For more classes visit
www.snaptutorial.com
Assignment 1: Computer Forensics Overview
Due Week 2 and worth 60 points
Suppose you were recently hired for a new position as the computer forensics specialist at a medium-sized communications company. You have been asked to prepare a presentation to the Board of Directors on your
1. CIS 417 Week 2 Assignment 1: Computer
Forensics Overview
For more classes visit
www.snaptutorial.com
Assignment 1: Computer Forensics Overview
Due Week 2 and worth 60 points
Suppose you were recently hired for a new position as the computer
forensics specialist at a medium-sized communications company. You
have been asked to prepare a presentation to the Board of Directors on
your main duties for the company and how your position could help
achieve business goals based on security and confidentiality. You are
also aware that the company has just had some issues with employee
complaints of ongoing sexual harassment over email and instant
messaging systems but has been unable to obtain adequate evidence of
any kind.
Write a two to three (2-3) page paper in which you:
Explain the basic primary tasks, high-level investigation processes, and
challenges of a computer forensics specialist.
Provide an overview of how computing devices are used in crimes of
today and how these crimes can affect a company’s data and
information.
2. Discuss how computer forensics investigations pertain to the law and
trying of cases.
Explain how you could assist in investigating the potential ongoing
sexual harassment complaints and determine how you would
communicate this to the Board of Directors.
Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are: Identify the role of computer forensics in responding to crimes and
solving business challenges.
Outline system forensics issues, laws, and skills.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
3. ********************************************************
CIS 417 Week 3 Case Study 1 BTK
For more classes visit
www.snaptutorial.com
Case Study 1: BTK
Due Week 3 and worth 60 points
In 2005, serial killer Dennis Rader, also known as BTK, was arrested
and convicted of murdering 10 people in Kansas between the years of
1974 and 1991. Further research this incident using quality and
reputable resources.
Write a two to three (2-3) page paper in which you:
Explicate how digital forensics was used to identify Rader as a suspect
and lead to more concrete physical evidence.
Describe in detail the digital evidence that was uncovered from the
floppy disk obtained from Rader. Discuss why you believe it took so
many years to find concrete evidence in order to build a case against
Rader.
4. Explain how the acquisition of digital evidence aided the investigation
and whether or not you believe Rader would’ve been a person of interest
if the floppy disk evidence wasn’t sent.
Identify the software that was used by the authorities to uncover the
evidence and summarize how this software can be used for digital
forensics and evidence collection.
Use at least two (2) quality resources in this assignment.Note: Wikipedia
and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Identify the role of computer forensics in responding to crimes and
solving business challenges.
Report investigative findings of potential evidentiary value.
Use technology and information resources to research issues in
computer forensics.
5. Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************
CIS 417 Week 4 Assignment 2: Forensic Lab
Design
For more classes visit
www.snaptutorial.com
Assignment 2: Forensic Lab Design
Due Week 4 and worth 90 points
Imagine the university that employs you as an information security
professional has recently identified the need to design and build a digital
forensic laboratory. You have been tasked with designing the lab for the
organization.
Write a four to five (4-5) page paper in which you:
Explicate the steps you would take to plan a budget for the lab, keeping
in mind the general business objective to avoid unneeded costs.
6. Recommend the physical requirements and controls that you would
consider implementing in order to keep the lab safe and secure.
Identify at least three (3) hardware and software tools that you would
include in the design of the lab and explain your reasons behind your
choices.
Identify the high-level criteria that would be considered when selecting
the forensic workstations to be utilized.
Describe the mandatory policies, processes, and procedures you would
implement in order to maintain the lab environment and preserve
evidence.
Design a floor plan for the lab using a diagramming application such as
Visio or Dia. Note: The graphically depicted solution is not included in
the required page length.
Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
Include charts or diagrams created in Visio or one of their equivalents
such as Open Project Dia. The completed diagrams / charts must be
imported into the Word document before the paper is submitted.
7. The specific course learning outcomes associated with this assignment
are:
Describe the purpose and structure of a digital forensics lab.
Examine and explain the evidence life cycle.
Describe the constraints on digital forensic investigations.
Develop a computer forensics deployment plan that addresses and
solves a proposed business problem.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************
CIS 417 Week 5 Case Study 2: External
Intrusion of the PlayStation Network
For more classes visit
www.snaptutorial.com
8. Case Study 2: External Intrusion of the PlayStation Network
Due Week 5 and worth 60 points
On April 20, 2011, the Sony PlayStation Network was taken offline after
an external intrusion was discovered. Further research this incident
using quality and reputable resources.
Write a two to three (2-3) page paper in which you:
Briefly summarize the details of the attack on the PlayStation Network,
including the dates of when the attack started and was eventually
uncovered.
Indicate what explanation Sony officials gave for the length of time that
had passed from the start of the attack to when the general public was
made aware of the details.
Analyze and explain what you believe the correct forensic investigative
action would have been once the attack was uncovered.
Explicate whether or not you believe the Sony forensic teams could have
provided a quicker analysis of the situation and the damage incurred.
Discuss why you believe this way and what you think is an appropriate
amount of time after a breach before those affected are made aware.
Use at least two (2) quality resources in this assignment.Note: Wikipedia
and similar Websites do not qualify as quality resources. Explicate
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
9. Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Identify the role of computer forensics in responding to crimes and
solving business challenges.
Outline system forensics issues, laws, and skills.
Identify the procurement of evidence in physical and virtualized
environments.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************
CIS 417 Week 6 Assignment 3 Securing the
Scene
For more classes visit
10. www.snaptutorial.com
Assignment 3: Securing the Scene
Due Week 6 and worth 60 points
Imagine you are a digital forensic investigator for a healthcare
organization. You learn from your internal information security
department that an employee has been using password-cracking
software to access confidential customer insurance information. The
account information extracted is unknown at this time, though it appears
as though multiple computers were being used for the crime and it isn’t
clear whether an attack is currently in progress. The employee has been
detained but his computers remain online.
Write a two to three (2-3) page paper in which you:
Develop a detailed plan to approach and secure the incident scene
based on the information you have from the scenario.
Discuss the initial steps you would take for the investigation, depending
on whether or not the attack is still in progress. Include how your
actions would differ based on the current status of the incident.
Explicate the importance of creating an order of volatility by identifying
the potential evidence that is the most volatile. Explain, in detail, how
you would extract this evidence.
Identify the high-level steps that would be performed in collecting and
analyzing the evidence. Include steps that are required, as well as what
should not be done, in order to maintain the potential admissibility of
evidence.
11. Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Outline system forensics issues, laws, and skills.
Examine and explain the evidence life cycle.
Analyze the impact of sequestration on the evidence-gathering process.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************
12. CIS 417 Week 7 Case Study 3: Casey Anthony
Trial
For more classes visit
www.snaptutorial.com
Case Study 3: Casey Anthony Trial
Due Week 7 and worth 60 points
On July 5, 2011, Casey Anthony was found not guilty of first-degree
murder in the 2008 death of her daughter, Caylee. Further research this
incident using quality and reputable resources.
Write a two to three (2-3) page paper in which you:
Provide a brief summary of the background, charges, and trial of this
high-profile court case.
Explain, from a forensics perspective, the digital evidence found on the
Anthony family computer that helped the prosecutors build a case
against Anthony.
Describe what the prosecution was unable to prove based on the digital
evidence found. Indicate whether or not you think this is a common
problem with digital evidence and provide a rationale for your response.
Explain the software issue that was found to have caused inaccurate
evidence to be admitted into the trial.
13. Determine whether the software issue, which caused inaccurate
evidence in the trial, would’ve affected your perception of the
prosecution’s case if you were a juror in this trial.
Use at least two (2) quality resources in this assignment.Note: Wikipedia
and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Outline system forensics issues, laws, and skills.
Develop plans that collect evidence in network and email environments.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
Examine automated digital forensic analysis.
********************************************************
14. CIS 417 Week 8 Assignment 4 Data-Hiding
Techniques
For more classes visit
www.snaptutorial.com
Assignment 4: Data-Hiding Techniques
Due Week 8 and worth 60 points
Suppose you are the Chief Security Officer for a financial institution.
Someone on your information security staff has informed you that recent
Web content filters have shown an end user who has been visiting sites
dedicated to alternate data stream (ADS) and steganography hiding
techniques. She is interested in what the end user may be doing and
comes to you for some explanation on these techniques.
Write a two to three (2-3) page paper in which you:
Explain how a user could utilize ADS to hide data and explain other
destructive uses which exist for ADS.
Determine how rootkits can be used as an alternative for data hiding
and explicate why they can be used for this purpose.
Describe the processes and tools used by an investigator in determining
whether signs of steganography are present in a given situation.
15. Select two (2) tools that could be used for steganography and explain
how these tools can help someone hide data from others.
Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Identify the role of computer forensics in responding to crimes and
solving business challenges.
Outline system forensics issues, laws, and skills.
Develop plans that collect evidence in network and email environments.
Describe the constraints on digital forensic investigations.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
16. ********************************************************
CIS 417 Week 10 Term Paper Investigating Data
Theft
For more classes visit
www.snaptutorial.com
Term Paper: Investigating Data Theft
Due Week 10 and worth 150 points
Suppose a large aerospace engineering firm has immediately hired you
as a consultant to investigate a potential violation of corporate policy
and data theft. You have been informed that an employee may have been
using corporate email to send confidential corporate information to one
or more personal email accounts, which may or may not belong to him.
You have been told that this action has been happening each business
day for the last 13 days and the employee is unaware of any suspicion.
Write an eight to ten (8-10) page paper in which you:
Explain, in detail, the initial actions you would take based on the
provided information including formal plans to preserve the crime
scene(s) and eventual transportation of evidence to a lab.
17. Analyze the physical and logical places where you would look for
potential evidence on the suspect’s computer(s) and / or network
servers.
Describe, in detail, how you proceed with the email investigation,
including the review of email headers and tracing.
Describe the processes that would be utilized in order to recover data
that may have been deleted from the suspect’s computer(s).
Identify the tools you would use to perform your investigation from
beginning to end based on the information you have on the incident.
Provide a brief overview of each tool, to include:
A description of the tool.
How you would use the tool in the investigation.
How the tool helps the investigation and the evidence you expect it to
provide.
Why you believe the evidence the tool provides is critical to the
investigation.
· Use at least five (5) quality resources in this assignment.
Note:Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
18. page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Identify the role of computer forensics in responding to crimes and
solving business challenges.
Outline system forensics issues, laws, and skills.
Examine and explain the evidence life cycle.
Identify the procurement of evidence in physical and virtualized
environments.
Analyze the impact of sequestration on the evidence-gathering process.
Develop plans that collect evidence in network and email environments.
Examine automated digital forensic analysis.
Use technology and information resources to research issues in
computer forensics.
Write clearly and concisely about computer forensics topics using
proper writing mechanics and technical style conventions.
********************************************************