SlideShare a Scribd company logo
CIS 562 Week 3 Assignment 1 Professional
Forensics Basics
For more classes visit
www.snaptutorial.com
Assignment 1: Professional Forensics Basics
Due Week 3 and worth 50 points
Suppose you are the CISO at a large company and are trying to convince
the Board of Directors that there is a business need for a system
forensics department and lab, and substantial funding is needed.
Write a four to five (4-5) page paper in which you:
Develop a compelling argument that you would present to the Board,
making a case for creating a system forensics department and building a
functional lab.
Describe the difference between corporate investigations and law
enforcement investigations and determine why corporate investigations
are an integral part of an information security program.
Explain the importance of employing dedicated system forensics
specialists who are familiar with multiple computing platforms and the
negative affect the lack of familiarization can have on an investigation.
Compare and contrast public laws and company policy in terms of
computer forensics and identify the role each plays in an investigation.
Analyze the importance of using forensic specialists and professional
conduct in an investigation and the affect this has in a court case and / or
corporation investigation.
Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Identify the computer forensics investigation process.
Outline system forensics issues, laws, and skills.
Use technology and information resources to research advanced issues in
computer forensics.
Write clearly and concisely about topics related to computer forensics
planning using proper writing mechanics and technical style
conventions.
***************************
CIS 562 Week 8 Case Study 3 Analyzing Stuxnet
For more classes visit
www.snaptutorial.com
Case Study 3: Analyzing Stuxnet
Due Week 8 and worth 60 points
Read the article titled, “How Digital Detectives Deciphered Stuxnet, the
Most Menacing Malware in History” located at the Wired link below:
http://www.wired.com/threatlevel/2011/07/how-digital-detectives-
deciphered-stuxnet/all/1
Write a three to four (3-4) page paper in which you:
Explain the forensic technique Symantec researchers employed in order
to receive the traffic sent by Stuxnet-infected computers and describe
what their analysis uncovered.
Identify what researchers were surprised to discover with Stuxnet’s
malicious DLL file. Assess this significant function of malware and
what potential dangers it could present in the future.
Determine the primary reason that critical infrastructures are open to
attacks which did not seem possible just a couple of decades earlier.
Decide whether or not an appropriate case has been made in which
Stuxnet was indeed a targeted attack on an Iranian nuclear facility, based
on the evidence and conclusions of the researchers. Provide your
rationale with your response.
Use at least two (2) quality resources in this assignment other than the
article linked above. Note: Wikipedia and similar Websites do not
qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Outline system forensics issues, laws, and skills.
Analyze and describe the process of reviewing network logs for analysis.
Use technology and information resources to research advanced issues in
computer forensics.
Write clearly and concisely about topics related to computer forensics
planning using proper writing mechanics and technical style
conventions.
***************************
CIS 562 Week 9 Assignment 4 Email Harassment
For more classes visit
www.snaptutorial.com
Assignment 4: Email Harassment
Due Week 9 and worth 50 points
Suppose you are an internal investigator for a large software
development company. The Human Resources Department has
requested you investigate the accusations that one employee has been
harassing another over both the corporate Exchange email system and
Internet-based Yahoo! email.
Write a four to five (4-5) page paper in which you:
Create an outline of the steps you would take in examining the email
accusations that have been identified.
Describe the information that can be discovered in email headers and
determine how this information could potentially be used as evidence in
the investigation.
Analyze differences between forensic analysis on the corporate
Exchange system and the Internet-based Yahoo! System. Use this
analysis to determine the challenges that exist for an investigator when
analyzing email sent from an Internet-based email system outside of the
corporate network.
Select one (1) software-based forensic tool for email analysis that you
would utilize in this investigation. Describe its use, features, and how it
would assist in this scenario.
Use at least three (3) quality resources in this assignment.Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Describe and analyze practices in obtaining digital evidence.
Demonstrate the ability to develop procedural techniques in crime and
incident scenes.
Describe processes in recovering graphic, mobile and email files.
Use technology and information resources to research advanced issues in
computer forensics.
Write clearly and concisely about topics related to computer forensics
planning using proper writing mechanics and technical style
conventions.
***************************
CIS 562 Week 10 Term Paper Corporate
Embezzlement
For more classes visit
www.snaptutorial.com
Term Paper: Corporate Embezzlement
Due Week 10 and worth 200 points
Imagine you are employed by a large city police department as the
leader of the digital forensics division. A large corporation in the city
has contacted the police for assistance in investigating its concerns that
the company Chief Financial Officer (CFO) has been using company
money to fund personal travel, gifts, and other expenses. As per the
company security director, potential evidence collected thus far includes
emails, bank statements, cancelled checks, a laptop, and a mobile device.
Write an eight to ten (8-10) page plan report in which you:
Explain the processes you would use to seize, search, collect, store, and
transport devices and other potential sources of evidence.
Indicate the personnel resources needed for the investigation and assess
why you believe this amount of resources is warranted.
List the initial questions you would have for the security director
regarding the company’s email environment and explain the tasks you
would consider performing for this portion of the investigation.
Create an outline of the steps you would take to ensure that if a trial
were brought against the CFO, the evidence collected would be
admissible in the court of law.
Determine the potential evidence (including logs, devices, etc.) you
would request from the company security director based on what she has
identified and identify the other data sources you might consider
reviewing.
Explicate the tools you would use for this investigation based on the
potential evidence the company security director has already identified,
as well as any other potential sources of evidence you might review.
Describe the procedure and tool(s) you would consider utilizing for
acquiring potential evidence from the CFO’s mobile device.
Use at least five (5) quality resources in this assignment.Note: Wikipedia
and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with
one-inch margins on all sides; citations and references must follow APA
or school-specific format. Check with your professor for any additional
instructions.
Include a cover page containing the title of the assignment, the student’s
name, the professor’s name, the course title, and the date. The cover
page and the reference page are not included in the required assignment
page length.
The specific course learning outcomes associated with this assignment
are:
Describe and analyze practices in obtaining digital evidence.
Compare and contrast the various types of computer forensic tools.
Demonstrate the ability to develop procedural techniques in crime and
incident scenes.
Describe processes in recovering graphic, mobile, and email files.
Develop a computer forensics plan that addresses and solves a proposed
business problem.
Use technology and information resources to research advanced issues in
computer forensics.
Write clearly and concisely about topics related to computer forensics
planning using proper writing mechanics and technical style
conventions.
Grading for this assignment will be based on answer quality, logic /
organization of the paper, and language and writing skills, using the
following rubric.
***************************

More Related Content

What's hot

Cisa 3358600, april 2021 research paper instructions 1
Cisa 3358600, april 2021   research paper instructions 1 Cisa 3358600, april 2021   research paper instructions 1
Cisa 3358600, april 2021 research paper instructions 1
RAJU852744
 
CRJ 320 Entire Course NEW
CRJ 320 Entire Course NEWCRJ 320 Entire Course NEW
CRJ 320 Entire Course NEW
shyamuopseven
 
Benchmark data collection design 1 data
Benchmark data collection design                       1 data Benchmark data collection design                       1 data
Benchmark data collection design 1 data
RAJU852744
 
CIS 550 Success Begins / snaptutorial.com
CIS 550 Success Begins / snaptutorial.comCIS 550 Success Begins / snaptutorial.com
CIS 550 Success Begins / snaptutorial.com
Robinson075
 
Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1
infinityend3
 
Cis 560 Enthusiastic Study / snaptutorial.com
Cis 560 Enthusiastic Study / snaptutorial.comCis 560 Enthusiastic Study / snaptutorial.com
Cis 560 Enthusiastic Study / snaptutorial.com
Stephenson06
 
Statement of Research Interests
Statement of Research InterestsStatement of Research Interests
Statement of Research Interests
adil raja
 
A Federated Search Approach to Facilitate Systematic Literature Review in Sof...
A Federated Search Approach to Facilitate Systematic Literature Review in Sof...A Federated Search Approach to Facilitate Systematic Literature Review in Sof...
A Federated Search Approach to Facilitate Systematic Literature Review in Sof...
ijseajournal
 
Action Research Statement of the Issue
Action Research Statement of the Issue Action Research Statement of the Issue
Action Research Statement of the Issue Mae Guerra
 
Work towards a quantitative model of risk in patent litigation
Work towards a quantitative model of risk in patent litigationWork towards a quantitative model of risk in patent litigation
Work towards a quantitative model of risk in patent litigation
Kripa (कृपा) Rajshekhar
 
Module 2 slpbusiness-to-business marketing and marketing channels
Module 2   slpbusiness-to-business marketing and marketing channelsModule 2   slpbusiness-to-business marketing and marketing channels
Module 2 slpbusiness-to-business marketing and marketing channels
POLY33
 
INF 103(ASH) Learn/newtonhelp.com
INF 103(ASH) Learn/newtonhelp.comINF 103(ASH) Learn/newtonhelp.com
INF 103(ASH) Learn/newtonhelp.com
lechenau48
 
College of administration and finance sciences assignment (
College of administration and finance sciences assignment (College of administration and finance sciences assignment (
College of administration and finance sciences assignment (
RAJU852744
 

What's hot (13)

Cisa 3358600, april 2021 research paper instructions 1
Cisa 3358600, april 2021   research paper instructions 1 Cisa 3358600, april 2021   research paper instructions 1
Cisa 3358600, april 2021 research paper instructions 1
 
CRJ 320 Entire Course NEW
CRJ 320 Entire Course NEWCRJ 320 Entire Course NEW
CRJ 320 Entire Course NEW
 
Benchmark data collection design 1 data
Benchmark data collection design                       1 data Benchmark data collection design                       1 data
Benchmark data collection design 1 data
 
CIS 550 Success Begins / snaptutorial.com
CIS 550 Success Begins / snaptutorial.comCIS 550 Success Begins / snaptutorial.com
CIS 550 Success Begins / snaptutorial.com
 
Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1Strayer cis-417-week-2-assignment-1
Strayer cis-417-week-2-assignment-1
 
Cis 560 Enthusiastic Study / snaptutorial.com
Cis 560 Enthusiastic Study / snaptutorial.comCis 560 Enthusiastic Study / snaptutorial.com
Cis 560 Enthusiastic Study / snaptutorial.com
 
Statement of Research Interests
Statement of Research InterestsStatement of Research Interests
Statement of Research Interests
 
A Federated Search Approach to Facilitate Systematic Literature Review in Sof...
A Federated Search Approach to Facilitate Systematic Literature Review in Sof...A Federated Search Approach to Facilitate Systematic Literature Review in Sof...
A Federated Search Approach to Facilitate Systematic Literature Review in Sof...
 
Action Research Statement of the Issue
Action Research Statement of the Issue Action Research Statement of the Issue
Action Research Statement of the Issue
 
Work towards a quantitative model of risk in patent litigation
Work towards a quantitative model of risk in patent litigationWork towards a quantitative model of risk in patent litigation
Work towards a quantitative model of risk in patent litigation
 
Module 2 slpbusiness-to-business marketing and marketing channels
Module 2   slpbusiness-to-business marketing and marketing channelsModule 2   slpbusiness-to-business marketing and marketing channels
Module 2 slpbusiness-to-business marketing and marketing channels
 
INF 103(ASH) Learn/newtonhelp.com
INF 103(ASH) Learn/newtonhelp.comINF 103(ASH) Learn/newtonhelp.com
INF 103(ASH) Learn/newtonhelp.com
 
College of administration and finance sciences assignment (
College of administration and finance sciences assignment (College of administration and finance sciences assignment (
College of administration and finance sciences assignment (
 

Similar to CIS 562 Education Organization / snaptutorial.com

CIS 562 Success Begins / snaptutorial.com
CIS 562 Success Begins / snaptutorial.comCIS 562 Success Begins / snaptutorial.com
CIS 562 Success Begins / snaptutorial.com
Robinson075
 
CIS 562 Focus Dreams/newtonhelp.com
CIS 562 Focus Dreams/newtonhelp.comCIS 562 Focus Dreams/newtonhelp.com
CIS 562 Focus Dreams/newtonhelp.com
bellflower91
 
CIS 562 Imagine Your Future/newtonhelp.com   
CIS 562 Imagine Your Future/newtonhelp.com   CIS 562 Imagine Your Future/newtonhelp.com   
CIS 562 Imagine Your Future/newtonhelp.com   
bellflower51
 
Cis 417 Success Begins / snaptutorial.com
Cis 417 Success Begins / snaptutorial.comCis 417 Success Begins / snaptutorial.com
Cis 417 Success Begins / snaptutorial.com
Robinson072
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docx
rhetttrevannion
 
Strayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-dataStrayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-data
infinityend3
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.com
Robinson070
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.com
GeorgeDixon100
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.com
sholingarjosh56
 
CIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.comCIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.com
Robinson068
 
Review the case titled U.S. v. AOL” found in chapter thirteen (13.docx
Review the case titled  U.S. v. AOL” found in chapter thirteen (13.docxReview the case titled  U.S. v. AOL” found in chapter thirteen (13.docx
Review the case titled U.S. v. AOL” found in chapter thirteen (13.docx
michael591
 
Strayer cis-417-week-10-term-paper-investigating-data-theft
Strayer cis-417-week-10-term-paper-investigating-data-theftStrayer cis-417-week-10-term-paper-investigating-data-theft
Strayer cis-417-week-10-term-paper-investigating-data-theft
infinityend3
 
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxAssignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
astonrenna
 
CIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.comCIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.com
McdonaldRyan139
 
Preliminary investigations do not necessarily yield enough infor.docx
Preliminary investigations do not necessarily yield enough infor.docxPreliminary investigations do not necessarily yield enough infor.docx
Preliminary investigations do not necessarily yield enough infor.docx
heathmirella
 
Cis 550-week-9-case-study-7
Cis 550-week-9-case-study-7Cis 550-week-9-case-study-7
Cis 550-week-9-case-study-7
shyaminfo18
 
Acc 571 week 2 assignment 1 strayer
Acc 571 week 2 assignment 1   strayerAcc 571 week 2 assignment 1   strayer
Acc 571 week 2 assignment 1 strayer
LindaAdams2017
 
Cis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.comCis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.com
sholingarjosh61
 
Cis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.comCis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.com
Stephenson03
 

Similar to CIS 562 Education Organization / snaptutorial.com (19)

CIS 562 Success Begins / snaptutorial.com
CIS 562 Success Begins / snaptutorial.comCIS 562 Success Begins / snaptutorial.com
CIS 562 Success Begins / snaptutorial.com
 
CIS 562 Focus Dreams/newtonhelp.com
CIS 562 Focus Dreams/newtonhelp.comCIS 562 Focus Dreams/newtonhelp.com
CIS 562 Focus Dreams/newtonhelp.com
 
CIS 562 Imagine Your Future/newtonhelp.com   
CIS 562 Imagine Your Future/newtonhelp.com   CIS 562 Imagine Your Future/newtonhelp.com   
CIS 562 Imagine Your Future/newtonhelp.com   
 
Cis 417 Success Begins / snaptutorial.com
Cis 417 Success Begins / snaptutorial.comCis 417 Success Begins / snaptutorial.com
Cis 417 Success Begins / snaptutorial.com
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docx
 
Strayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-dataStrayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-8-assignment-4-data
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.com
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.com
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.com
 
CIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.comCIS 324 Success Begins / snaptutorial.com
CIS 324 Success Begins / snaptutorial.com
 
Review the case titled U.S. v. AOL” found in chapter thirteen (13.docx
Review the case titled  U.S. v. AOL” found in chapter thirteen (13.docxReview the case titled  U.S. v. AOL” found in chapter thirteen (13.docx
Review the case titled U.S. v. AOL” found in chapter thirteen (13.docx
 
Strayer cis-417-week-10-term-paper-investigating-data-theft
Strayer cis-417-week-10-term-paper-investigating-data-theftStrayer cis-417-week-10-term-paper-investigating-data-theft
Strayer cis-417-week-10-term-paper-investigating-data-theft
 
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxAssignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
 
CIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.comCIS 560 Education Specialist / snaptutorial.com
CIS 560 Education Specialist / snaptutorial.com
 
Preliminary investigations do not necessarily yield enough infor.docx
Preliminary investigations do not necessarily yield enough infor.docxPreliminary investigations do not necessarily yield enough infor.docx
Preliminary investigations do not necessarily yield enough infor.docx
 
Cis 550-week-9-case-study-7
Cis 550-week-9-case-study-7Cis 550-week-9-case-study-7
Cis 550-week-9-case-study-7
 
Acc 571 week 2 assignment 1 strayer
Acc 571 week 2 assignment 1   strayerAcc 571 week 2 assignment 1   strayer
Acc 571 week 2 assignment 1 strayer
 
Cis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.comCis 438 Technology levels--snaptutorial.com
Cis 438 Technology levels--snaptutorial.com
 
Cis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.comCis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Enthusiastic Study / snaptutorial.com
 

Recently uploaded

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
Vivekanand Anglo Vedic Academy
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
AzmatAli747758
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 

Recently uploaded (20)

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...Cambridge International AS  A Level Biology Coursebook - EBook (MaryFosbery J...
Cambridge International AS A Level Biology Coursebook - EBook (MaryFosbery J...
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 

CIS 562 Education Organization / snaptutorial.com

  • 1. CIS 562 Week 3 Assignment 1 Professional Forensics Basics For more classes visit www.snaptutorial.com Assignment 1: Professional Forensics Basics Due Week 3 and worth 50 points Suppose you are the CISO at a large company and are trying to convince the Board of Directors that there is a business need for a system forensics department and lab, and substantial funding is needed. Write a four to five (4-5) page paper in which you: Develop a compelling argument that you would present to the Board, making a case for creating a system forensics department and building a functional lab. Describe the difference between corporate investigations and law enforcement investigations and determine why corporate investigations are an integral part of an information security program. Explain the importance of employing dedicated system forensics specialists who are familiar with multiple computing platforms and the negative affect the lack of familiarization can have on an investigation. Compare and contrast public laws and company policy in terms of computer forensics and identify the role each plays in an investigation. Analyze the importance of using forensic specialists and professional conduct in an investigation and the affect this has in a court case and / or corporation investigation.
  • 2. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Identify the computer forensics investigation process. Outline system forensics issues, laws, and skills. Use technology and information resources to research advanced issues in computer forensics. Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions. *************************** CIS 562 Week 8 Case Study 3 Analyzing Stuxnet For more classes visit www.snaptutorial.com Case Study 3: Analyzing Stuxnet
  • 3. Due Week 8 and worth 60 points Read the article titled, “How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History” located at the Wired link below: http://www.wired.com/threatlevel/2011/07/how-digital-detectives- deciphered-stuxnet/all/1 Write a three to four (3-4) page paper in which you: Explain the forensic technique Symantec researchers employed in order to receive the traffic sent by Stuxnet-infected computers and describe what their analysis uncovered. Identify what researchers were surprised to discover with Stuxnet’s malicious DLL file. Assess this significant function of malware and what potential dangers it could present in the future. Determine the primary reason that critical infrastructures are open to attacks which did not seem possible just a couple of decades earlier. Decide whether or not an appropriate case has been made in which Stuxnet was indeed a targeted attack on an Iranian nuclear facility, based on the evidence and conclusions of the researchers. Provide your rationale with your response. Use at least two (2) quality resources in this assignment other than the article linked above. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • 4. The specific course learning outcomes associated with this assignment are: Outline system forensics issues, laws, and skills. Analyze and describe the process of reviewing network logs for analysis. Use technology and information resources to research advanced issues in computer forensics. Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions. *************************** CIS 562 Week 9 Assignment 4 Email Harassment For more classes visit www.snaptutorial.com Assignment 4: Email Harassment Due Week 9 and worth 50 points Suppose you are an internal investigator for a large software development company. The Human Resources Department has requested you investigate the accusations that one employee has been harassing another over both the corporate Exchange email system and Internet-based Yahoo! email. Write a four to five (4-5) page paper in which you: Create an outline of the steps you would take in examining the email accusations that have been identified.
  • 5. Describe the information that can be discovered in email headers and determine how this information could potentially be used as evidence in the investigation. Analyze differences between forensic analysis on the corporate Exchange system and the Internet-based Yahoo! System. Use this analysis to determine the challenges that exist for an investigator when analyzing email sent from an Internet-based email system outside of the corporate network. Select one (1) software-based forensic tool for email analysis that you would utilize in this investigation. Describe its use, features, and how it would assist in this scenario. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Describe and analyze practices in obtaining digital evidence. Demonstrate the ability to develop procedural techniques in crime and incident scenes. Describe processes in recovering graphic, mobile and email files. Use technology and information resources to research advanced issues in computer forensics. Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions.
  • 6. *************************** CIS 562 Week 10 Term Paper Corporate Embezzlement For more classes visit www.snaptutorial.com Term Paper: Corporate Embezzlement Due Week 10 and worth 200 points Imagine you are employed by a large city police department as the leader of the digital forensics division. A large corporation in the city has contacted the police for assistance in investigating its concerns that the company Chief Financial Officer (CFO) has been using company money to fund personal travel, gifts, and other expenses. As per the company security director, potential evidence collected thus far includes emails, bank statements, cancelled checks, a laptop, and a mobile device. Write an eight to ten (8-10) page plan report in which you: Explain the processes you would use to seize, search, collect, store, and transport devices and other potential sources of evidence. Indicate the personnel resources needed for the investigation and assess why you believe this amount of resources is warranted. List the initial questions you would have for the security director regarding the company’s email environment and explain the tasks you would consider performing for this portion of the investigation.
  • 7. Create an outline of the steps you would take to ensure that if a trial were brought against the CFO, the evidence collected would be admissible in the court of law. Determine the potential evidence (including logs, devices, etc.) you would request from the company security director based on what she has identified and identify the other data sources you might consider reviewing. Explicate the tools you would use for this investigation based on the potential evidence the company security director has already identified, as well as any other potential sources of evidence you might review. Describe the procedure and tool(s) you would consider utilizing for acquiring potential evidence from the CFO’s mobile device. Use at least five (5) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Describe and analyze practices in obtaining digital evidence. Compare and contrast the various types of computer forensic tools. Demonstrate the ability to develop procedural techniques in crime and incident scenes. Describe processes in recovering graphic, mobile, and email files. Develop a computer forensics plan that addresses and solves a proposed business problem.
  • 8. Use technology and information resources to research advanced issues in computer forensics. Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric. ***************************