Digital Forensics

 

Cybercrime Law, Computer-Integrity Crime, Fraud, and Abuse.

 Preamble.

Integrity of evidence, cyber-crime, fraud, and abuse are prefaced on the assumption that computer and internet technologies are designed to make life easier for a public and private organization, the judicial system, and forensic investigators; it has, unfortunately, made life incredibly challenging and enduring in all levels of forensic investigation. Cyber-crime, fraud, abuse, are open-ended criminal operations, allowing unauthorized users to obtain information from various sources against a target organization. Naturally, criminals are endowed with extraordinary skills and expertise to break into any organization’s secured network center. Most criminal are have access automated freeware tools available on computer and Internet and breaks into the organization’s secured network system, data, assets, resources, to make forensic investigation exceedingly tricky. Most organizations and the global community are actively using computer and internet technologies to build four walls around security data storage centers, creating an opportunity for forensic investigator’s ability to produce reliable evidence. Similarly, organizations and the global defensive approach require a proactive plan of action to guide against data breach. This section examines the primary federal statutes used to prosecute cybercrime. The focus is on the Computer Fraud and Abuse Act and the statutes criminalizing identity theft, child pornography, and copyright and trademark offenses (Casey, 2011: 86-95).

Computer Fraud and Abuse Act  

The Computer Fraud and Act, Abuse is the primary source of federal law related to computer cybercrimes, and approval of the Computer Fraud and Abuse Act (CFAA) in 1986. The amendments were designed to update specific Arts provisions in light of advancements in computer and internet technologies and to address loopholes that existed in earlier versions of the Act. Criminals gaining unauthorized access to a computer, disseminating malware, launching denial of service attacks, trafficking passwords, and using computers and the internet to commit fraud. Criminals are sophisticated and can intentionally use the computer and internet technologies without authorization.   

Research Question 2:1. Develop a measurable research framework of hos computer fraud and Abuse Act (CFAA) can play a role during the forensic investigation and impact on conclusive evidence in court. 

Research Question 2:2. To what extent can the computer fraud and Abuse Act (CFAA) of 1986 empowers forensic investigation to bring cyber-crime, fraud, and abuse to justice.

 Situation 1.      

Naturally, criminals often retain extraordinary skills and expertise to break into any

organization’s secured network center. The criminal fully utilizes automated freeware

tools available on computers and the Internet and breaks into the organization’s secured network system, data, assets, resources, and makes forensic investigation exceedingly.

  • These extraordinary skills, expertise, and availability of automated freeware tools are creating a considerable obstacle against the forensic investigation process. We are the nation of law.

Question 2:3. Develop a measurable research framework of amendment items needed to strengthen the computer fraud and Abuse Act (CFAA), and expand forensic investigator authority over criminal activities.  

Digital Forensics Tools & Tchq

Find a criminal case that involved Digital Forensics. describing the case and how digital forensics were used in the investigation. 

Using WORD, write an ORIGINAL brief essay of 500 words or more.

I need at least 3 references and Turnitin Report.

Cloud_computing_week16_final

  

For this project, select an organization that has leveraged Cloud Computing technologies in an attempt to improve profitability or to give them a competitive advantage. Research the organization to understand the challenges that they faced and how they intended to use Cloud Computing to overcome their challenges. The paper should include the following sections each called out with a section header with proper APA formatting:

· Company Overview: The section should include the company name, the industry they are in and a general overview of the organization.

· Challenges: Discuss the challenges the organization had that limited their profitability and/or competitiveness and how they planned to leverage Cloud Computing to overcome their challenges.

· Solution: Describe the organization’s Cloud Computing implementation and the benefits they realized from the implementation. What was the result of implementing Cloud Computing? Did they meet their objectives for fall short?

· Recommendations: What recommendations would you provide to this organization to better accomplish the challenge(s)? This is from your opinion not someone else on the Internet.

· Conclusion: Summarize the most important ideas from the paper and also make recommendations or how they might have achieved even greater success.

Requirements:

The paper must adhere to APA guidelines including Title and Reference pages. There should be at least six (6) scholarly sources listed on the reference page (with in-text citations). Each source should be cited in the body of the paper to give credit where due. Per APA, the paper should use a 12-point Time New Roman font, should be double spaced throughout, and the first sentence of each paragraph should be indented .5 inches. The body of the paper should be 2000 words in length. The Title, Abstract, Table of Contents (if applicable), and Reference pages do not count towards the page count requirements. All references must be scholarly references (NOT WIKIPEDIA). Use one of the methods provided in residency for researching scholarly journals and websites.

DO NOT USE THE FOLLOWING COMPANIES:

· Equifax

· Any Cell Phone Company

· UBER

· Amazon

· Microsoft

· Adobe

· Capital One

· LinkedIn

· eBay

Mainframes 2.0

  • How do data transmission errors affect your perception of each? In other words, does the possibility of error influence your decision regarding which would be better?
  • What other factors would affect a company’s choice?
    2000 words 

Project Scenario 5 Lessons Learned Retrospectives

 Scenario 5: Sprint Retrospective

Before you begin this assignment, be sure you have read the “XYZ Corporation Case”. 

No comparison of the videos is required. Per Ms. Cortez, your task assignment is to execute the following steps and to develop and submit the cited summary/analysis deliverables. 

1. View Video 1 several times.

2. Summarize the key content of Video 1 and state its provided definition of Agile retrospectives. Also, include a reminder about any related content important to XYZ Corporation that is not included in the video.

3. View Video 2 several times.

4. Summarize the key content of Video 2 and state each of the wrong ways dramatized in the video. For each wrong way included in the video, state the corresponding right way, and provide a brief description of the right way in the XYZ Agile environment. 

5. View Video 3 several times.

6. List each mistake and tip included in the Video 3, and elaborate on each mistake and tip in 1-2 sentences. Cite which tips you think are most important for XYZ Corporation. Cite which tips you think are least important for XYZ Corporation. Also cite one additional tip not included in the video that we want to nonetheless emphasize at XYZ Corporation.

7. Watch Video 4 several times.

8. Summarize the key content of Video 4. Be sure to address: 1) what to keep as is (“like”); and 2) what to improve (“don’t like”) for the next Sprint, as well Mr. Southerland’s concept of “the one thing” to emphasize. After your initial summary, include 3 representative examples of items that may come up in a retrospective in the category of what to keep as is and the category of what to improve.