SlideShare uma empresa Scribd logo
1 de 18
CIS 417 Week 2 Assignment 1: Computer
Forensics Overview
For more classes visit
www.snaptutorial.com
Assignment 1: Computer Forensics Overview
Due Week 2 and worth 60 points
Suppose you were recently hired for a new position as the computer
forensics specialist at a medium-sized communications company. You
have been asked to prepare a presentation to the Board of Directors on
your main duties for the company and how your position could help
achieve business goals based on security and confidentiality. You are
also aware that the company has just had some issues with employee
complaints of ongoing sexual harassment over email and instant
messaging systems but has been unable to obtain adequate evidence of
any kind.
Write a two to three (2-3) page paper in which you:
Explain the basic primary tasks, high-level investigation processes, and
challenges of a computer forensics specialist.
Provide an overview of how computing devices are used in crimes of
today and how these crimes can affect a company’s data and
information.
Discuss how computer forensics investigations pertain to the law and
trying of cases.
Explain how you could assist in investigating the potential ongoing
sexual harassment complaints and determine how you would
communicate this to the Board of Directors.
Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are: Identify the role of computer forensics in responding to crimes and
solving business challenges.
Outline system forensics issues, laws, and skills.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************
CIS 417 Week 3 Case Study 1 BTK
For more classes visit
www.snaptutorial.com
Case Study 1: BTK
Due Week 3 and worth 60 points
In 2005, serial killer Dennis Rader, also known as BTK, was arrested
and convicted of murdering 10 people in Kansas between the years of
1974 and 1991. Further research this incident using quality and
reputable resources.
Write a two to three (2-3) page paper in which you:
Explicate how digital forensics was used to identify Rader as a suspect
and lead to more concrete physical evidence.
Describe in detail the digital evidence that was uncovered from the
floppy disk obtained from Rader. Discuss why you believe it took so
many years to find concrete evidence in order to build a case against
Rader.
Explain how the acquisition of digital evidence aided the investigation
and whether or not you believe Rader would’ve been a person of interest
if the floppy disk evidence wasn’t sent.
Identify the software that was used by the authorities to uncover the
evidence and summarize how this software can be used for digital
forensics and evidence collection.
Use at least two (2) quality resources in this assignment.Note: Wikipedia
and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Identify the role of computer forensics in responding to crimes and
solving business challenges.
Report investigative findings of potential evidentiary value.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************
CIS 417 Week 4 Assignment 2: Forensic Lab
Design
For more classes visit
www.snaptutorial.com
Assignment 2: Forensic Lab Design
Due Week 4 and worth 90 points
Imagine the university that employs you as an information security
professional has recently identified the need to design and build a digital
forensic laboratory. You have been tasked with designing the lab for the
organization.
Write a four to five (4-5) page paper in which you:
Explicate the steps you would take to plan a budget for the lab, keeping
in mind the general business objective to avoid unneeded costs.
Recommend the physical requirements and controls that you would
consider implementing in order to keep the lab safe and secure.
Identify at least three (3) hardware and software tools that you would
include in the design of the lab and explain your reasons behind your
choices.
Identify the high-level criteria that would be considered when selecting
the forensic workstations to be utilized.
Describe the mandatory policies, processes, and procedures you would
implement in order to maintain the lab environment and preserve
evidence.
Design a floor plan for the lab using a diagramming application such as
Visio or Dia. Note: The graphically depicted solution is not included in
the required page length.
Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
Include charts or diagrams created in Visio or one of their equivalents
such as Open Project Dia. The completed diagrams / charts must be
imported into the Word document before the paper is submitted.
The specific course learning outcomes associated with this assignment
are:
Describe the purpose and structure of a digital forensics lab.
Examine and explain the evidence life cycle.
Describe the constraints on digital forensic investigations.
Develop a computer forensics deployment plan that addresses and
solves a proposed business problem.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************
CIS 417 Week 5 Case Study 2: External
Intrusion of the PlayStation Network
For more classes visit
www.snaptutorial.com
Case Study 2: External Intrusion of the PlayStation Network
Due Week 5 and worth 60 points
On April 20, 2011, the Sony PlayStation Network was taken offline after
an external intrusion was discovered. Further research this incident
using quality and reputable resources.
Write a two to three (2-3) page paper in which you:
Briefly summarize the details of the attack on the PlayStation Network,
including the dates of when the attack started and was eventually
uncovered.
Indicate what explanation Sony officials gave for the length of time that
had passed from the start of the attack to when the general public was
made aware of the details.
Analyze and explain what you believe the correct forensic investigative
action would have been once the attack was uncovered.
Explicate whether or not you believe the Sony forensic teams could have
provided a quicker analysis of the situation and the damage incurred.
Discuss why you believe this way and what you think is an appropriate
amount of time after a breach before those affected are made aware.
Use at least two (2) quality resources in this assignment.Note: Wikipedia
and similar Websites do not qualify as quality resources. Explicate
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Identify the role of computer forensics in responding to crimes and
solving business challenges.
Outline system forensics issues, laws, and skills.
Identify the procurement of evidence in physical and virtualized
environments.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************
CIS 417 Week 6 Assignment 3 Securing the
Scene
For more classes visit
www.snaptutorial.com
Assignment 3: Securing the Scene
Due Week 6 and worth 60 points
Imagine you are a digital forensic investigator for a healthcare
organization. You learn from your internal information security
department that an employee has been using password-cracking
software to access confidential customer insurance information. The
account information extracted is unknown at this time, though it appears
as though multiple computers were being used for the crime and it isn’t
clear whether an attack is currently in progress. The employee has been
detained but his computers remain online.
Write a two to three (2-3) page paper in which you:
Develop a detailed plan to approach and secure the incident scene
based on the information you have from the scenario.
Discuss the initial steps you would take for the investigation, depending
on whether or not the attack is still in progress. Include how your
actions would differ based on the current status of the incident.
Explicate the importance of creating an order of volatility by identifying
the potential evidence that is the most volatile. Explain, in detail, how
you would extract this evidence.
Identify the high-level steps that would be performed in collecting and
analyzing the evidence. Include steps that are required, as well as what
should not be done, in order to maintain the potential admissibility of
evidence.
Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Outline system forensics issues, laws, and skills.
Examine and explain the evidence life cycle.
Analyze the impact of sequestration on the evidence-gathering process.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************
CIS 417 Week 7 Case Study 3: Casey Anthony
Trial
For more classes visit
www.snaptutorial.com
Case Study 3: Casey Anthony Trial
Due Week 7 and worth 60 points
On July 5, 2011, Casey Anthony was found not guilty of first-degree
murder in the 2008 death of her daughter, Caylee. Further research this
incident using quality and reputable resources.
Write a two to three (2-3) page paper in which you:
Provide a brief summary of the background, charges, and trial of this
high-profile court case.
Explain, from a forensics perspective, the digital evidence found on the
Anthony family computer that helped the prosecutors build a case
against Anthony.
Describe what the prosecution was unable to prove based on the digital
evidence found. Indicate whether or not you think this is a common
problem with digital evidence and provide a rationale for your response.
Explain the software issue that was found to have caused inaccurate
evidence to be admitted into the trial.
Determine whether the software issue, which caused inaccurate
evidence in the trial, would’ve affected your perception of the
prosecution’s case if you were a juror in this trial.
Use at least two (2) quality resources in this assignment.Note: Wikipedia
and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Outline system forensics issues, laws, and skills.
Develop plans that collect evidence in network and email environments.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
Examine automated digital forensic analysis.
********************************************************
CIS 417 Week 8 Assignment 4 Data-Hiding
Techniques
For more classes visit
www.snaptutorial.com
Assignment 4: Data-Hiding Techniques
Due Week 8 and worth 60 points
Suppose you are the Chief Security Officer for a financial institution.
Someone on your information security staff has informed you that recent
Web content filters have shown an end user who has been visiting sites
dedicated to alternate data stream (ADS) and steganography hiding
techniques. She is interested in what the end user may be doing and
comes to you for some explanation on these techniques.
Write a two to three (2-3) page paper in which you:
Explain how a user could utilize ADS to hide data and explain other
destructive uses which exist for ADS.
Determine how rootkits can be used as an alternative for data hiding
and explicate why they can be used for this purpose.
Describe the processes and tools used by an investigator in determining
whether signs of steganography are present in a given situation.
Select two (2) tools that could be used for steganography and explain
how these tools can help someone hide data from others.
Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Identify the role of computer forensics in responding to crimes and
solving business challenges.
Outline system forensics issues, laws, and skills.
Develop plans that collect evidence in network and email environments.
Describe the constraints on digital forensic investigations.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************
CIS 417 Week 10 Term Paper Investigating Data
Theft
For more classes visit
www.snaptutorial.com
Term Paper: Investigating Data Theft
Due Week 10 and worth 150 points
Suppose a large aerospace engineering firm has immediately hired you
as a consultant to investigate a potential violation of corporate policy
and data theft. You have been informed that an employee may have been
using corporate email to send confidential corporate information to one
or more personal email accounts, which may or may not belong to him.
You have been told that this action has been happening each business
day for the last 13 days and the employee is unaware of any suspicion.
Write an eight to ten (8-10) page paper in which you:
Explain, in detail, the initial actions you would take based on the
provided information including formal plans to preserve the crime
scene(s) and eventual transportation of evidence to a lab.
Analyze the physical and logical places where you would look for
potential evidence on the suspect’s computer(s) and / or network
servers.
Describe, in detail, how you proceed with the email investigation,
including the review of email headers and tracing.
Describe the processes that would be utilized in order to recover data
that may have been deleted from the suspect’s computer(s).
Identify the tools you would use to perform your investigation from
beginning to end based on the information you have on the incident.
Provide a brief overview of each tool, to include:
A description of the tool.
How you would use the tool in the investigation.
How the tool helps the investigation and the evidence you expect it to
provide.
Why you believe the evidence the tool provides is critical to the
investigation.
· Use at least five (5) quality resources in this assignment.
Note:Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Identify the role of computer forensics in responding to crimes and
solving business challenges.
Outline system forensics issues, laws, and skills.
Examine and explain the evidence life cycle.
Identify the procurement of evidence in physical and virtualized
environments.
Analyze the impact of sequestration on the evidence-gathering process.
Develop plans that collect evidence in network and email environments.
Examine automated digital forensic analysis.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************

Mais conteúdo relacionado

Mais procurados

Cisa 3358600, april 2021 research paper instructions 1
Cisa 3358600, april 2021   research paper instructions 1 Cisa 3358600, april 2021   research paper instructions 1
Cisa 3358600, april 2021 research paper instructions 1 RAJU852744
 
Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1infinityend3
 
CIS 550 Success Begins / snaptutorial.com
CIS 550 Success Begins / snaptutorial.comCIS 550 Success Begins / snaptutorial.com
CIS 550 Success Begins / snaptutorial.comRobinson075
 
INF 103(ASH) Learn/newtonhelp.com
INF 103(ASH) Learn/newtonhelp.comINF 103(ASH) Learn/newtonhelp.com
INF 103(ASH) Learn/newtonhelp.comlechenau48
 
Cis 500 Believe Possibilities / snaptutorial.com
Cis 500 Believe Possibilities / snaptutorial.comCis 500 Believe Possibilities / snaptutorial.com
Cis 500 Believe Possibilities / snaptutorial.comStokesCope11
 
Action Research Statement of the Issue
Action Research Statement of the Issue Action Research Statement of the Issue
Action Research Statement of the Issue Mae Guerra
 
A Federated Search Approach to Facilitate Systematic Literature Review in Sof...
A Federated Search Approach to Facilitate Systematic Literature Review in Sof...A Federated Search Approach to Facilitate Systematic Literature Review in Sof...
A Federated Search Approach to Facilitate Systematic Literature Review in Sof...ijseajournal
 
Computing Written Paper 1 General Comments Zimsec Cambridge 9691 Zimbabwe
Computing Written Paper 1 General Comments Zimsec Cambridge 9691 ZimbabweComputing Written Paper 1 General Comments Zimsec Cambridge 9691 Zimbabwe
Computing Written Paper 1 General Comments Zimsec Cambridge 9691 ZimbabweAlpro
 
System and design chapter-2
System and design chapter-2System and design chapter-2
System and design chapter-2Best Rahim
 
Cis 348 Education Organization / snaptutorial.com
Cis 348  Education Organization / snaptutorial.comCis 348  Education Organization / snaptutorial.com
Cis 348 Education Organization / snaptutorial.comBaileya82
 
Cis 560 Enthusiastic Study / snaptutorial.com
Cis 560 Enthusiastic Study / snaptutorial.comCis 560 Enthusiastic Study / snaptutorial.com
Cis 560 Enthusiastic Study / snaptutorial.comStephenson06
 
College of administration and finance sciences assignment (
College of administration and finance sciences assignment (College of administration and finance sciences assignment (
College of administration and finance sciences assignment (RAJU852744
 

Mais procurados (12)

Cisa 3358600, april 2021 research paper instructions 1
Cisa 3358600, april 2021   research paper instructions 1 Cisa 3358600, april 2021   research paper instructions 1
Cisa 3358600, april 2021 research paper instructions 1
 
Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1
 
CIS 550 Success Begins / snaptutorial.com
CIS 550 Success Begins / snaptutorial.comCIS 550 Success Begins / snaptutorial.com
CIS 550 Success Begins / snaptutorial.com
 
INF 103(ASH) Learn/newtonhelp.com
INF 103(ASH) Learn/newtonhelp.comINF 103(ASH) Learn/newtonhelp.com
INF 103(ASH) Learn/newtonhelp.com
 
Cis 500 Believe Possibilities / snaptutorial.com
Cis 500 Believe Possibilities / snaptutorial.comCis 500 Believe Possibilities / snaptutorial.com
Cis 500 Believe Possibilities / snaptutorial.com
 
Action Research Statement of the Issue
Action Research Statement of the Issue Action Research Statement of the Issue
Action Research Statement of the Issue
 
A Federated Search Approach to Facilitate Systematic Literature Review in Sof...
A Federated Search Approach to Facilitate Systematic Literature Review in Sof...A Federated Search Approach to Facilitate Systematic Literature Review in Sof...
A Federated Search Approach to Facilitate Systematic Literature Review in Sof...
 
Computing Written Paper 1 General Comments Zimsec Cambridge 9691 Zimbabwe
Computing Written Paper 1 General Comments Zimsec Cambridge 9691 ZimbabweComputing Written Paper 1 General Comments Zimsec Cambridge 9691 Zimbabwe
Computing Written Paper 1 General Comments Zimsec Cambridge 9691 Zimbabwe
 
System and design chapter-2
System and design chapter-2System and design chapter-2
System and design chapter-2
 
Cis 348 Education Organization / snaptutorial.com
Cis 348  Education Organization / snaptutorial.comCis 348  Education Organization / snaptutorial.com
Cis 348 Education Organization / snaptutorial.com
 
Cis 560 Enthusiastic Study / snaptutorial.com
Cis 560 Enthusiastic Study / snaptutorial.comCis 560 Enthusiastic Study / snaptutorial.com
Cis 560 Enthusiastic Study / snaptutorial.com
 
College of administration and finance sciences assignment (
College of administration and finance sciences assignment (College of administration and finance sciences assignment (
College of administration and finance sciences assignment (
 

Semelhante a Cis 417 Success Begins / snaptutorial.com

CIS 562 Success Begins / snaptutorial.com
CIS 562 Success Begins / snaptutorial.comCIS 562 Success Begins / snaptutorial.com
CIS 562 Success Begins / snaptutorial.comRobinson075
 
CIS 562 Focus Dreams/newtonhelp.com
CIS 562 Focus Dreams/newtonhelp.comCIS 562 Focus Dreams/newtonhelp.com
CIS 562 Focus Dreams/newtonhelp.combellflower91
 
CIS 562 Imagine Your Future/newtonhelp.com   
CIS 562 Imagine Your Future/newtonhelp.com   CIS 562 Imagine Your Future/newtonhelp.com   
CIS 562 Imagine Your Future/newtonhelp.com   bellflower51
 
Strayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-dataStrayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-datainfinityend3
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxrhetttrevannion
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comRobinson070
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comsholingarjosh56
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comGeorgeDixon100
 
Cis 515 Effective Communication-snaptutorial.com
Cis 515 Effective Communication-snaptutorial.comCis 515 Effective Communication-snaptutorial.com
Cis 515 Effective Communication-snaptutorial.comjhonklinz10
 
CIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.comCIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.comRobinson068
 
CIS 515 Enhance teaching / snaptutorial.com
CIS 515 Enhance teaching / snaptutorial.com CIS 515 Enhance teaching / snaptutorial.com
CIS 515 Enhance teaching / snaptutorial.com donaldzs56
 
CIS 515 Education Organization / snaptutorial.com
CIS 515 Education Organization / snaptutorial.comCIS 515 Education Organization / snaptutorial.com
CIS 515 Education Organization / snaptutorial.comMcdonaldRyan38
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worogglili
 
CIS 356 Success Begins / snaptutorial.com
CIS 356 Success Begins / snaptutorial.comCIS 356 Success Begins / snaptutorial.com
CIS 356 Success Begins / snaptutorial.comRobinson070
 
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxAssignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxastonrenna
 
Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-4-assignment-2Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-4-assignment-2infinityend3
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comRobinson069
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comGeorgeDixon99
 

Semelhante a Cis 417 Success Begins / snaptutorial.com (18)

CIS 562 Success Begins / snaptutorial.com
CIS 562 Success Begins / snaptutorial.comCIS 562 Success Begins / snaptutorial.com
CIS 562 Success Begins / snaptutorial.com
 
CIS 562 Focus Dreams/newtonhelp.com
CIS 562 Focus Dreams/newtonhelp.comCIS 562 Focus Dreams/newtonhelp.com
CIS 562 Focus Dreams/newtonhelp.com
 
CIS 562 Imagine Your Future/newtonhelp.com   
CIS 562 Imagine Your Future/newtonhelp.com   CIS 562 Imagine Your Future/newtonhelp.com   
CIS 562 Imagine Your Future/newtonhelp.com   
 
Strayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-dataStrayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-data
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docx
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.com
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.com
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.com
 
Cis 515 Effective Communication-snaptutorial.com
Cis 515 Effective Communication-snaptutorial.comCis 515 Effective Communication-snaptutorial.com
Cis 515 Effective Communication-snaptutorial.com
 
CIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.comCIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.com
 
CIS 515 Enhance teaching / snaptutorial.com
CIS 515 Enhance teaching / snaptutorial.com CIS 515 Enhance teaching / snaptutorial.com
CIS 515 Enhance teaching / snaptutorial.com
 
CIS 515 Education Organization / snaptutorial.com
CIS 515 Education Organization / snaptutorial.comCIS 515 Education Organization / snaptutorial.com
CIS 515 Education Organization / snaptutorial.com
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 
CIS 356 Success Begins / snaptutorial.com
CIS 356 Success Begins / snaptutorial.comCIS 356 Success Begins / snaptutorial.com
CIS 356 Success Begins / snaptutorial.com
 
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxAssignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
 
Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-4-assignment-2Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-4-assignment-2
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.com
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.com
 

Último

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 

Último (20)

fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 

Cis 417 Success Begins / snaptutorial.com

  • 1. CIS 417 Week 2 Assignment 1: Computer Forensics Overview For more classes visit www.snaptutorial.com Assignment 1: Computer Forensics Overview Due Week 2 and worth 60 points Suppose you were recently hired for a new position as the computer forensics specialist at a medium-sized communications company. You have been asked to prepare a presentation to the Board of Directors on your main duties for the company and how your position could help achieve business goals based on security and confidentiality. You are also aware that the company has just had some issues with employee complaints of ongoing sexual harassment over email and instant messaging systems but has been unable to obtain adequate evidence of any kind. Write a two to three (2-3) page paper in which you: Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist. Provide an overview of how computing devices are used in crimes of today and how these crimes can affect a company’s data and information.
  • 2. Discuss how computer forensics investigations pertain to the law and trying of cases. Explain how you could assist in investigating the potential ongoing sexual harassment complaints and determine how you would communicate this to the Board of Directors. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Identify the role of computer forensics in responding to crimes and solving business challenges. Outline system forensics issues, laws, and skills. Use technology and information resources to research issues in computer forensics. Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.
  • 3. ******************************************************** CIS 417 Week 3 Case Study 1 BTK For more classes visit www.snaptutorial.com Case Study 1: BTK Due Week 3 and worth 60 points In 2005, serial killer Dennis Rader, also known as BTK, was arrested and convicted of murdering 10 people in Kansas between the years of 1974 and 1991. Further research this incident using quality and reputable resources. Write a two to three (2-3) page paper in which you: Explicate how digital forensics was used to identify Rader as a suspect and lead to more concrete physical evidence. Describe in detail the digital evidence that was uncovered from the floppy disk obtained from Rader. Discuss why you believe it took so many years to find concrete evidence in order to build a case against Rader.
  • 4. Explain how the acquisition of digital evidence aided the investigation and whether or not you believe Rader would’ve been a person of interest if the floppy disk evidence wasn’t sent. Identify the software that was used by the authorities to uncover the evidence and summarize how this software can be used for digital forensics and evidence collection. Use at least two (2) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Identify the role of computer forensics in responding to crimes and solving business challenges. Report investigative findings of potential evidentiary value. Use technology and information resources to research issues in computer forensics.
  • 5. Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions. ******************************************************** CIS 417 Week 4 Assignment 2: Forensic Lab Design For more classes visit www.snaptutorial.com Assignment 2: Forensic Lab Design Due Week 4 and worth 90 points Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization. Write a four to five (4-5) page paper in which you: Explicate the steps you would take to plan a budget for the lab, keeping in mind the general business objective to avoid unneeded costs.
  • 6. Recommend the physical requirements and controls that you would consider implementing in order to keep the lab safe and secure. Identify at least three (3) hardware and software tools that you would include in the design of the lab and explain your reasons behind your choices. Identify the high-level criteria that would be considered when selecting the forensic workstations to be utilized. Describe the mandatory policies, processes, and procedures you would implement in order to maintain the lab environment and preserve evidence. Design a floor plan for the lab using a diagramming application such as Visio or Dia. Note: The graphically depicted solution is not included in the required page length. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or one of their equivalents such as Open Project Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.
  • 7. The specific course learning outcomes associated with this assignment are: Describe the purpose and structure of a digital forensics lab. Examine and explain the evidence life cycle. Describe the constraints on digital forensic investigations. Develop a computer forensics deployment plan that addresses and solves a proposed business problem. Use technology and information resources to research issues in computer forensics. Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions. ******************************************************** CIS 417 Week 5 Case Study 2: External Intrusion of the PlayStation Network For more classes visit www.snaptutorial.com
  • 8. Case Study 2: External Intrusion of the PlayStation Network Due Week 5 and worth 60 points On April 20, 2011, the Sony PlayStation Network was taken offline after an external intrusion was discovered. Further research this incident using quality and reputable resources. Write a two to three (2-3) page paper in which you: Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered. Indicate what explanation Sony officials gave for the length of time that had passed from the start of the attack to when the general public was made aware of the details. Analyze and explain what you believe the correct forensic investigative action would have been once the attack was uncovered. Explicate whether or not you believe the Sony forensic teams could have provided a quicker analysis of the situation and the damage incurred. Discuss why you believe this way and what you think is an appropriate amount of time after a breach before those affected are made aware. Use at least two (2) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Explicate Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • 9. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Identify the role of computer forensics in responding to crimes and solving business challenges. Outline system forensics issues, laws, and skills. Identify the procurement of evidence in physical and virtualized environments. Use technology and information resources to research issues in computer forensics. Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions. ******************************************************** CIS 417 Week 6 Assignment 3 Securing the Scene For more classes visit
  • 10. www.snaptutorial.com Assignment 3: Securing the Scene Due Week 6 and worth 60 points Imagine you are a digital forensic investigator for a healthcare organization. You learn from your internal information security department that an employee has been using password-cracking software to access confidential customer insurance information. The account information extracted is unknown at this time, though it appears as though multiple computers were being used for the crime and it isn’t clear whether an attack is currently in progress. The employee has been detained but his computers remain online. Write a two to three (2-3) page paper in which you: Develop a detailed plan to approach and secure the incident scene based on the information you have from the scenario. Discuss the initial steps you would take for the investigation, depending on whether or not the attack is still in progress. Include how your actions would differ based on the current status of the incident. Explicate the importance of creating an order of volatility by identifying the potential evidence that is the most volatile. Explain, in detail, how you would extract this evidence. Identify the high-level steps that would be performed in collecting and analyzing the evidence. Include steps that are required, as well as what should not be done, in order to maintain the potential admissibility of evidence.
  • 11. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Outline system forensics issues, laws, and skills. Examine and explain the evidence life cycle. Analyze the impact of sequestration on the evidence-gathering process. Use technology and information resources to research issues in computer forensics. Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions. ********************************************************
  • 12. CIS 417 Week 7 Case Study 3: Casey Anthony Trial For more classes visit www.snaptutorial.com Case Study 3: Casey Anthony Trial Due Week 7 and worth 60 points On July 5, 2011, Casey Anthony was found not guilty of first-degree murder in the 2008 death of her daughter, Caylee. Further research this incident using quality and reputable resources. Write a two to three (2-3) page paper in which you: Provide a brief summary of the background, charges, and trial of this high-profile court case. Explain, from a forensics perspective, the digital evidence found on the Anthony family computer that helped the prosecutors build a case against Anthony. Describe what the prosecution was unable to prove based on the digital evidence found. Indicate whether or not you think this is a common problem with digital evidence and provide a rationale for your response. Explain the software issue that was found to have caused inaccurate evidence to be admitted into the trial.
  • 13. Determine whether the software issue, which caused inaccurate evidence in the trial, would’ve affected your perception of the prosecution’s case if you were a juror in this trial. Use at least two (2) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Outline system forensics issues, laws, and skills. Develop plans that collect evidence in network and email environments. Use technology and information resources to research issues in computer forensics. Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions. Examine automated digital forensic analysis. ********************************************************
  • 14. CIS 417 Week 8 Assignment 4 Data-Hiding Techniques For more classes visit www.snaptutorial.com Assignment 4: Data-Hiding Techniques Due Week 8 and worth 60 points Suppose you are the Chief Security Officer for a financial institution. Someone on your information security staff has informed you that recent Web content filters have shown an end user who has been visiting sites dedicated to alternate data stream (ADS) and steganography hiding techniques. She is interested in what the end user may be doing and comes to you for some explanation on these techniques. Write a two to three (2-3) page paper in which you: Explain how a user could utilize ADS to hide data and explain other destructive uses which exist for ADS. Determine how rootkits can be used as an alternative for data hiding and explicate why they can be used for this purpose. Describe the processes and tools used by an investigator in determining whether signs of steganography are present in a given situation.
  • 15. Select two (2) tools that could be used for steganography and explain how these tools can help someone hide data from others. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Identify the role of computer forensics in responding to crimes and solving business challenges. Outline system forensics issues, laws, and skills. Develop plans that collect evidence in network and email environments. Describe the constraints on digital forensic investigations. Use technology and information resources to research issues in computer forensics. Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.
  • 16. ******************************************************** CIS 417 Week 10 Term Paper Investigating Data Theft For more classes visit www.snaptutorial.com Term Paper: Investigating Data Theft Due Week 10 and worth 150 points Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. You have been informed that an employee may have been using corporate email to send confidential corporate information to one or more personal email accounts, which may or may not belong to him. You have been told that this action has been happening each business day for the last 13 days and the employee is unaware of any suspicion. Write an eight to ten (8-10) page paper in which you: Explain, in detail, the initial actions you would take based on the provided information including formal plans to preserve the crime scene(s) and eventual transportation of evidence to a lab.
  • 17. Analyze the physical and logical places where you would look for potential evidence on the suspect’s computer(s) and / or network servers. Describe, in detail, how you proceed with the email investigation, including the review of email headers and tracing. Describe the processes that would be utilized in order to recover data that may have been deleted from the suspect’s computer(s). Identify the tools you would use to perform your investigation from beginning to end based on the information you have on the incident. Provide a brief overview of each tool, to include: A description of the tool. How you would use the tool in the investigation. How the tool helps the investigation and the evidence you expect it to provide. Why you believe the evidence the tool provides is critical to the investigation. · Use at least five (5) quality resources in this assignment. Note:Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover
  • 18. page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Identify the role of computer forensics in responding to crimes and solving business challenges. Outline system forensics issues, laws, and skills. Examine and explain the evidence life cycle. Identify the procurement of evidence in physical and virtualized environments. Analyze the impact of sequestration on the evidence-gathering process. Develop plans that collect evidence in network and email environments. Examine automated digital forensic analysis. Use technology and information resources to research issues in computer forensics. Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions. ********************************************************