digital forensic-week-4-D

Using the Web or other resources, find a case where an illegal search was claimed.

Write a brief essay describing that case and how it relates to this topic.(300 words)

Link: https://www.youtube.com/watch?v=DAfjiGgiVzA

2 Separate Discussion

  

Subject: Emerging Technologies

Textbook: MSTM-5023-M2A Emerging Technologies

Two Separate Assessments. Each 300+ words with Reference

Discussion 1

Chapter 9 Exercise.

There continues to be a disparity between the advertising dollars spent on reaching TV viewers and Internet users versus the amount of time that is spent interacting with each medium. A large degree of Google’s success is attributable to taking advantage of this large gap. Research to determine (a) TV advertising dollars and Internet advertising dollars spent, and (b) the amount of time spent watching TV versus using the Internet. How has Google taken advantage of this disparity? What other major societal trends are forecasted that will continue to shift advertising dollars to new media, and why?

Your response should be at least 300 words, single-spaced. Provide references in APA format if necessary. The title page is not needed.

Discussion 2 

Chapter 15. Exercise:

An acquirer looks for a company with a good profit margin, a proven history, and a fair price. Choose an industry of interest and list five criteria for selecting candidates for acquisition.

Research and response to the above question in no less than 300 words, single spaced. Provide references in APA format. A title page is not needed.

Two Separate Assisments. Each 300+ words with Reference

parsing tree programing assignment

Similar to the parsing tree example in class, there is not much usefulness in parsing and evaluating statements without an operator. Therefore, it is safe to assume that any input to your parsing tree will contain an operator.

Examples of valid inputs are: 

  • ( T AND F )
  • ( ( T OR M_0.3 ) AND P_0.8 )
  • ( P_0.9 OR M_0.4 )

Example of inputs that are not expected (and that you don’t need to account for):

  • ( T )
  • ( P_0.85 )
  • ( F )

Also, if you haven’t started, and want a clean slate to start with, use this skeleton code in MS Teams: mp_parse.py (Links to an external site.)

What is the assignment?

  • To implement functions to build, evaluate, and print expressions using our (made-up) maybe-probably logic

What to hand in? 

  • One (and only one) *.py file should be handed in. All your checks, unit tests should be inside of this file (similar to last assignment).
  • Note that your program should be able to be run at console/terminal (e.g. $ python your_file.py). If it does not, then the execution portion of the assignment will be 0. 
  • Also note that you do not need to hand in binarytree.py nor stack.py; and you do *not* need to copy them into your file. Just import them. (For Peer Reviewers, ensure you put the code you will review in the same directory as 

What needs to be done? 

The primary tasks in this fourth assignment are to implement the following three functions.

1. buildMPLogicParseTree(s) – this function should take a string as input (e.g. s = ‘( T OR P_0.9 )’) and should return the binary tree representing the parse tree as described in class

2. evaluateMPLogicParseTree(t) – this function should take a binary tree as input and should return a T or an F that is based on the on the input statement

3. printMPLogicExpression(t) – this function should take a binary tree as input and should return the string that looks like the original string (perhaps with extra parentheses)

4. create some examples of how your functions work (inside of def main()), and test that each of the functions works correctly (using unittest)

Note: Those exact function names above should be used. If those name are not used 10pts will be automatically deducted.

Also:

  • you should use the file parsetree.py for inspiration (located in MS Teams -> General -> Files -> Code); note: that file is for building entirely different types of parse trees so only parts of it will be relevant to this assignment
  • you will also want to download the files binarytree.py and stack.py, and import them from your *.py file (all three files will need to exist in the same directory/folder)
  • as with the last assignment, your *.py file will be run through a test script 

When you submit your assignment, it will be graded in large part based on whether it successfully runs when using different input strings. The tests will roughy look like the following:

pt = buildMPLogicParseTree('( ( T AND F ) OR M_0.3 )')
ans = evaluateMPLogicParseTree(pt)
exp = printMPLogicExpression(pt)
# pt, ans, and exp will all be checked to ensure they are correct

Again, several different input strings will be also be tested.

When an M_x or P_x is present then the test will confirm that your tree evaluates to the correct average.

For example, the above input string will evaluate to T roughly 30% of the time. 

What does maybe-probably logic look like again, exactly? 

The symbols of our maybe-probably Boolean logic are:

  • T – denotes True
  • F – denotes False
  • M_x is a maybe symboled that evaluates to true with probability x, 0.0 <= x <= 0.75 Ø
  • P_x is a probably symbol that evaluates to true w/ probability x, 0.75 <= x < 1.0 Ø
  • AND, OR – the two operators (note, these are binary operators)
  • (, ) – parentheses are to be used in the same way as with the parse tree.py example we saw in class

Some additional examples of statements in this language are:

  • ( T AND F ) a should evaluate to F for False
  • ( T OR F ) a should evaluate to T for False
  • ( M_0.7 ) a should evaluate to T for True 70% of the time
  • ( M_0.9 ) invalid since parameter x is greater than 0.75!!
  • ( ( P_0.8 AND T ) OR ( M_0.25 ) ) a should evaluate to true 85% of the time

As with other assignments, the final code should be your own work. However, discussing the general approach, or specific Python issues/functions, with others (e.g. on MSU Discord server), is acceptable, and encouraged! Of course, don’t hesitate to ask questions in MS Teams, by email, and in class. Again, note that the tree should include x, and that M_x or P_x terms should evaluate only inside of the evaluate function.

Problem 1: Create a list that contains the months of the year. Problem 2: Create a loop to print the month number and name

Instructions:

Create a PowerPoint that contains a FLOWCHART and a PSEUDOCODE for each problem.

Use the information below to create a pseudocode (which can be a text-based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. Use Microsoft PowerPoint® for Pseudocode and the flowchart.

Problem 1: Create a list that contains the months of the year.

Problem 2: Create a loop to print the month number and name (do not hard code the month number)

Consider using the attached enumerate method to help!

Linux Implementation Proposal: Client Response Memo

 

Faster Computing was impressed with your presentation. The company is  interested in moving forward with the project, but the senior  management team has responded to the presentation with the following  questions and concerns:

  • How will security be implemented in the Linux systems—both workstations and servers?
     
  • End users have expressed some concern about completing their  day-to-day tasks on Linux. How would activities such as web browsing  work? How would they work with their previous Microsoft Office files?
     
  • The current Windows administrators are unsure about administering  Linux systems. How are common tasks, such as process monitoring and  management, handled in Linux? How does logging work? Do we have event  logs like we do in Windows?
     
  • Some folks in IT raised questions about the Linux flavor that was  recommended. They would like to see comparisons between your  recommendation and a couple of other popular options. What makes your  recommendation the best option?
     
  • How does software installation work on Linux? Can we use existing Windows software?
     
  • How can Linux work together with the systems that will continue to  run Windows? How will we share files between the different system types?
     

The deliverable for this phase of the project is a memo. There is no  minimum or maximum page requirement, but all of the questions must be  fully answered with sufficient detail. The recommended format is to  respond to the questions in a bulleted format. Provide sufficient detail  to fully address the questions. You must cite at least two quality  sources.

Template

  

Go2Linux, Inc.

 

Provide a brief summary of your recommendation

of a specific version of Linux. Explain how your choice meets the business need of Faster 

Computing, Inc.

The bold text questions below represent the specifics you need to focus on. For 

each question, refer to your Implementation Proposal (Assignment #1) for consistency. In this 

assignment you will provide technical details for Information Technology personnel.

Any example Linux commands should be properly displayed (e.g., in lower case) 

and any acronyms explained on first use (e.g., Secure Shell (SSH)).

·

How will you implement security in the Linux systems?

o

Start by outlining how you plan to migrate the existing Windows 

Servers to Linux. Ho

w will users authenticate? What technologies will be used? What 

kind of access controls will be used?

o

Will you recommend simple authentication mechanisms or employ 

multiple factors? For passwords, what policy(ies) will you recommend?

needed>

o

How will you handle data-at-rest and data-in-transit?

needed>

o

How will you enforce software installations and control which 

applications may run on the network?

·

End users have expressed some concern about completing their day-to-day tasks on 

Linux. How would activities such as email/web browsing work? How would they work 

with their previous Microsoft Office files?

o

There are several ways to address the use of existing applications. 

Conduct research to determine the available options.

o

For web browsing, you should provide at least 2 alternatives and 

consider the impact to initial configuration (bookmarks, extensions, plugins)

needed>

o

For Microsoft Office, provide a full discussion on how users will 

continue to open/edit/save office docs in the Linux environment. You should provide at 

least 2 alternatives.

·

The current Windows administrators are unsure about administering Linux systems. How

are common tasks, such as process monitoring and management, handled in Linux? 

How does logging work? Do we have event logs like we do in Windows?

o

Discuss your logging and monitoring approach in this section. You 

should include the location of specific Linux log files.

o

Discuss how admins can manage processes. It may be helpful to 

compare/contrast in familiar terms (e.g., the Windows Event Viewer). Discuss how to 

stop processes, including the corresponding commands.

·

Some folks in IT raised questions about the Linux flavor that was recommended. They 

would like to see comparisons between your recommendation and a couple of other 

popular options. What makes your recommendation the best option?

o

o

The key differentiator is …

·

How does software installation work on Linux? Can we use existing Windows software?

o

Discuss a Linux package management specific to your distro. How will

you automate updates?

o

Discuss how specific Windows applications can be installed and used,

if at all.

·

How can Linux work together with the systems that will continue to run Windows? How 

will we share files between the different system types?

o

Discuss how file and printer sharing will work. Will the users need to 

do anything “different”? What underlying technology will need to be implemented?

as needed>

Warm regards,

Go2Linux

Linux Deployment Manager

References

to be used. Ensure you utilize in-text citations in the body of your paper as appropriate.>

[1] Red Hat Enterprise, “Encryption,” Chapter 3, Section 3.1.3. Red Hat, Inc., 2019. [Online]. 

Available: https://access.redhat.com/documentation/en-s/red_hat_enterprise_linux/6/htm

l/security_guide/chap-security_guide-encryption#sect-Security_GuideLUKS_Disk_ 

Encryption. [Accessed December 1, 2019]. 

[2] TestOut Labsim, “TestOut Linux Pro,” Chapter 15, Section 15.8.3. TestOut, 2019 [Online]. 

Available: https://cdn.testout.com/client-v5-1-10-568/startlabsim.html. [Accessed 

December 6, 2019].

… and so on …

final Paper

 

For the final project, you will be conducting a forensics investigation using one of the following items:

  1. A smartphone
  2. A network (ideally, a wireless network)

 You  may use either for your investigation. However, be aware of legal  issues surrounding your data gathering. If you are using any system you  do not personally control and have authority to investigate/discover,  please get written permission from the owner/operator of the system or  refrain from your forensics analysis of that systems and use a personal  system. For a network, you can use your own personal home network. For a  smartphone, consider using an image from the Internet or a personal  device. There could be issues related to using a live, active, personal  device (example: corruption of the device). If using a personal device,  consider using an old, outdated phone, if available.

 You  will review various forensics tools used with your selected system.  Select a tool and use that tool to gather forensics data for analysis.  You are simulating the process of gathering this data, so you do not  need to investigate a compromised device or system. The project  deliverables are as follows:

 Week  7 – Prepare an investigative report of the forensics data capture  conducted using the tool selected for this purpose. The paper should  provide the following information: 

  • Executive  Summary of your investigation, including a description of the device or  systems and the tool used for the forensics analysis
  • Step-by-step description you used to gather data for analysis
  • Report on the information that was obtainable from the device
  • Graphics evidence that you conducted the forensics data gathering and analysis

 The  paper should be in a form that would be used for reporting to a court  or a law enforcement agency. Be sure to provide graphics evidence of  your forensics investigation effort (Screenshots, reports, etc.).  References should be in APA format.