SlideShare a Scribd company logo
1 of 8
Assignment 1 ) ----- Portfolio Assignments
Preface
Listed below are areas of concentration for MSDF-630 202
Portfolio Assignment. Keep in mind that the portfolio research
concentration is an essential segment of the course. Two
research topics are created for you, and I hope that your
professional effort will be represented in this project. Portfolio
projects consist of the following three unique phases:
Profile.
Research Question 1
Investigation of Alabi, Time as Alibi and Location as Alibi.
Research Question 2.
Cybercrime Law, Computer-Integrity Crime, Fraud, and Abuse.
Portfolio Project
Profile: Required
Group 1. Research Question 1
Group 2. Research Question 2
Group 3. Research Question 1
Group 4. Research Question 2
Each student Must submit two (2) successful completed
documents (here):
Profile
Collaborative Group Assignment.
Phase 1: Student Professional Profile
Portfolio
Full-Name
Profile
Status: Graduate or Post-graduate
Academic areas concentration
Current Professional Career Path
Professional Career Path Completion Upon successful
completion of your studies at the University of the
Cumberlands.
Research Question 1.
Investigation of Alabi, Time as Alibi and Location as Alibi.
Preamble
Alibi is a Latin acronym, meaning somewhere else and someone
other than the culprit. A scenario that identifies the perpetrator
of a crime to be someone or somewhere else other than where
the crime took place. Criminal activities involving location,
login and logout time, illegal behaviors, can be easily tracked
by use computer and internet technologies.
Offenders and their Alabi are often naive and ignore the fact
that telephone companies always keep records of the number
dialed, the time and duration of the call, and caller's number.
Offenders and their Alabi are oblivious and unaware of the fact
that credit card corporations keep records of the dates, times,
and locations of all purchases, banks keep track of the dates,
times, and locations of all deposits and withdrawals, and dates,
times, and locations reside on computers for an indefinite
period. Customers receive a report each month with detailed
information in the form of a bill and financial statement.
Offenders and their Alabi are often neglectful of the fact that
when an e-mail message is sent, the time and originating
internet protocol (IP) addresses are noted in the header and log
files that contain information of the past and current activities.
Forensic investigator must be vigilant at all times and try to
acknowledge and recognize criminal Modus Operandi (MO)
motive, intent, and ability to manipulate and change contents of
the conclusive evidence and create false Alibi to amplify
deceitful schemes. During the investigation of an alibi, the first
step is to secure access to the data and information on the
computer workstations, file servers, protocol, and network
system.
BOOTP is the computer network designed to control and
monitor which computers and specific internet protocol (IP)
addresses. The BOOTP is a networking protocol used to
automatically assign an IP address to network devices from a
configuration server. Furthermore, BOOTP is often configured
to synchronize their clocks regularly with exactly accurate time
satellites and create a log in case of any discrepancies.
Dynamic host configurations protocol (DHCP) server is
designed to automatically assign IP address and other
information to each host on the network, communicate
efficiently with other endpoints. Furthermore, the DHCP system
allows anyone to change their clocks and does not keep logs of
time changes. A DHCP server enables computers to
automatically request IP addresses and networking parameters
from the internet service provider (ISP), reducing the need for a
network administrator and a user to assign IP addresses to all
network devices manually.
Situation 1: Investigation of the Victim, Alibi, and Conspirator
.
Alibi defense does not play an essential role in a conspiracy
theory. Conspiracy is an agreement between two lawless
persons to commit a crime, and one of the parties must agree to
engage in an overt act in furtherance of the crime.
Research Question 1:1
. Develop a measurable research framework relative to the user
computer and internet technologies, criminal Modus Operandi,
(MO) motive, intent, conspiracy theory, and dynamic host
configurations protocol (DHCP) server to amplify conclusive
evidence in court.
Research Question 1:2
. To what extent are the significant differences between the
Victim and the suspect?
Research Question 1:3
. To what extent are the significant differences between the
suspect and Alibi
Research Question 1:4.
To what extent are the significant differences between Alibi
and conspirators?
Situation 2.
The Alibi can exercise the constitutional right to remain silent,
granting the alibi opportunity to reposition the witness other
than the crime scene.
Research Question 1
.5. Develop a measurable research framework allowing the
forensic investigator to use computer and internet technologies,
criminal modus operandi (MO), motive, intent and, bootstrap
protocol (BOOTP) to gather data and information on more than
one crime scene for the same case.
Situation 3:
A Judge can be suspicion of the alibi evidence. The burden of
proof often rests on the prosecutor, who must prove that the
suspected Alibi is guilty beyond a reasonable doubt. The add-on
burden of proof is on the forensic investigator who visited the
crime scene.
Research Question 1
:6 Develop a measurable research framework relative to
criminal modus Operandi (MO) motive, intent, to help forensic
investigator’s attempt to bring the suspected criminal to justice,
only if the person was guilty.
Research Question 2.
Cybercrime Law, Computer-Integrity Crime, Fraud, and Abuse.
Preamble.
Integrity of evidence, cyber-crime, fraud, and abuse are
prefaced on the assumption that computer and internet
technologies are designed to make life easier for a public and
private organization, the judicial system, and forensic
investigators; it has, unfortunately, made life incredibly
challenging and enduring in all levels of forensic investigation.
Cyber-crime, fraud, abuse, are open-ended criminal operations,
allowing unauthorized users to obtain information from various
sources against a target organization. Naturally, criminals are
endowed with extraordinary skills and expertise to break into
any organization's secured network center. Most criminal are
have access automated freeware tools available on computer and
Internet and breaks into the organization's secured network
system, data, assets, resources, to make forensic investigation
exceedingly tricky. Most organizations and the global
community are actively using computer and internet
technologies to build four walls around security data storage
centers, creating an opportunity for forensic investigator’s
ability to produce reliable evidence. Similarly, organizations
and the global defensive approach require a proactive plan of
action to guide against data breach. This section examines the
primary federal statutes used to prosecute cybercrime. The
focus is on the Computer Fraud and Abuse Act and the statutes
criminalizing identity theft, child pornography, and copyright
and trademark offenses (Casey, 2011: 86-95).
Computer Fraud and Abuse Act
The Computer Fraud and Act, Abuse is the primary source of
federal law related to computer cybercrimes, and approval of
the Computer Fraud and Abuse Act (CFAA) in 1986
. The amendments were designed to update specific Arts
provisions in light of advancements in computer and internet
technologies and to address loopholes that existed in earlier
versions of the Act. Criminals gaining unauthorized access to a
computer, disseminating malware, launching denial of service
attacks, trafficking passwords, and using computers and the
internet to commit fraud. Criminals are sophisticated and can
intentionally use the computer and internet technologies without
authorization.
Research Question 2:1.
Develop a measurable research framework of hos computer
fraud and Abuse Act (CFAA) can play a role during the forensic
investigation and impact on conclusive evidence in court.
Research Question 2:2
. To what extent can the computer fraud and Abuse Act (CFAA)
of 1986 empowers forensic investigation to bring cyber-crime,
fraud, and abuse to justice.
Situation 1.
Naturally, criminals often retain extraordinary skills and
expertise to break into any
organization's secured network center. The criminal fully
utilizes automated freeware
tools available on computers and the Internet and breaks into
the organization's secured network system, data, assets,
resources, and makes forensic investigation exceedingly.
These extraordinary skills, expertise, and availability of
automated freeware tools are creating a considerable obstacle
against the forensic investigation process. We are the nation of
law.
Question 2:3.
Develop a measurable research framework of amendment items
needed to strengthen the computer fraud and Abuse Act
(CFAA), and expand forensic investigator authority over
criminal activities.
Assignment 2 ) ----- Attached a document below, please take a
look
Assignment 1 is Due on 12/6/2020 and Assignment 2 is due on
12/3/2020
NO PLAGIARISM
FOLLOW APA FORMAT
Need 3 Pages

More Related Content

Similar to Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx

" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"sharinblitz
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptxaratibhavsar
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop newforensicsnation
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshopforensicsnation
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crimeAlisha Korpal
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docxaryan532920
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxVaishnaviBorse8
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]Kolluru N Rao
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)CA.Kolluru Narayanarao
 
Become a Certified Ethical Hacker at Blitz Academy | Near Me
Become a Certified Ethical Hacker at Blitz Academy | Near MeBecome a Certified Ethical Hacker at Blitz Academy | Near Me
Become a Certified Ethical Hacker at Blitz Academy | Near Meshyamv3005
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsSamantha Vargas
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its toolsKathirvel Ayyaswamy
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicDhiren Gala
 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsMustapha Mugisa
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsSagar Rahurkar
 

Similar to Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx (20)

" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
" Become a Certified Ethical Hacker at Blitz Academy | Near Me"
 
FCL-Introduction.pptx
FCL-Introduction.pptxFCL-Introduction.pptx
FCL-Introduction.pptx
 
03.fnc corporate protect workshop new
03.fnc corporate protect workshop new03.fnc corporate protect workshop new
03.fnc corporate protect workshop new
 
FNC Corporate Protect
FNC Corporate ProtectFNC Corporate Protect
FNC Corporate Protect
 
FNC Corporate Protect Workshop
FNC Corporate Protect WorkshopFNC Corporate Protect Workshop
FNC Corporate Protect Workshop
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Report of cyber crime
Report of cyber crimeReport of cyber crime
Report of cyber crime
 
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
SS236 Unit 8 Assignment Rubric Content 70 Points Do.docx
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Review on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptxReview on Cyber Forensics - Copy.pptx
Review on Cyber Forensics - Copy.pptx
 
Lessons v on fraud awareness (digital forensics) [autosaved]
Lessons v on fraud awareness   (digital forensics) [autosaved]Lessons v on fraud awareness   (digital forensics) [autosaved]
Lessons v on fraud awareness (digital forensics) [autosaved]
 
Lessons v on fraud awareness (digital forensics)
Lessons v on fraud awareness   (digital forensics)Lessons v on fraud awareness   (digital forensics)
Lessons v on fraud awareness (digital forensics)
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
CS6004 Cyber Forensics
CS6004 Cyber ForensicsCS6004 Cyber Forensics
CS6004 Cyber Forensics
 
Become a Certified Ethical Hacker at Blitz Academy | Near Me
Become a Certified Ethical Hacker at Blitz Academy | Near MeBecome a Certified Ethical Hacker at Blitz Academy | Near Me
Become a Certified Ethical Hacker at Blitz Academy | Near Me
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
Secure Computer Forensics and its tools
Secure Computer Forensics and its toolsSecure Computer Forensics and its tools
Secure Computer Forensics and its tools
 
Business Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer ForensicBusiness Intelligence (BI) Tools For Computer Forensic
Business Intelligence (BI) Tools For Computer Forensic
 
Uganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensicsUganda lawsociety v2digitalforensics
Uganda lawsociety v2digitalforensics
 
Legal aspects of handling cyber frauds
Legal aspects of handling cyber fraudsLegal aspects of handling cyber frauds
Legal aspects of handling cyber frauds
 

More from carlibradley31429

Assignment 1 Discussion—Integration of TechnologyTechnology has c.docx
Assignment 1 Discussion—Integration of TechnologyTechnology has c.docxAssignment 1 Discussion—Integration of TechnologyTechnology has c.docx
Assignment 1 Discussion—Integration of TechnologyTechnology has c.docxcarlibradley31429
 
Assignment 1 Discussion—Critical Leadership Competencies Needed in .docx
Assignment 1 Discussion—Critical Leadership Competencies Needed in .docxAssignment 1 Discussion—Critical Leadership Competencies Needed in .docx
Assignment 1 Discussion—Critical Leadership Competencies Needed in .docxcarlibradley31429
 
Assignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docx
Assignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docxAssignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docx
Assignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docxcarlibradley31429
 
Assignment 1 Discussion—Communicating Negative InformationAs you .docx
Assignment 1 Discussion—Communicating Negative InformationAs you .docxAssignment 1 Discussion—Communicating Negative InformationAs you .docx
Assignment 1 Discussion—Communicating Negative InformationAs you .docxcarlibradley31429
 
Assignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docx
Assignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docxAssignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docx
Assignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docxcarlibradley31429
 
Assignment 1 Discussion—An Official LanguageCurrently the United .docx
Assignment 1 Discussion—An Official LanguageCurrently the United .docxAssignment 1 Discussion—An Official LanguageCurrently the United .docx
Assignment 1 Discussion—An Official LanguageCurrently the United .docxcarlibradley31429
 
Assignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docx
Assignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docxAssignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docx
Assignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docxcarlibradley31429
 
Assignment 1 DiscussionThere are two parts to this assignme.docx
Assignment 1 DiscussionThere are two parts to this assignme.docxAssignment 1 DiscussionThere are two parts to this assignme.docx
Assignment 1 DiscussionThere are two parts to this assignme.docxcarlibradley31429
 
Assignment 1 Discussion—Employee Impact on the Plan An organizati.docx
Assignment 1 Discussion—Employee Impact on the Plan An organizati.docxAssignment 1 Discussion—Employee Impact on the Plan An organizati.docx
Assignment 1 Discussion—Employee Impact on the Plan An organizati.docxcarlibradley31429
 
Assignment 1 Discussion QuestionWhy should an organization be c.docx
Assignment 1 Discussion QuestionWhy should an organization be c.docxAssignment 1 Discussion QuestionWhy should an organization be c.docx
Assignment 1 Discussion QuestionWhy should an organization be c.docxcarlibradley31429
 
Assignment 1 Discussion QuestionTo extend its international prese.docx
Assignment 1 Discussion QuestionTo extend its international prese.docxAssignment 1 Discussion QuestionTo extend its international prese.docx
Assignment 1 Discussion QuestionTo extend its international prese.docxcarlibradley31429
 
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docxAssignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docxcarlibradley31429
 
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docxAssignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docxcarlibradley31429
 
Assignment 1 Discussion QuestionsCase study Shaking up Oxf.docx
Assignment 1 Discussion QuestionsCase study Shaking up Oxf.docxAssignment 1 Discussion QuestionsCase study Shaking up Oxf.docx
Assignment 1 Discussion QuestionsCase study Shaking up Oxf.docxcarlibradley31429
 
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docxAssignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docxcarlibradley31429
 
Assignment 1 Discussion QuestionsCase Study How Failure Breeds S.docx
Assignment 1 Discussion QuestionsCase Study How Failure Breeds S.docxAssignment 1 Discussion QuestionsCase Study How Failure Breeds S.docx
Assignment 1 Discussion QuestionsCase Study How Failure Breeds S.docxcarlibradley31429
 
Assignment 1 Discussion QuestionConsider a team that you have bee.docx
Assignment 1 Discussion QuestionConsider a team that you have bee.docxAssignment 1 Discussion QuestionConsider a team that you have bee.docx
Assignment 1 Discussion QuestionConsider a team that you have bee.docxcarlibradley31429
 
Assignment 1 Discussion Question Prosocial Behavior and Altruism.docx
Assignment 1 Discussion Question Prosocial Behavior and Altruism.docxAssignment 1 Discussion Question Prosocial Behavior and Altruism.docx
Assignment 1 Discussion Question Prosocial Behavior and Altruism.docxcarlibradley31429
 
Assignment 1 Discussion Questions Read the Bloomberg Bu.docx
Assignment 1 Discussion Questions Read the Bloomberg Bu.docxAssignment 1 Discussion Questions Read the Bloomberg Bu.docx
Assignment 1 Discussion Questions Read the Bloomberg Bu.docxcarlibradley31429
 
Assignment 1 Difficulties of Defining TerrorismDue Week 2 a.docx
Assignment 1 Difficulties of Defining TerrorismDue Week 2 a.docxAssignment 1 Difficulties of Defining TerrorismDue Week 2 a.docx
Assignment 1 Difficulties of Defining TerrorismDue Week 2 a.docxcarlibradley31429
 

More from carlibradley31429 (20)

Assignment 1 Discussion—Integration of TechnologyTechnology has c.docx
Assignment 1 Discussion—Integration of TechnologyTechnology has c.docxAssignment 1 Discussion—Integration of TechnologyTechnology has c.docx
Assignment 1 Discussion—Integration of TechnologyTechnology has c.docx
 
Assignment 1 Discussion—Critical Leadership Competencies Needed in .docx
Assignment 1 Discussion—Critical Leadership Competencies Needed in .docxAssignment 1 Discussion—Critical Leadership Competencies Needed in .docx
Assignment 1 Discussion—Critical Leadership Competencies Needed in .docx
 
Assignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docx
Assignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docxAssignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docx
Assignment 1 Discussion—Cultural Influences on Work and Leisure Tim.docx
 
Assignment 1 Discussion—Communicating Negative InformationAs you .docx
Assignment 1 Discussion—Communicating Negative InformationAs you .docxAssignment 1 Discussion—Communicating Negative InformationAs you .docx
Assignment 1 Discussion—Communicating Negative InformationAs you .docx
 
Assignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docx
Assignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docxAssignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docx
Assignment 1 Discussion—Biomes, Development, Pollution, and YouEa.docx
 
Assignment 1 Discussion—An Official LanguageCurrently the United .docx
Assignment 1 Discussion—An Official LanguageCurrently the United .docxAssignment 1 Discussion—An Official LanguageCurrently the United .docx
Assignment 1 Discussion—An Official LanguageCurrently the United .docx
 
Assignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docx
Assignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docxAssignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docx
Assignment 1 Discussion—A Life in ReviewIn late adulthood, most p.docx
 
Assignment 1 DiscussionThere are two parts to this assignme.docx
Assignment 1 DiscussionThere are two parts to this assignme.docxAssignment 1 DiscussionThere are two parts to this assignme.docx
Assignment 1 DiscussionThere are two parts to this assignme.docx
 
Assignment 1 Discussion—Employee Impact on the Plan An organizati.docx
Assignment 1 Discussion—Employee Impact on the Plan An organizati.docxAssignment 1 Discussion—Employee Impact on the Plan An organizati.docx
Assignment 1 Discussion—Employee Impact on the Plan An organizati.docx
 
Assignment 1 Discussion QuestionWhy should an organization be c.docx
Assignment 1 Discussion QuestionWhy should an organization be c.docxAssignment 1 Discussion QuestionWhy should an organization be c.docx
Assignment 1 Discussion QuestionWhy should an organization be c.docx
 
Assignment 1 Discussion QuestionTo extend its international prese.docx
Assignment 1 Discussion QuestionTo extend its international prese.docxAssignment 1 Discussion QuestionTo extend its international prese.docx
Assignment 1 Discussion QuestionTo extend its international prese.docx
 
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docxAssignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art f.docx
 
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docxAssignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docx
Assignment 1 Discussion QuestionThe Mexican ceramics folk-art fir.docx
 
Assignment 1 Discussion QuestionsCase study Shaking up Oxf.docx
Assignment 1 Discussion QuestionsCase study Shaking up Oxf.docxAssignment 1 Discussion QuestionsCase study Shaking up Oxf.docx
Assignment 1 Discussion QuestionsCase study Shaking up Oxf.docx
 
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docxAssignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
Assignment 1 Discussion QuestionsCase Study Inside Intel. For y.docx
 
Assignment 1 Discussion QuestionsCase Study How Failure Breeds S.docx
Assignment 1 Discussion QuestionsCase Study How Failure Breeds S.docxAssignment 1 Discussion QuestionsCase Study How Failure Breeds S.docx
Assignment 1 Discussion QuestionsCase Study How Failure Breeds S.docx
 
Assignment 1 Discussion QuestionConsider a team that you have bee.docx
Assignment 1 Discussion QuestionConsider a team that you have bee.docxAssignment 1 Discussion QuestionConsider a team that you have bee.docx
Assignment 1 Discussion QuestionConsider a team that you have bee.docx
 
Assignment 1 Discussion Question Prosocial Behavior and Altruism.docx
Assignment 1 Discussion Question Prosocial Behavior and Altruism.docxAssignment 1 Discussion Question Prosocial Behavior and Altruism.docx
Assignment 1 Discussion Question Prosocial Behavior and Altruism.docx
 
Assignment 1 Discussion Questions Read the Bloomberg Bu.docx
Assignment 1 Discussion Questions Read the Bloomberg Bu.docxAssignment 1 Discussion Questions Read the Bloomberg Bu.docx
Assignment 1 Discussion Questions Read the Bloomberg Bu.docx
 
Assignment 1 Difficulties of Defining TerrorismDue Week 2 a.docx
Assignment 1 Difficulties of Defining TerrorismDue Week 2 a.docxAssignment 1 Difficulties of Defining TerrorismDue Week 2 a.docx
Assignment 1 Difficulties of Defining TerrorismDue Week 2 a.docx
 

Recently uploaded

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 

Assignment 1 ) -----  Portfolio AssignmentsPrefaceListed.docx

  • 1. Assignment 1 ) ----- Portfolio Assignments Preface Listed below are areas of concentration for MSDF-630 202 Portfolio Assignment. Keep in mind that the portfolio research concentration is an essential segment of the course. Two research topics are created for you, and I hope that your professional effort will be represented in this project. Portfolio projects consist of the following three unique phases: Profile. Research Question 1 Investigation of Alabi, Time as Alibi and Location as Alibi. Research Question 2. Cybercrime Law, Computer-Integrity Crime, Fraud, and Abuse. Portfolio Project Profile: Required Group 1. Research Question 1 Group 2. Research Question 2
  • 2. Group 3. Research Question 1 Group 4. Research Question 2 Each student Must submit two (2) successful completed documents (here): Profile Collaborative Group Assignment. Phase 1: Student Professional Profile Portfolio Full-Name Profile Status: Graduate or Post-graduate Academic areas concentration Current Professional Career Path Professional Career Path Completion Upon successful completion of your studies at the University of the Cumberlands. Research Question 1.
  • 3. Investigation of Alabi, Time as Alibi and Location as Alibi. Preamble Alibi is a Latin acronym, meaning somewhere else and someone other than the culprit. A scenario that identifies the perpetrator of a crime to be someone or somewhere else other than where the crime took place. Criminal activities involving location, login and logout time, illegal behaviors, can be easily tracked by use computer and internet technologies. Offenders and their Alabi are often naive and ignore the fact that telephone companies always keep records of the number dialed, the time and duration of the call, and caller's number. Offenders and their Alabi are oblivious and unaware of the fact that credit card corporations keep records of the dates, times, and locations of all purchases, banks keep track of the dates, times, and locations of all deposits and withdrawals, and dates, times, and locations reside on computers for an indefinite period. Customers receive a report each month with detailed information in the form of a bill and financial statement. Offenders and their Alabi are often neglectful of the fact that when an e-mail message is sent, the time and originating internet protocol (IP) addresses are noted in the header and log files that contain information of the past and current activities. Forensic investigator must be vigilant at all times and try to acknowledge and recognize criminal Modus Operandi (MO) motive, intent, and ability to manipulate and change contents of the conclusive evidence and create false Alibi to amplify deceitful schemes. During the investigation of an alibi, the first
  • 4. step is to secure access to the data and information on the computer workstations, file servers, protocol, and network system. BOOTP is the computer network designed to control and monitor which computers and specific internet protocol (IP) addresses. The BOOTP is a networking protocol used to automatically assign an IP address to network devices from a configuration server. Furthermore, BOOTP is often configured to synchronize their clocks regularly with exactly accurate time satellites and create a log in case of any discrepancies. Dynamic host configurations protocol (DHCP) server is designed to automatically assign IP address and other information to each host on the network, communicate efficiently with other endpoints. Furthermore, the DHCP system allows anyone to change their clocks and does not keep logs of time changes. A DHCP server enables computers to automatically request IP addresses and networking parameters from the internet service provider (ISP), reducing the need for a network administrator and a user to assign IP addresses to all network devices manually. Situation 1: Investigation of the Victim, Alibi, and Conspirator . Alibi defense does not play an essential role in a conspiracy theory. Conspiracy is an agreement between two lawless persons to commit a crime, and one of the parties must agree to engage in an overt act in furtherance of the crime. Research Question 1:1 . Develop a measurable research framework relative to the user computer and internet technologies, criminal Modus Operandi, (MO) motive, intent, conspiracy theory, and dynamic host configurations protocol (DHCP) server to amplify conclusive
  • 5. evidence in court. Research Question 1:2 . To what extent are the significant differences between the Victim and the suspect? Research Question 1:3 . To what extent are the significant differences between the suspect and Alibi Research Question 1:4. To what extent are the significant differences between Alibi and conspirators? Situation 2. The Alibi can exercise the constitutional right to remain silent, granting the alibi opportunity to reposition the witness other than the crime scene. Research Question 1 .5. Develop a measurable research framework allowing the forensic investigator to use computer and internet technologies, criminal modus operandi (MO), motive, intent and, bootstrap protocol (BOOTP) to gather data and information on more than one crime scene for the same case. Situation 3: A Judge can be suspicion of the alibi evidence. The burden of proof often rests on the prosecutor, who must prove that the suspected Alibi is guilty beyond a reasonable doubt. The add-on burden of proof is on the forensic investigator who visited the crime scene. Research Question 1 :6 Develop a measurable research framework relative to criminal modus Operandi (MO) motive, intent, to help forensic
  • 6. investigator’s attempt to bring the suspected criminal to justice, only if the person was guilty. Research Question 2. Cybercrime Law, Computer-Integrity Crime, Fraud, and Abuse. Preamble. Integrity of evidence, cyber-crime, fraud, and abuse are prefaced on the assumption that computer and internet technologies are designed to make life easier for a public and private organization, the judicial system, and forensic investigators; it has, unfortunately, made life incredibly challenging and enduring in all levels of forensic investigation. Cyber-crime, fraud, abuse, are open-ended criminal operations, allowing unauthorized users to obtain information from various sources against a target organization. Naturally, criminals are endowed with extraordinary skills and expertise to break into any organization's secured network center. Most criminal are have access automated freeware tools available on computer and Internet and breaks into the organization's secured network system, data, assets, resources, to make forensic investigation exceedingly tricky. Most organizations and the global community are actively using computer and internet technologies to build four walls around security data storage centers, creating an opportunity for forensic investigator’s ability to produce reliable evidence. Similarly, organizations and the global defensive approach require a proactive plan of action to guide against data breach. This section examines the primary federal statutes used to prosecute cybercrime. The focus is on the Computer Fraud and Abuse Act and the statutes criminalizing identity theft, child pornography, and copyright and trademark offenses (Casey, 2011: 86-95). Computer Fraud and Abuse Act
  • 7. The Computer Fraud and Act, Abuse is the primary source of federal law related to computer cybercrimes, and approval of the Computer Fraud and Abuse Act (CFAA) in 1986 . The amendments were designed to update specific Arts provisions in light of advancements in computer and internet technologies and to address loopholes that existed in earlier versions of the Act. Criminals gaining unauthorized access to a computer, disseminating malware, launching denial of service attacks, trafficking passwords, and using computers and the internet to commit fraud. Criminals are sophisticated and can intentionally use the computer and internet technologies without authorization. Research Question 2:1. Develop a measurable research framework of hos computer fraud and Abuse Act (CFAA) can play a role during the forensic investigation and impact on conclusive evidence in court. Research Question 2:2 . To what extent can the computer fraud and Abuse Act (CFAA) of 1986 empowers forensic investigation to bring cyber-crime, fraud, and abuse to justice. Situation 1. Naturally, criminals often retain extraordinary skills and expertise to break into any organization's secured network center. The criminal fully utilizes automated freeware tools available on computers and the Internet and breaks into the organization's secured network system, data, assets, resources, and makes forensic investigation exceedingly.
  • 8. These extraordinary skills, expertise, and availability of automated freeware tools are creating a considerable obstacle against the forensic investigation process. We are the nation of law. Question 2:3. Develop a measurable research framework of amendment items needed to strengthen the computer fraud and Abuse Act (CFAA), and expand forensic investigator authority over criminal activities. Assignment 2 ) ----- Attached a document below, please take a look Assignment 1 is Due on 12/6/2020 and Assignment 2 is due on 12/3/2020 NO PLAGIARISM FOLLOW APA FORMAT Need 3 Pages