SlideShare a Scribd company logo
1 of 18
CIS 417 Week 2 Assignment 1: Computer
Forensics Overview
For more classes visit
www.snaptutorial.com
Assignment 1: Computer Forensics Overview
Due Week 2 and worth 60 points
Suppose you were recently hired for a new position as the computer
forensics specialist at a medium-sized communications company. You
have been asked to prepare a presentation to the Board of Directors on
your main duties for the company and how your position could help
achieve business goals based on security and confidentiality. You are
also aware that the company has just had some issues with employee
complaints of ongoing sexual harassment over email and instant
messaging systems but has been unable to obtain adequate evidence of
any kind.
Write a two to three (2-3) page paper in which you:
Explain the basic primary tasks, high-level investigation processes, and
challenges of a computer forensics specialist.
Provide an overview of how computing devices are used in crimes of
today and how these crimes can affect a company’s data and
information.
Discuss how computer forensics investigations pertain to the law and
trying of cases.
Explain how you could assist in investigating the potential ongoing
sexual harassment complaints and determine how you would
communicate this to the Board of Directors.
Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are: Identify the role of computer forensics in responding to crimes and
solving business challenges.
Outline system forensics issues, laws, and skills.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************
CIS 417 Week 3 Case Study 1 BTK
For more classes visit
www.snaptutorial.com
Case Study 1: BTK
Due Week 3 and worth 60 points
In 2005, serial killer Dennis Rader, also known as BTK, was arrested
and convicted of murdering 10 people in Kansas between the years of
1974 and 1991. Further research this incident using quality and
reputable resources.
Write a two to three (2-3) page paper in which you:
Explicate how digital forensics was used to identify Rader as a suspect
and lead to more concrete physical evidence.
Describe in detail the digital evidence that was uncovered from the
floppy disk obtained from Rader. Discuss why you believe it took so
many years to find concrete evidence in order to build a case against
Rader.
Explain how the acquisition of digital evidence aided the investigation
and whether or not you believe Rader would’ve been a person of interest
if the floppy disk evidence wasn’t sent.
Identify the software that was used by the authorities to uncover the
evidence and summarize how this software can be used for digital
forensics and evidence collection.
Use at least two (2) quality resources in this assignment.Note: Wikipedia
and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Identify the role of computer forensics in responding to crimes and
solving business challenges.
Report investigative findings of potential evidentiary value.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************
CIS 417 Week 4 Assignment 2: Forensic Lab
Design
For more classes visit
www.snaptutorial.com
Assignment 2: Forensic Lab Design
Due Week 4 and worth 90 points
Imagine the university that employs you as an information security
professional has recently identified the need to design and build a digital
forensic laboratory. You have been tasked with designing the lab for the
organization.
Write a four to five (4-5) page paper in which you:
Explicate the steps you would take to plan a budget for the lab, keeping
in mind the general business objective to avoid unneeded costs.
Recommend the physical requirements and controls that you would
consider implementing in order to keep the lab safe and secure.
Identify at least three (3) hardware and software tools that you would
include in the design of the lab and explain your reasons behind your
choices.
Identify the high-level criteria that would be considered when selecting
the forensic workstations to be utilized.
Describe the mandatory policies, processes, and procedures you would
implement in order to maintain the lab environment and preserve
evidence.
Design a floor plan for the lab using a diagramming application such as
Visio or Dia. Note: The graphically depicted solution is not included in
the required page length.
Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
Include charts or diagrams created in Visio or one of their equivalents
such as Open Project Dia. The completed diagrams / charts must be
imported into the Word document before the paper is submitted.
The specific course learning outcomes associated with this assignment
are:
Describe the purpose and structure of a digital forensics lab.
Examine and explain the evidence life cycle.
Describe the constraints on digital forensic investigations.
Develop a computer forensics deployment plan that addresses and
solves a proposed business problem.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************
CIS 417 Week 5 Case Study 2: External
Intrusion of the PlayStation Network
For more classes visit
www.snaptutorial.com
Case Study 2: External Intrusion of the PlayStation Network
Due Week 5 and worth 60 points
On April 20, 2011, the Sony PlayStation Network was taken offline after
an external intrusion was discovered. Further research this incident
using quality and reputable resources.
Write a two to three (2-3) page paper in which you:
Briefly summarize the details of the attack on the PlayStation Network,
including the dates of when the attack started and was eventually
uncovered.
Indicate what explanation Sony officials gave for the length of time that
had passed from the start of the attack to when the general public was
made aware of the details.
Analyze and explain what you believe the correct forensic investigative
action would have been once the attack was uncovered.
Explicate whether or not you believe the Sony forensic teams could have
provided a quicker analysis of the situation and the damage incurred.
Discuss why you believe this way and what you think is an appropriate
amount of time after a breach before those affected are made aware.
Use at least two (2) quality resources in this assignment.Note: Wikipedia
and similar Websites do not qualify as quality resources. Explicate
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Identify the role of computer forensics in responding to crimes and
solving business challenges.
Outline system forensics issues, laws, and skills.
Identify the procurement of evidence in physical and virtualized
environments.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************
CIS 417 Week 6 Assignment 3 Securing the
Scene
For more classes visit
www.snaptutorial.com
Assignment 3: Securing the Scene
Due Week 6 and worth 60 points
Imagine you are a digital forensic investigator for a healthcare
organization. You learn from your internal information security
department that an employee has been using password-cracking
software to access confidential customer insurance information. The
account information extracted is unknown at this time, though it appears
as though multiple computers were being used for the crime and it isn’t
clear whether an attack is currently in progress. The employee has been
detained but his computers remain online.
Write a two to three (2-3) page paper in which you:
Develop a detailed plan to approach and secure the incident scene
based on the information you have from the scenario.
Discuss the initial steps you would take for the investigation, depending
on whether or not the attack is still in progress. Include how your
actions would differ based on the current status of the incident.
Explicate the importance of creating an order of volatility by identifying
the potential evidence that is the most volatile. Explain, in detail, how
you would extract this evidence.
Identify the high-level steps that would be performed in collecting and
analyzing the evidence. Include steps that are required, as well as what
should not be done, in order to maintain the potential admissibility of
evidence.
Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Outline system forensics issues, laws, and skills.
Examine and explain the evidence life cycle.
Analyze the impact of sequestration on the evidence-gathering process.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************
CIS 417 Week 7 Case Study 3: Casey Anthony
Trial
For more classes visit
www.snaptutorial.com
Case Study 3: Casey Anthony Trial
Due Week 7 and worth 60 points
On July 5, 2011, Casey Anthony was found not guilty of first-degree
murder in the 2008 death of her daughter, Caylee. Further research this
incident using quality and reputable resources.
Write a two to three (2-3) page paper in which you:
Provide a brief summary of the background, charges, and trial of this
high-profile court case.
Explain, from a forensics perspective, the digital evidence found on the
Anthony family computer that helped the prosecutors build a case
against Anthony.
Describe what the prosecution was unable to prove based on the digital
evidence found. Indicate whether or not you think this is a common
problem with digital evidence and provide a rationale for your response.
Explain the software issue that was found to have caused inaccurate
evidence to be admitted into the trial.
Determine whether the software issue, which caused inaccurate
evidence in the trial, would’ve affected your perception of the
prosecution’s case if you were a juror in this trial.
Use at least two (2) quality resources in this assignment.Note: Wikipedia
and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Outline system forensics issues, laws, and skills.
Develop plans that collect evidence in network and email environments.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
Examine automated digital forensic analysis.
********************************************************
CIS 417 Week 8 Assignment 4 Data-Hiding
Techniques
For more classes visit
www.snaptutorial.com
Assignment 4: Data-Hiding Techniques
Due Week 8 and worth 60 points
Suppose you are the Chief Security Officer for a financial institution.
Someone on your information security staff has informed you that recent
Web content filters have shown an end user who has been visiting sites
dedicated to alternate data stream (ADS) and steganography hiding
techniques. She is interested in what the end user may be doing and
comes to you for some explanation on these techniques.
Write a two to three (2-3) page paper in which you:
Explain how a user could utilize ADS to hide data and explain other
destructive uses which exist for ADS.
Determine how rootkits can be used as an alternative for data hiding
and explicate why they can be used for this purpose.
Describe the processes and tools used by an investigator in determining
whether signs of steganography are present in a given situation.
Select two (2) tools that could be used for steganography and explain
how these tools can help someone hide data from others.
Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Identify the role of computer forensics in responding to crimes and
solving business challenges.
Outline system forensics issues, laws, and skills.
Develop plans that collect evidence in network and email environments.
Describe the constraints on digital forensic investigations.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************
CIS 417 Week 10 Term Paper Investigating Data
Theft
For more classes visit
www.snaptutorial.com
Term Paper: Investigating Data Theft
Due Week 10 and worth 150 points
Suppose a large aerospace engineering firm has immediately hired you
as a consultant to investigate a potential violation of corporate policy
and data theft. You have been informed that an employee may have been
using corporate email to send confidential corporate information to one
or more personal email accounts, which may or may not belong to him.
You have been told that this action has been happening each business
day for the last 13 days and the employee is unaware of any suspicion.
Write an eight to ten (8-10) page paper in which you:
Explain, in detail, the initial actions you would take based on the
provided information including formal plans to preserve the crime
scene(s) and eventual transportation of evidence to a lab.
Analyze the physical and logical places where you would look for
potential evidence on the suspect’s computer(s) and / or network
servers.
Describe, in detail, how you proceed with the email investigation,
including the review of email headers and tracing.
Describe the processes that would be utilized in order to recover data
that may have been deleted from the suspect’s computer(s).
Identify the tools you would use to perform your investigation from
beginning to end based on the information you have on the incident.
Provide a brief overview of each tool, to include:
A description of the tool.
How you would use the tool in the investigation.
How the tool helps the investigation and the evidence you expect it to
provide.
Why you believe the evidence the tool provides is critical to the
investigation.
· Use at least five (5) quality resources in this assignment.
Note:Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Identify the role of computer forensics in responding to crimes and
solving business challenges.
Outline system forensics issues, laws, and skills.
Examine and explain the evidence life cycle.
Identify the procurement of evidence in physical and virtualized
environments.
Analyze the impact of sequestration on the evidence-gathering process.
Develop plans that collect evidence in network and email environments.
Examine automated digital forensic analysis.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************

More Related Content

What's hot

Cisa 3358600, april 2021 research paper instructions 1
Cisa 3358600, april 2021   research paper instructions 1 Cisa 3358600, april 2021   research paper instructions 1
Cisa 3358600, april 2021 research paper instructions 1 RAJU852744
 
Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1infinityend3
 
CIS 550 Success Begins / snaptutorial.com
CIS 550 Success Begins / snaptutorial.comCIS 550 Success Begins / snaptutorial.com
CIS 550 Success Begins / snaptutorial.comRobinson075
 
INF 103(ASH) Learn/newtonhelp.com
INF 103(ASH) Learn/newtonhelp.comINF 103(ASH) Learn/newtonhelp.com
INF 103(ASH) Learn/newtonhelp.comlechenau48
 
Cis 500 Believe Possibilities / snaptutorial.com
Cis 500 Believe Possibilities / snaptutorial.comCis 500 Believe Possibilities / snaptutorial.com
Cis 500 Believe Possibilities / snaptutorial.comStokesCope11
 
Action Research Statement of the Issue
Action Research Statement of the Issue Action Research Statement of the Issue
Action Research Statement of the Issue Mae Guerra
 
A Federated Search Approach to Facilitate Systematic Literature Review in Sof...
A Federated Search Approach to Facilitate Systematic Literature Review in Sof...A Federated Search Approach to Facilitate Systematic Literature Review in Sof...
A Federated Search Approach to Facilitate Systematic Literature Review in Sof...ijseajournal
 
Computing Written Paper 1 General Comments Zimsec Cambridge 9691 Zimbabwe
Computing Written Paper 1 General Comments Zimsec Cambridge 9691 ZimbabweComputing Written Paper 1 General Comments Zimsec Cambridge 9691 Zimbabwe
Computing Written Paper 1 General Comments Zimsec Cambridge 9691 ZimbabweAlpro
 
System and design chapter-2
System and design chapter-2System and design chapter-2
System and design chapter-2Best Rahim
 
Cis 348 Education Organization / snaptutorial.com
Cis 348  Education Organization / snaptutorial.comCis 348  Education Organization / snaptutorial.com
Cis 348 Education Organization / snaptutorial.comBaileya82
 
Cis 560 Enthusiastic Study / snaptutorial.com
Cis 560 Enthusiastic Study / snaptutorial.comCis 560 Enthusiastic Study / snaptutorial.com
Cis 560 Enthusiastic Study / snaptutorial.comStephenson06
 
College of administration and finance sciences assignment (
College of administration and finance sciences assignment (College of administration and finance sciences assignment (
College of administration and finance sciences assignment (RAJU852744
 

What's hot (12)

Cisa 3358600, april 2021 research paper instructions 1
Cisa 3358600, april 2021   research paper instructions 1 Cisa 3358600, april 2021   research paper instructions 1
Cisa 3358600, april 2021 research paper instructions 1
 
Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1
 
CIS 550 Success Begins / snaptutorial.com
CIS 550 Success Begins / snaptutorial.comCIS 550 Success Begins / snaptutorial.com
CIS 550 Success Begins / snaptutorial.com
 
INF 103(ASH) Learn/newtonhelp.com
INF 103(ASH) Learn/newtonhelp.comINF 103(ASH) Learn/newtonhelp.com
INF 103(ASH) Learn/newtonhelp.com
 
Cis 500 Believe Possibilities / snaptutorial.com
Cis 500 Believe Possibilities / snaptutorial.comCis 500 Believe Possibilities / snaptutorial.com
Cis 500 Believe Possibilities / snaptutorial.com
 
Action Research Statement of the Issue
Action Research Statement of the Issue Action Research Statement of the Issue
Action Research Statement of the Issue
 
A Federated Search Approach to Facilitate Systematic Literature Review in Sof...
A Federated Search Approach to Facilitate Systematic Literature Review in Sof...A Federated Search Approach to Facilitate Systematic Literature Review in Sof...
A Federated Search Approach to Facilitate Systematic Literature Review in Sof...
 
Computing Written Paper 1 General Comments Zimsec Cambridge 9691 Zimbabwe
Computing Written Paper 1 General Comments Zimsec Cambridge 9691 ZimbabweComputing Written Paper 1 General Comments Zimsec Cambridge 9691 Zimbabwe
Computing Written Paper 1 General Comments Zimsec Cambridge 9691 Zimbabwe
 
System and design chapter-2
System and design chapter-2System and design chapter-2
System and design chapter-2
 
Cis 348 Education Organization / snaptutorial.com
Cis 348  Education Organization / snaptutorial.comCis 348  Education Organization / snaptutorial.com
Cis 348 Education Organization / snaptutorial.com
 
Cis 560 Enthusiastic Study / snaptutorial.com
Cis 560 Enthusiastic Study / snaptutorial.comCis 560 Enthusiastic Study / snaptutorial.com
Cis 560 Enthusiastic Study / snaptutorial.com
 
College of administration and finance sciences assignment (
College of administration and finance sciences assignment (College of administration and finance sciences assignment (
College of administration and finance sciences assignment (
 

Similar to Cis 417 Technology levels--snaptutorial.com

CIS 562 Success Begins / snaptutorial.com
CIS 562 Success Begins / snaptutorial.comCIS 562 Success Begins / snaptutorial.com
CIS 562 Success Begins / snaptutorial.comRobinson075
 
CIS 562 Focus Dreams/newtonhelp.com
CIS 562 Focus Dreams/newtonhelp.comCIS 562 Focus Dreams/newtonhelp.com
CIS 562 Focus Dreams/newtonhelp.combellflower91
 
CIS 562 Imagine Your Future/newtonhelp.com   
CIS 562 Imagine Your Future/newtonhelp.com   CIS 562 Imagine Your Future/newtonhelp.com   
CIS 562 Imagine Your Future/newtonhelp.com   bellflower51
 
Strayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-dataStrayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-datainfinityend3
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxrhetttrevannion
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comRobinson070
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comsholingarjosh56
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comGeorgeDixon100
 
Cis 515 Effective Communication-snaptutorial.com
Cis 515 Effective Communication-snaptutorial.comCis 515 Effective Communication-snaptutorial.com
Cis 515 Effective Communication-snaptutorial.comjhonklinz10
 
CIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.comCIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.comRobinson068
 
CIS 515 Enhance teaching / snaptutorial.com
CIS 515 Enhance teaching / snaptutorial.com CIS 515 Enhance teaching / snaptutorial.com
CIS 515 Enhance teaching / snaptutorial.com donaldzs56
 
CIS 515 Education Organization / snaptutorial.com
CIS 515 Education Organization / snaptutorial.comCIS 515 Education Organization / snaptutorial.com
CIS 515 Education Organization / snaptutorial.comMcdonaldRyan38
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worogglili
 
CIS 356 Success Begins / snaptutorial.com
CIS 356 Success Begins / snaptutorial.comCIS 356 Success Begins / snaptutorial.com
CIS 356 Success Begins / snaptutorial.comRobinson070
 
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxAssignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxastonrenna
 
Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-4-assignment-2Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-4-assignment-2infinityend3
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comRobinson069
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comGeorgeDixon99
 

Similar to Cis 417 Technology levels--snaptutorial.com (18)

CIS 562 Success Begins / snaptutorial.com
CIS 562 Success Begins / snaptutorial.comCIS 562 Success Begins / snaptutorial.com
CIS 562 Success Begins / snaptutorial.com
 
CIS 562 Focus Dreams/newtonhelp.com
CIS 562 Focus Dreams/newtonhelp.comCIS 562 Focus Dreams/newtonhelp.com
CIS 562 Focus Dreams/newtonhelp.com
 
CIS 562 Imagine Your Future/newtonhelp.com   
CIS 562 Imagine Your Future/newtonhelp.com   CIS 562 Imagine Your Future/newtonhelp.com   
CIS 562 Imagine Your Future/newtonhelp.com   
 
Strayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-dataStrayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-data
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docx
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.com
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.com
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.com
 
Cis 515 Effective Communication-snaptutorial.com
Cis 515 Effective Communication-snaptutorial.comCis 515 Effective Communication-snaptutorial.com
Cis 515 Effective Communication-snaptutorial.com
 
CIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.comCIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.com
 
CIS 515 Enhance teaching / snaptutorial.com
CIS 515 Enhance teaching / snaptutorial.com CIS 515 Enhance teaching / snaptutorial.com
CIS 515 Enhance teaching / snaptutorial.com
 
CIS 515 Education Organization / snaptutorial.com
CIS 515 Education Organization / snaptutorial.comCIS 515 Education Organization / snaptutorial.com
CIS 515 Education Organization / snaptutorial.com
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 
CIS 356 Success Begins / snaptutorial.com
CIS 356 Success Begins / snaptutorial.comCIS 356 Success Begins / snaptutorial.com
CIS 356 Success Begins / snaptutorial.com
 
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxAssignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
 
Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-4-assignment-2Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-4-assignment-2
 
Cis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.comCis 333 Success Begins / snaptutorial.com
Cis 333 Success Begins / snaptutorial.com
 
Cis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.comCis 333 Enthusiastic Study / snaptutorial.com
Cis 333 Enthusiastic Study / snaptutorial.com
 

Recently uploaded

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Cis 417 Technology levels--snaptutorial.com

  • 1. CIS 417 Week 2 Assignment 1: Computer Forensics Overview For more classes visit www.snaptutorial.com Assignment 1: Computer Forensics Overview Due Week 2 and worth 60 points Suppose you were recently hired for a new position as the computer forensics specialist at a medium-sized communications company. You have been asked to prepare a presentation to the Board of Directors on your main duties for the company and how your position could help achieve business goals based on security and confidentiality. You are also aware that the company has just had some issues with employee complaints of ongoing sexual harassment over email and instant messaging systems but has been unable to obtain adequate evidence of any kind. Write a two to three (2-3) page paper in which you: Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist. Provide an overview of how computing devices are used in crimes of today and how these crimes can affect a company’s data and information.
  • 2. Discuss how computer forensics investigations pertain to the law and trying of cases. Explain how you could assist in investigating the potential ongoing sexual harassment complaints and determine how you would communicate this to the Board of Directors. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Identify the role of computer forensics in responding to crimes and solving business challenges. Outline system forensics issues, laws, and skills. Use technology and information resources to research issues in computer forensics. Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.
  • 3. ******************************************************** CIS 417 Week 3 Case Study 1 BTK For more classes visit www.snaptutorial.com Case Study 1: BTK Due Week 3 and worth 60 points In 2005, serial killer Dennis Rader, also known as BTK, was arrested and convicted of murdering 10 people in Kansas between the years of 1974 and 1991. Further research this incident using quality and reputable resources. Write a two to three (2-3) page paper in which you: Explicate how digital forensics was used to identify Rader as a suspect and lead to more concrete physical evidence. Describe in detail the digital evidence that was uncovered from the floppy disk obtained from Rader. Discuss why you believe it took so many years to find concrete evidence in order to build a case against Rader.
  • 4. Explain how the acquisition of digital evidence aided the investigation and whether or not you believe Rader would’ve been a person of interest if the floppy disk evidence wasn’t sent. Identify the software that was used by the authorities to uncover the evidence and summarize how this software can be used for digital forensics and evidence collection. Use at least two (2) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Identify the role of computer forensics in responding to crimes and solving business challenges. Report investigative findings of potential evidentiary value. Use technology and information resources to research issues in computer forensics.
  • 5. Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions. ******************************************************** CIS 417 Week 4 Assignment 2: Forensic Lab Design For more classes visit www.snaptutorial.com Assignment 2: Forensic Lab Design Due Week 4 and worth 90 points Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization. Write a four to five (4-5) page paper in which you: Explicate the steps you would take to plan a budget for the lab, keeping in mind the general business objective to avoid unneeded costs.
  • 6. Recommend the physical requirements and controls that you would consider implementing in order to keep the lab safe and secure. Identify at least three (3) hardware and software tools that you would include in the design of the lab and explain your reasons behind your choices. Identify the high-level criteria that would be considered when selecting the forensic workstations to be utilized. Describe the mandatory policies, processes, and procedures you would implement in order to maintain the lab environment and preserve evidence. Design a floor plan for the lab using a diagramming application such as Visio or Dia. Note: The graphically depicted solution is not included in the required page length. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. Include charts or diagrams created in Visio or one of their equivalents such as Open Project Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.
  • 7. The specific course learning outcomes associated with this assignment are: Describe the purpose and structure of a digital forensics lab. Examine and explain the evidence life cycle. Describe the constraints on digital forensic investigations. Develop a computer forensics deployment plan that addresses and solves a proposed business problem. Use technology and information resources to research issues in computer forensics. Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions. ******************************************************** CIS 417 Week 5 Case Study 2: External Intrusion of the PlayStation Network For more classes visit www.snaptutorial.com
  • 8. Case Study 2: External Intrusion of the PlayStation Network Due Week 5 and worth 60 points On April 20, 2011, the Sony PlayStation Network was taken offline after an external intrusion was discovered. Further research this incident using quality and reputable resources. Write a two to three (2-3) page paper in which you: Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered. Indicate what explanation Sony officials gave for the length of time that had passed from the start of the attack to when the general public was made aware of the details. Analyze and explain what you believe the correct forensic investigative action would have been once the attack was uncovered. Explicate whether or not you believe the Sony forensic teams could have provided a quicker analysis of the situation and the damage incurred. Discuss why you believe this way and what you think is an appropriate amount of time after a breach before those affected are made aware. Use at least two (2) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Explicate Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • 9. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Identify the role of computer forensics in responding to crimes and solving business challenges. Outline system forensics issues, laws, and skills. Identify the procurement of evidence in physical and virtualized environments. Use technology and information resources to research issues in computer forensics. Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions. ******************************************************** CIS 417 Week 6 Assignment 3 Securing the Scene For more classes visit
  • 10. www.snaptutorial.com Assignment 3: Securing the Scene Due Week 6 and worth 60 points Imagine you are a digital forensic investigator for a healthcare organization. You learn from your internal information security department that an employee has been using password-cracking software to access confidential customer insurance information. The account information extracted is unknown at this time, though it appears as though multiple computers were being used for the crime and it isn’t clear whether an attack is currently in progress. The employee has been detained but his computers remain online. Write a two to three (2-3) page paper in which you: Develop a detailed plan to approach and secure the incident scene based on the information you have from the scenario. Discuss the initial steps you would take for the investigation, depending on whether or not the attack is still in progress. Include how your actions would differ based on the current status of the incident. Explicate the importance of creating an order of volatility by identifying the potential evidence that is the most volatile. Explain, in detail, how you would extract this evidence. Identify the high-level steps that would be performed in collecting and analyzing the evidence. Include steps that are required, as well as what should not be done, in order to maintain the potential admissibility of evidence.
  • 11. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Outline system forensics issues, laws, and skills. Examine and explain the evidence life cycle. Analyze the impact of sequestration on the evidence-gathering process. Use technology and information resources to research issues in computer forensics. Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions. ********************************************************
  • 12. CIS 417 Week 7 Case Study 3: Casey Anthony Trial For more classes visit www.snaptutorial.com Case Study 3: Casey Anthony Trial Due Week 7 and worth 60 points On July 5, 2011, Casey Anthony was found not guilty of first-degree murder in the 2008 death of her daughter, Caylee. Further research this incident using quality and reputable resources. Write a two to three (2-3) page paper in which you: Provide a brief summary of the background, charges, and trial of this high-profile court case. Explain, from a forensics perspective, the digital evidence found on the Anthony family computer that helped the prosecutors build a case against Anthony. Describe what the prosecution was unable to prove based on the digital evidence found. Indicate whether or not you think this is a common problem with digital evidence and provide a rationale for your response. Explain the software issue that was found to have caused inaccurate evidence to be admitted into the trial.
  • 13. Determine whether the software issue, which caused inaccurate evidence in the trial, would’ve affected your perception of the prosecution’s case if you were a juror in this trial. Use at least two (2) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Outline system forensics issues, laws, and skills. Develop plans that collect evidence in network and email environments. Use technology and information resources to research issues in computer forensics. Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions. Examine automated digital forensic analysis. ********************************************************
  • 14. CIS 417 Week 8 Assignment 4 Data-Hiding Techniques For more classes visit www.snaptutorial.com Assignment 4: Data-Hiding Techniques Due Week 8 and worth 60 points Suppose you are the Chief Security Officer for a financial institution. Someone on your information security staff has informed you that recent Web content filters have shown an end user who has been visiting sites dedicated to alternate data stream (ADS) and steganography hiding techniques. She is interested in what the end user may be doing and comes to you for some explanation on these techniques. Write a two to three (2-3) page paper in which you: Explain how a user could utilize ADS to hide data and explain other destructive uses which exist for ADS. Determine how rootkits can be used as an alternative for data hiding and explicate why they can be used for this purpose. Describe the processes and tools used by an investigator in determining whether signs of steganography are present in a given situation.
  • 15. Select two (2) tools that could be used for steganography and explain how these tools can help someone hide data from others. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Identify the role of computer forensics in responding to crimes and solving business challenges. Outline system forensics issues, laws, and skills. Develop plans that collect evidence in network and email environments. Describe the constraints on digital forensic investigations. Use technology and information resources to research issues in computer forensics. Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.
  • 16. ******************************************************** CIS 417 Week 10 Term Paper Investigating Data Theft For more classes visit www.snaptutorial.com Term Paper: Investigating Data Theft Due Week 10 and worth 150 points Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. You have been informed that an employee may have been using corporate email to send confidential corporate information to one or more personal email accounts, which may or may not belong to him. You have been told that this action has been happening each business day for the last 13 days and the employee is unaware of any suspicion. Write an eight to ten (8-10) page paper in which you: Explain, in detail, the initial actions you would take based on the provided information including formal plans to preserve the crime scene(s) and eventual transportation of evidence to a lab.
  • 17. Analyze the physical and logical places where you would look for potential evidence on the suspect’s computer(s) and / or network servers. Describe, in detail, how you proceed with the email investigation, including the review of email headers and tracing. Describe the processes that would be utilized in order to recover data that may have been deleted from the suspect’s computer(s). Identify the tools you would use to perform your investigation from beginning to end based on the information you have on the incident. Provide a brief overview of each tool, to include: A description of the tool. How you would use the tool in the investigation. How the tool helps the investigation and the evidence you expect it to provide. Why you believe the evidence the tool provides is critical to the investigation. · Use at least five (5) quality resources in this assignment. Note:Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover
  • 18. page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Identify the role of computer forensics in responding to crimes and solving business challenges. Outline system forensics issues, laws, and skills. Examine and explain the evidence life cycle. Identify the procurement of evidence in physical and virtualized environments. Analyze the impact of sequestration on the evidence-gathering process. Develop plans that collect evidence in network and email environments. Examine automated digital forensic analysis. Use technology and information resources to research issues in computer forensics. Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions. ********************************************************