4.2 Case Study

A murder in a downtown office building has been widely publicized. You’re a police detective and receive a phone call from a computer forensics investigator employed by the police department. His name is Gary Owens, and he says he has information that might relate to the murder case. Gary says he ran across a few files while investigating another case at a company in the same building. Considering the plain view doctrine, what procedures might you and he, as public officials have to follow? Write a one-page paper detailing what you might do.

No journal or book references, only websites, such as www.google.com as references. 

Written Assignment

Discuss  predictive patterns. 

Application area: 
To develop an algorithm using  Artificial Intelligence, or even implementing Artificial Intelligence to read users’ patterns like (typing speed, verb usage, accessing applications, mouse moments…) 
The idea is to claim the users’ login to be true. (Even if a hacker hacked in, this predictive analysis can trigger an alert for a manual audit on the login or send few more security questions on the screen before the logged-in user can swim around). Do you agree or disagree and provide an example?

digital project

 Submit your final project topic here. Include a short paragraph describing your project and how you intend to research it. 

300 words

 

Each student will prepare a final project on a digital forensic topic or on a criminal investigation that involved digital forensics.. The primary deliverables for the project will be a paper and and also a presentation that will be presented by the student during the residency period.

  

Anonymous

Citizen Rights vs Security

Cloud Computing

Computer Forensics

Data Center Security

Disaster Recovery

Edward Snowden – Traitor or Hero

Encryption

Hardware and Software Security

I Love You virus

Keyloggers

Mobile Malware

Mobile Security

Pharming

Phishing

Presidential Election 2016

Quantum Computers – Impact on Encryption

Ransomware, malware, business security

Security and the Cloud

Smart Grid

SOFTWARE CRACKERS

Stuxnet Virus

Undersea Cable

United State Cyber Command

Web War I – Estonia Attack

White Hat Hacking

Wi-Fi Security: Wireless Network Encryption

Creating Exploits

Home Automation Security and Vulnerabilities

Car Hacking

Computation

 

Estudie las siguientes lesiones en GCFAprendeLibre (Informática Básica 1-20).

Prepare y suba un documento con las palabras de vocabulario y sus definiciones. Solo la palabra y la definición o descripción presentada en la lección.

Ejemplo:

Palabra o FraseDefinición o DescripciónTarjeta de vídeoProcesa toda la información que ves en el monitor. La mayoría de los equipos tienen una tarjeta integrada en la placa base en lugar de tener una tarjeta de video separada.

Lecciones: Informática Básica 1-20

Vocabulario:

Hardware
Software
Sistema operativo
Laptop
Desktop
Ratón
Monitor
USB drive
CPU
Tarjeta madre
RAM
Disco Duro

Discussion week

As the modern database grows bigger and bigger, many organizations are moving away from a relational store and looking towards NoSQL design. There is a desperate need to consider storage and file structure as part of physical design principles. If you were implementing a new database system for an ERP or CRM that required a minimum of 100 TB of storage per year, what would you consider as you plan your physical design?

Instructions

This is a required assignment, worth 15 points. The assignment must be submitted by the due date. Late assignment are not allowed. 

You are required to submit a minimum of two postings. Points will be deducted for not fulfilling this minimum requirement.

Apply and use the basic citation styles of APA is required. Points are deducted per the rubric for this behavior.

Do not claim credit for the words, ideas, and concepts of others. Use in-text citation and list the reference of your supporting source following APA’s style and formatting. Points are deducted per the rubric for this behavior.

Do not copy and paste information or concepts from the Internet and claim that is your work. It will be considered Plagiarism and you will receive zero for your work. A second offense results in a zero for the course. A third is termination from the university.

Discussion: Security Breach Evaluation

 

Learning Objectives and Outcomes

  • Analyze the given case study on security breach.
  • Recommend controls to avoid an enterprise security breach.

Assignment Requirements

Read the attached text sheet named “Local Breach of Sensitive Online Data” and address the following:

Using what you have learned about security breaches, describe what measures should have been taken by the educational service and test preparation provider to avoid the security breach mentioned in the text sheet.

Operating System (Computer Science)

You need to have set up your Class DevBox Environment (see the Getting Started section) before starting this assignment.

The assignment description is attached and is also available in your repository subdirectory named assg03. Follow the assignment instructions and submit the required tar.gz submission file to this MyLeoOnline dropbox by the due date. You should only submit the assg03.tar.gz for this assignment, no other files should be submitted. Use the make submit target to create the correct submission file:

$ make submit

For this assignment you should have git, vagrant and virtual box setup in your computer. Please visit the following link provided by my professor for these setup.

https://bitbucket.org/dharter/csci430-os-sims

And the assignment is attached below.

Discussion

 After reading chapter 4, evaluate the history of the Data Encryption Standard (DES) and then how it has transformed cryptography with the advancement of triple DES.  The initial post must be completed by Thursday at 11:59 eastern.  You are also required to post a response to a minimum of two other students in the class by the end of the week.  You must use at least one scholarly resource.  Every discussion posting must be properly APA formatted.