Answer below questions in 250 to 300 words each.

a) In no less than 250 words, describe a hacking tool that is used to gain access to a network.  Explain how the tool is used, how it works and how a network administrator can prevent this tool from access the network.

b) Many people believe that the use of biometrics is an invasion of privacy. For example, an eye scanning device records the inner structure of a persons eye and stores that image in a database. Critics worry that databases of human traits used to maintain corporate security may actually pose a privacy threat to individuals, if such data were used in other ways. In your view, are such concerns justified? Why or why not?

c) Some common biometric techniques include:

Fingerprint recognition

Signature dynamics

Iris scanning

Retina scanning

Voice prints

Face recognition

Select one of these biometric techniques and explain the benefits and the vulnerabilities associated with that method in 3-4 paragraphs.

Uncovering the existence of a problem can be achieved through monitoring and analyzing of the organization’s productivity level. The derived measurements of productivity are based on real data.

Look at the growth of decision support and analytics in a number of ways including the listing found on attached image. (The listing starts from Group communication and collaboration down to the last item, Anywhere, anytime support). 

Pick one item from the list of 7. Offer your opinion, observations, experiences, and/or research on the item that can facilitate managerial decision making.  Be sure to follow the APA writing style (Cite and add a Reference).

Let me know if you can’t open the attached image.

Write your opinion, observations, experiences, and/or research on one of the items listed in image. Must be 400 – 500 words.

 

During your first week as a Senior Information Systems Security director, you met with the Chief Information Officer (CIO) and Chief Security Officer (CSO). During the meeting, they revealed their deep concerns with the organizations business continuity plans (BCP). Since you were previously responsible for BCPs for a large enterprise they are requesting that you review the companys BCP staffing plans and training plans.   

They would like you to provide a report with your findings and recommendations for corrective action.   

Additionally, include why it is important to include legal representatives on the business continuity planning team and provide an example of laws or regulation the company should include to remain compliant.   

While there is not a specific page requirement for this assignment, students are required to fully develop ideas and answer questions to the point that no further questions are left in the mind of the reader. If the instructor can clearly find the answers to their questions, the ideas within the report are fully developed. If there are unanswered or under-answered questions, further development of the report is required. 
Keep the following in mind: 

  • More words do not necessarily indicate more meaning. 
  • When an employee is tasked with a project in the workplace that requires a report, the report should fully answer all the questions needing to be answered. In this school environment, students are learning how to prepare such documents.  
  • Consider your audience. Although instructors are very knowledgeable on the subject matter, they need to verify that the student has absorbed the material through a written report. Students should therefore write to an audience of a co-worker or classmate who does not know the answers to the questions posed. 
  • For students who are more comfortable with more specific guidelines, ideas can generally be developed in one to three paragraphs. The goal of writing in this class is to demonstrate what you have learned. 

Assignment grading will be based on answer quality, logic/organization of the paper, and language and writing skills, using APA format and the following .

 Youve just left an all-hands meeting at your company*. The CEO was very upset at the rise of shadow IT projects a major indicator that the companys internal information system has failed to meet its needs. Because the current information system is inadequate, inefficient, and outdated, the CEO is inviting everyone in the organization to propose a new operational, decision support, or enterprise information system to replace it. The executives have allocated $5 million to fund the most promising idea. This is your chance to make a difference in the company (not to mention your own career). Write your proposal as a memo that the entire C-suite will review. Include at least these points, in your own words, to be persuasive: 1. Identify the main functions of your proposed information system and why they are important to the business. 2. Describe what types of data your information system will hold and how data quality will be ensured. 3. Explain how the old information system handles the functions you mentioned, the problems that occur, and why your information system will handle things better. 4. Offer evidence of feasibility: Show that similar information systems have been built successfully and that they save more money than they cost. The executives are busy, so keep your memo to 1-4 pages and avoid any extraneous content 

 ** MUST HAVE MICROSOFT ACCESS PROGRAM TO COMPLETE **

** MUST COMPLETE ALL STEPS AND THIS WILL BE DOUBLE CHECKED **

** SECOND IMAGE ATTACHED TO ASSIGNMENT IS WHAT FINISHED PRODUCT SHOULD LOOK LIKE **

  1. Download the Lesson 12 project file (ATTACHED) to a folder titled Lesson 12
  2. Extract the file to the same folder.
  3. Open the file in Access.
  4. Save your file as “Lesson12_Project1_MEID.accdb” where MEID is your MEID.

Project Directions

  1. Open the Macro Designer and create a stand-alone macro to automatically open the Lifetime Media Equipment table. 
  2. Select the following arguments:
    1. Table Name: Lifetime Media Equipment
    2. View: Datasheet (default)
    3. Date Mode: Edit (default)
  3. Save the Macro as ‘Open Name Objects’ where name is your first name (example: Open John’s Objects)
  4. Right-click the ‘Open Name Objects’ macro in the database and select Design View. 
  5. Add an OpenForm action and the following arguments:
    1. Form Name: Equipment Checkout Form
    2. View: Form(default)
    3. Window Mode: Normal (default)
  6. Save and close the Macro. 
  7. Right-click on the Equipment Assignments Report and open in Design View. The Property Sheet should also be on the right of your screen.  You will now create a macro to send a reminder to the user upon closing the report to send an email to the auditor each Friday. 
  8. Select ‘On Close’ from the Event list. 
  9. Use the Macro Builder to create an embed macro that will prompt the user to send an Equipment Assignment report to the auditor each Friday by displaying a Message Box. 
    1. In the Macro Builder, choose Message Box from the Actions drop-down menu.
    2. In the Message box type: ‘Send Report to Auditor each Friday’.
    3. Beep: Yes
    4. Type: Information
    5. Title: ‘Reminder’
  10. Save and close the macro. 
  11. You can test your macro by opening the Equipment Assignments report from the Navigation pane and then closing the report.  
  12. Open the Lifetime Media Equipment table if not already opened. You will be adding fields to indicate if a lost/damaged item needs to be replaced and a field indicating the replacement amount per item.  
  13. Add a field titled ‘ReplacementRequired’ and format the field as Short Text
  14. Add a field titled ‘ReplacementAmountPerItem’ and format the field as Currency.
  15. Create an event-driven data macro to calculate a 60% replacement amount when the ‘ReplacementRequired’ field has a value of “YES”.  Enter the arguments per the illustration below. If the ‘ReplacementRequired’ field has a value of “NO” the ‘ReplacementAmountPerItem’ field will remain empty. 
  16. If the ‘ReplacementRequired’ field = “YES” you will SetField ‘ReplacementAmountPerItem’ to be equal to 60% of the Per Unit Cost amount.  
  17. Save and Close the macro. 
  18. In the Lifetime Media Equipment table enter “YES” for ‘ReplacementRequired’ for records 2, 8, 9, 24, and 25. Enter “NO” for the rest.  
  19. In the Lifetime Media Equipment table, add the following 2 records:
    1. One DSLR HD Camera for Jones at a per unit cost of $875.00. Replacement will not be required.
    2. One Studio HD Camera for Bernard at a per unit cost of $1200.00. Replacement will be required.
  20. Note: The replacement amounts are automatically calculated. 
  21. Save and Close the Lifetime Media Equipment Table. 
  22. Open a new query in SQL View
  23. Type the following commands:
    1. SELECT [Employee Assigned To], [Item Name], [Quantity]
    2. FROM [Lifetime Media Equipment]
    3. WHERE [Per Unit Cost] >700
    4. ;
  24. Run the query.
  25. View your results in Datasheet View.
  26. Save the query with the title Items over $700 
  27. Close the Query
  28. Compact, repair, and save your database. 
  29. Submit the assignment based on the instructions provided in the lesson. 

 

Assignment Content

  1. The strategic sourcing plan is a plan for how you will do business going forward. The sourcing plan can address how to supply resources to staff, your current and future systems, and how you will purchase raw materials or new IT systems.

    Develop a high-level IT sourcing plan to guide Phoenix Fine Electronics to adopting enterprise solutions rather than multiple stand-alone systems. As a guideline, your sourcing plan should be a 3- to 4-page outline or summary.

    Include the following in your sourcing plan:

    • The current technologies being utilized
    • Major issues with that technology
    • New technologies to implement as replacements for current technologies
    • How it addresses the current issues
    • Additional advantages or value added
    • Approximate time frame to implement the technology
    • Any dependencies that the company does not currently have in order to implement

Exercise 3

You work as a forensic investigator. A recent inquiry from a local company called TriGo has caught your attention. On a routine file audit of their servers, TriGo has found some files that appear to be corrupt because each file uses the .xde extension. When TriGo personnel try to access the files, they show as garbage. Search the Internet for this file extension and summarize your findings.

Write a one-page report detailing your results. Include at least one tool or best practice you would recommend to this client.

Case Study 1: Forensic Tool Selection

Your supervisor has asked you to research current forensic acquisition tools and to compile a list of recommended tools for the new forensics lab. Using the Internet and the tools listed in Chapter 3 as a guideline, create the following:  

1. Create an Excel spreadsheet or an open-source equivalent that specifies vendor name, name of acquisition tool, raw format, validation methods, and overall description of tool. 

2. Create a report to accompany the spreadsheetthat recommends two tools based on your research. Justify your answer.

3. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formattingrequirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Identify the computer forensics investigation process

. Outline system forensics issues, laws, and skills.

Use technology and information resources to research advanced issues in computer forensics.

Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions.

Case Study 2: POS Attacks

Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry.

Read the article titled, If you shopped at these 16 stores in the last year, your data might have been stolen located at Choose 2 stores from the list and research the specific attack or breach.

Write a paper in which you:

1. Summarize the attacks, providing details on the effects of the breach. 

2. Identify the common purpose of attacks on point-of-sale (POS) systems.

3. Assess why and how these POS systems have become a prime target for hacking groups.

4. Examine the forensics challenges that exist for investigations on POS systems.

5. Use at least two (2) quality resources in this assignment other than the article linked above. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date.

The specific course learning outcomes associated with this assignment are:

Outline system forensics issues, laws, and skills. Describe and analyze practices in obtaining digital evidence.

Use technology and information resources to research advanced issues in computer forensics. Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions.

Case Study 3: Apple Vs the FBI

Read the article titled, The Secret History of the FBIs Battle Against Apple Reveals the Bureaus Mistake located athttp://fortune.com/2018/03/27/fbi-apple-iphone-encryption-san-bernardino/

Write a report in which you discuss:

1. Based on this article or other topic research, explain whether you agree with the FBI or you agree with Apple. Justify your stance with supporting information. 

2. Describe a possible compromise to the solution for future cases that would allow the investigation to continue. 

3. Take a position on whether you believe technology is moving too fast for the judicial system. Suggest at least two improvements that the courts can make in order to catch up and / or keep up with the advancements in technology issues and crimes.

4. Use at least two quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. 

The specific course learning outcomes associated with this assignment are:

Outline system forensics issues, laws, and skills.

Compare and contrast the various types of computer forensic tools

. Use technology and information resources to research advanced issues in computer forensics.

Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions.

Assignment 1: Email Harassment

Suppose you are an internal investigator for a large software development company. The Human Resources Department has requested you investigate the accusations that one employee has been harassing another over both the corporateExchange email system and Internet-based Google Gmail email.

Prepare a report in you:

1. Create an outline of the steps you would take in examining the email accusations that have been identified.

2. Describe the information that can be discovered in email headers and determine how this information could potentially be used as evidence in the investigation.

3. Analyze differences between forensic analysis on the corporate Exchange system and the Internet-based Google Gmail email system. Use this analysis to determine the challenges that exist for an investigator when analyzing email sent from an Internet-based email system outside of the corporate network.

4. Select one (1) software-based forensic tool for email analysis that you would utilize in this investigation. Describe its use, features, and how it would assist in this scenario.

5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date.

Term Paper: Digital Forensic Cases

You have been asked to conduct research on a past forensic case to analyze how digital data was used to solve the case. Choose one of the following digital forensic cases: 

S. v. Doe (1983), Doe U.S. (1988), People Sanchez (1994),  Michelle Theer (2000), Scott Tyree (2002), Dennis Rader (2005), Corey Beantee Melton (2005), James Kent (2007), Brad Cooper (2008)

Using the Stayer Library or the Internet, search for the case notes and reports for the case and answer the following:

1. Summarize the case, the pertinent actors, evidence, and facts. 

2. Outline the specific digital evidence that was used in the case.

3. Describe how the investigators found and documented the evidence, if any.

4. Describe the procedures and tool(s) used for acquiring potential evidence. 

5. Describe the obstacles faced in the investigation.

6. Outline the most significant improvement to digital forensic investigations/tools that assisted with efficiency and reliability. 

7. Provide the links to two modern tools that could have assisted with the collection of evidence. 

8. Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. 

DQ1

“Current Legal Processes”

Summarize the importance of the fourth amendment, specifically as it applies to a forensic investigation. Using your favorite Internet browser and search engine, look for a news article from within the last year related to the fourth amendment. Summarize the article, outlining the specific context to the fourth amendment. Provide your opinion on the relevance to this amendment. Justify your answer.

DQ2

“Forensic Labs and Certification” 

  • From the reading, outline the process of forensic lab accreditation and determine what a laboratory needs to do in order to fulfill the requirements. Identify an ASCLD accredited lab in your geographic location and conduct further research on this lab. Summarize the location and the type of lab.  Explain whether you believe lab certification is a requirement for law enforcement agencies and provide justification.

DQ3

” Storage Format for Digital Evidence ” 

  • As an investigator, you are responsible for protecting the integrity of the data you collect from a hard drive.
  • Discuss the method used to create data images. Using your favorite web browser and search engine, search the Internet for a third party tool capable of creating an exact copy of a hard drive. Provide a description of the tool and share the link with your classmates. Compare and contrast the viable use of a Linux tool versus a proprietary tool. Are their advantages to using one over the other? Justify your answer.

Morgan and Dunn JD have hired you to assist with a case involving domestic abuse. The evidence is contained on a password-protected laptop that the plaintiff (the wife) indicates will show a pattern of abuse. You have to decide what equipment and software to purchase to assist with the case and safely extract the data from the laptop.

Write a one-page report detailing your equipment and software. Be sure to include a rationale for each item.

Jack Winters owns a small business, offering construction services for Disney. To save money on his bids, he subcontracts all of the painting out to another company called Painters Inc. While balancing QuickBooks from the actual job invoices and receipts, Jack notices a discrepancy. Painters Inc. was issued a check for $14,125, but the job invoice shows that the job was finished for $12,125. Jack contacts Painters Inc, who provides proof that they received payment for $12,125. Besides Jack, only one person had access to the accounting software. You have been called to investigate. 

Write a one-page report detailing the steps Jack needs to take to gather all of the appropriate evidence and protect his company.