explain the rationale for post-quantum cryptography and describe its relevance with different types of cryptographic algorithms.

**Required 300 words**

*2 references**

**No direct questions**

Digital Forensics Tools and Tech

Each student will prepare a final project on a digital forensic topic or on a criminal investigation that involved digital forensics.

Final Project :

1)Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it.

2)Submit a brief abstract describing your final project.(250 words)

3)A 500-700 word, double spaced paper, written in APA format, showing sources and a bibliography

4)Presentation materials (PPT, handouts, etc)  

Discussion

 

Discussion (Chapter 5): What is the relationship between Naïve Bayes and Bayesian networks? What is the process of developing a Bayesian networks model?

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion. Please engage early and often.

Your response should be 100-300 words. Respond to two postings provided by your classmates.

Wireless Security Solutions

Employees want to be mobile, having the ability to move from their desks to meetings and back again. How do you ensure that the data they are accessing follows the rules for CIA?

In a 500- to 750-word essay, develop a plan for securing an enterprise level wireless network, such as the private WGCUSECURE WiFi Network used here on campus. Make sure to address the following:

  1. Which Wireless Security options would you deploy, preventing typical wireless attack vectors? Should you use a layered security approach? Why?
  2. Describe the strategy for your design.
  3. Include a network diagram. Use Microsoft Visio or online network diagraming tools, as identified in the required readings to visualize your design.