Mac OS Forensics

 2 PAGES, Arial Font, double space 

You are an experienced digital forensics specialist for DigiFirm Investigation Company.  One of your clients is a small music production company.  One day you receive a phone call from Andrea, the owner, and president of the music company. Andrea believes one of her employees, a sound technician, has been stealing intellectual property from the company.  She thinks he is copying original music scores and then selling them to upstart musicians, claiming that he wrote them.  Andrea checked the employee’s computer the previous night and thinks he has been deleting the files to cover his tracks.  He uses an Apple computer. There are several tools available for recovering files that have been deleted from an Apple computer including:

  1. Disk Drill, https://www.cleverfiles.com/disk-drill-win.html
  2. Mac Undelete, http://www.macundelete.com/
  3. Free Undelete Mac, http://www.freeundeletemac.com

For this assignment:

  • Research the three specific tools that can aid in recovering deleted Mac OS files.
  • Write a report about the capabilities of each tool.
  • Briefly describe what can and cannot be retrieved from the Mac OS operating systems.
  • Recommend one of the tools for use in this case and justify your recommendation.

IT214 Week 5

Discussion:

Weekly Assignment/Discussions via Unicheck Week 05

Write the pseudocode for the following:

….. to convert temperature from Celsius to Fahrenheit and Kelvins; from Fahrenheit to Celsius and Kelvins.

  • You must use the IF, ELSE, ELIF statements or a combination of these statements.
  • You must functions [at least three functions]
  • You must have error trapping routine(s)

DQ

There are a variety of ways that a cyber-attack can cause economic damage. In many cases, attackers try to “penetrate” systems in order to steal technology or other sensitive information. When do you think an attack can be classified as cyber terrorism?

Database 2 Data Management

 

database

Topic : Data Management 

Need 11 pages 

* Research Paper 

picture 

I need 6 pdfs as references, this is must, those pdfs should be downloadable

Need plagiarism report as well

Cyber Espionage

What steps should be taken to detect alleged industrial/cyber espionage? Discuss the implications of each of the steps proposed. 

Threat Assesment

 You are the webmaster for the Republican Party National Committee. Prepare a risk assessment analysis for your website. Some questions to consider:

  • Who is likely to attack your site?
  • When are attacks likely to occur?
  • What sort of attacks might take place?
  • How can you best minimize attacks and protect the integrity of your site?

Write between 200-300 words. Also, include references or citations if any

Project on Disaster Recovery on web application security

Each student will prepare a final project on a web application security topic. The primary deliverables for the project will be a paper and and also a presentation that will be presented by the student during the residency period.

Additional details on project deliverables will be presented next week.

Each student will be asked to pick a unique topic of their own choosing. Topics might include processes related to secure web technologies or a review of a specific web related cyber attack.

Gather all final project material:

  • final paper
  • power point
  • other

Create a single archive, attach here and submit
(ZIP not RAR please)

APA FORMAT references

  1. This assignment was started in class and needs to be completed prior to submission. All submissions MUST be a WORD document – NOT a PDF document. 

    Directions and Grading: 

    APA-7-Compliant Title Page = 40 points

    • REFER to Foundations p. 31 (bottom right number) for perfect sample
    • Use the title “APA-7 Practice with Title and References Pages”
    • APA-7-Compliant References Page = 60 points
    • REFER to Foundations p. 32 for perfect sample
    • REFER to Foundations pp. 33-39 to find the CORRECT formula for EACH article listed below
    • USE THE BELOW ARTICLES: BE SURE TO LOG INTO MY MONROE BEFORE PASTING THESE LINKS

https://www.proquest.com/docview/2713605548

https://www.mayoclinichealthsystem.org/hometown-health/speaking-of-health/college-students-and-depression

https://www.who.int/emergencies/situations/monkeypox-outbreak-2022

Graph theory – Project

 

For this  project, you will work in a group to submit your project proposal,

and then start your project as outlined below.

Projects could be in one of the following categories:

1. Problem transformation to graph theory. Example: four-cube puzzle is not a graph

problem initially but a creative transformation makes a graph theory problem from 4 cube

stack.

2. Graph Generation: a combination of multiple graphs and creating a new graph. For

example, shortest path routing with multiple weights (distance, crime rate, sight view,

hotel rating, etc…)

3. More efficient graph algorithms. Routing, MSTs, Max flows, Community Detections, etc

4. Graph neural networks, (Sample contents from Stanford, Upenn).

Project Topic

Each group can propose a project topic related to the application of graph theory

in any of the following areas:

• Telecommunication

• Social networks (graphs captured from Twitter, Facebook, etc.)

• Cybersecurity

• Biological networks (biochemical, neural, ecological, etc.).

• Transportation (flights, ground, ships, etc.).

• Trade and commerce

• Education (access, improvement).

• Astronomy and astrophysics

• Networks of information (internet, citation, etc.)

• Epidemics (spread of covid-19 as an example)

• Graph neural networks

• Unmanned Aerial Vehicle delivery network

• Other areas of your choice (with confirmation).

Proposal Rubric: 

Length 1000 words  – 5 points

Format IEEE/ACM – 5 points

Flow Clear and logical sequence of steps – 5 points

Creativity/Innovation Repeated projects will not be accepted – 10 points

Implementation Well definition of implementation process – 5 points

Evaluation Well definition of evaluation process – 5 points

Risks Possible problems – 3 points

References – 2 points

Total = 40 points