Assignment

 

Your task for this week is to write a three-page report on an open source web browser forensics tool.

Here are some sites where you can find open source tools to consider for your paper.  Some of these sites have multiple open source tools.

Be sure to explain how the tool works and list its advantages and disadvantages.

NetAnalysis

https://netanalysis.software.informer.com/1.5/

Internet Evidence Finder

https://www.forensicfocus.com/reviews/internet-evidence-finder-ief/?gclid=CjwKCAiAm-2BBhANEiwAe7eyFCMP3NSCoPk8rHLkC4_0n2Ku9NCFMjDCWDAOLHSDqlvdxaj-Ups7KhoCNpYQAvD_BwE

Magnet Forensics

https://www.fullversionforever.com/ief-internet-evidence-finder-free-download/

https://www.magnetforensics.com/free-trial/?magnet-product=Magnet%20AXIOM&option=free-trial&utm_source=Google&utm_medium=Search&utm_campaign=2021_AXIOM&gclid=CjwKCAiAm-2BBhANEiwAe7eyFGPHKMcm8N8iiH_orR6LpCSPdfDUpmlU8UvspYQcXoxO6BpRuXjj_hoCD04QAvD_BwE

H-11 Digital Forensics

               https://h11dfs.com/the-best-open-source-digital-forensic-tools/

Discussion 1- Project Processes

Chapter 1. IntroductionChapter 2. Process Approach to Project ManagementInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Find a recent news article on an ongoing project, evaluate the management’s performance, and explain how the project could be better organized and managed.
  2. Discuss the pros and cons of the spiral project life-cycle model and the waterfall project life-cycle model. How are the processes in the PMBOK related to each other? Give a specific example.
[Your post must be substantive and demonstrate insight gained from the course material. Postings must be in the student’s own words – do not provide quotes!]  [Your initial post should be at least 450+ words and in APA format (including Times New Roman with font size 12 and double spaced). Post the actual body of your paper in the discussion thread then attach a Word version of the paper for APA review]

Text-

Title: Project Management 

ISBN: 9780134478661 

Authors: SHTUB 

Publisher: Pearson 

Edition: 3RD 17

RESUME

Instruction:: Create your resume in a style of your choice.  The resume should be written from the standpoint of your career objectives based on the major(cybersecurity) you selected at this University, and applying for your first job in your chosen career. need it within 6-7 hours. Thank you

Practical Connection Assignment

  

Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study. 

Requirements:

Provide a 500 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment. 

You should not, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Be sure to not self-plagiarize as this assignment is similar in multiple courses.

entry about a tool used in computer forensics.

  1. name of tool;
  2. what function does it do (for computer forensics);
  3. commercial / open source?
  4. a safe site to download from;
  5. was it verified/ validated?
  6. brief description about “what is it used for exactly?”
  7. what operating system does it work on? 
  8. any dependencies on other software? what are they?

DQ

While there are many benefits to the use of cryptocurrency, there is also much skepticism from the general public.  Much of this concern centers around legal protection associated with transactions. Search the Internet and outline what legal protections exist for Bitcoin users in the US and other countries.

Please make your initial post and two response posts substantive. A substantive post will do at least two  of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

CIS 415 Unit 1 BMW Case Study

Your paper will be at least 3 double-spaced, APA formatted pages not including title and reference pages.

Follow PDF and these are the question also i will send you a link to the book ch 1 

1. Other than selling more cars, what potential benefits do connected-car technologies offer auto makers such as BMW in terms of enhancing long-term customer relationships?

2. What responsibilities does BMW have to its customers regarding the data it captures via the various con- nected car technologies that it builds into its cars?

3. Visit a BMW showroom and spend time with one of the “product geniuses” to learn more about the latest BMW technological innovations. Write a brief para- graph or two providing your critique of these innovations.

ethical hacking

 

Sometimes you need to see how an application works and behaves on a booted suspect’s computer. For this project, write a short guideline of two to three pages on how to use VirtualBox to start and run applications from a suspect’s disk image. Your research should start with the VirtualBox user guide at www.virtualbox.org. For more information, search for terms such as “VirtualBox convert RAW image to VDI” or “convert raw to vmdk.”

 

Decrypt the following ciphertext that is encrypted using RSA

Decrypt the following ciphertext that is encrypted using RSA:

5433065902986267632605533071412313607849042001231487725752160944543337634764776942780551811154931702225666567112761402854245945771790200374756020087742730448029511549378258035341909089954945069377423917666095579241594583655805469852654975413725915810650231239021446353034249591165382217733674640

RSA public key (N, e):

N =

9443933355875323479428701223436866003317020345062337184168866482442741746051755875714077225424938697068202237079691276886895796347334130227954217861122456746475811995655599937678751969288324093545863325957721247606698180886906068377558846502707583137394885329858060292972366775543495590847656457

e = 65537

Hint.

• A modulus N of the standard RSA consists of only the two large prime p and q.

• But the modulus N in this assignment consists of many primes, which may weaken the security of RSA (so making this assignment practicable).

• Students can use the following website for integer factorization: https://www.alpertron.com.ar/ECM.HTM

• Refer to the provided example code (example.py).