Digital Forensics

  

Digital forensics involves processing data from many different types of devices, ranging from desktops to laptops, tablets to smartphones, servers to cloud storage, and even devices embedded in automobiles and aircraft. In this project, you will focus on the architecture and imaging of desktop and laptop computers. You will be working in a virtual machine (VM) to image and verify the contents of the following:

  • a USB stick
  • the random access memory (RAM) and      swap space of a live computer
  • a networked computer hard drive

There are seven steps in this project. In the first step, you will review a technical manual containing information about where data of forensic value is typically found inside digital devices. The next two steps will guide you through the process of imaging a USB stick with both Linux and Windows tools. The next step will pose several questions that frequently come up in cases similar to this scenario. In the next step, you will be back to collecting forensic evidence; this time you will be imaging the RAM (memory) and swap space of a live, running computer. In the next step, you will image a computer’s hard drive over the network. In the final step, you will compile all lab notes and reports into one comprehensive report. The final assignment in this project is a forensic imaging lab report that can be presented in a court of law.

Before you can begin imaging the USB drive provided by your supervisor, you need to review your technical manual in order to prepare a memo to give to your company’s legal team. Are you ready to get started?

S1

Before you have a chance to begin the imaging process, your supervisor calls to tell you that the organization’s legal team has been asking questions about types, sources, and collection of digital information. Team members have also asked about file formats. Your supervisor asks you to prepare a brief explanatory memo. You use the department’s technical manual to compose your memo on finding valuable forensic information and storing digital evidence. You also review image verification using hashing, an important component of digital forensics. 

For the first step in this project, prepare a memo (one to two pages in length following this format) in plain language that summarizes where valuable digital forensic information resides in the device, as well as collection and storage options. The devices to be addressed are USB sticks, RAM and swap space, and operating system hard disks. You will need to research and cite reference sources for each answer contained your memo (e.g., NIST) For each electronic media device described, include a short description of the following:  

  • identify the digital media device      examined 
  • types of data that can be found      there 
  • reasons why the data has potential      value to an investigation in general, and for this case in      particular 
  • list the possible digital evidence      storage formats (raw, E01 (ewf), and AFF) and describe the advantages and      disadvantages of each format, and  
  • how digital forensic images are      collected (local and remote, memory and disk) and verified.  

Your memo will be included in the final forensic imaging lab report. 

 In the first step in this project, you reviewed technical information and imaging procedures and briefed your legal team on digital forensic basics. Now, it’s time to move forward with the investigation. 

The USB stick may contain intellectual property that you can use to prove the suspect’s guilt, or at least establish intent. Security personnel recovered the stick from the suspect’s desk drawer the night before. You take possession of the stick, recording the physical exchange on the chain-of-custody document prepared by the security officers.  

Your team’s policy is, when practical, to use multiple tools when conducting digital forensic investigations, so you decide to image the USB stick using both Linux and Windows tools. 

To get started, review the lab instructions in the box below, as well as methods of acquisition. Then go to the virtual lab to set up your evidence drive and proceed to enable write protection, sterilize the target media, perform a static acquisition of Linux data, and verify the USB stick on the sterilized media using Linux tools in preparation for the report and notes requested by your supervisor. 

Windows Tools

After imaging the USB drive with Linux in the previous step, your next step is to image the USB drive again, this time using Windows tools. Review the lab instructions in the box below, and then go to the virtual lab. When you complete the activity, review your lab notes and report for accuracy and completeness; they will be included in your final forensic imaging lab report in the final step.

n previous steps, you imaged the USB drive using Linux and Windows tools. In this step, you will create a legal memorandum that responds to pointed questions from your organization’s legal team. The legal team has been involved in cybercrime cases before, but team members want to make sure they are prepared for possible legal challenges. They have requested very specific information about imaging procedures based upon your review of reference sources in the field.

Research sources on digital forensics imaging and mounting procedures before writing your response. Then review Set Up Your Evidence Drive, Hash Functions, Imaging Programs, and Image Verification With Hashing as needed.

Questions from the legal team:

1. Assuming that this is a criminal case that will be heard in a court of law, which hashing algorithm will you use and why?

2. What if the hash of your original does not match your forensic copy? What kinds of issues could that create? What could cause this situation?

3. What if your OS automatically mounts your flash drive prior to creating your forensic duplicate? What kinds of problems could that create?

4. How will you be able to prove that your OS did not automatically mount your flash drive and change its contents prior to the creation of the forensic copy?

The legal team would like you to respond in the form of a brief memo (one to two pages following this format) written in plain, simple English. The memo will be included as an attachment to your final forensic imaging lab report in the final step, so review it carefully for accuracy and completeness.

You are hoping that you will be able to access the suspect’s local computer next.

n the previous step, you addressed the concerns of your company’s legal team. While you were doing so, the suspect’s afternoon training session started, so now you can move to the next stage of your investigation.

Your organization’s IT department backs up the hard drives of HQ computers on a regular basis, so you are interested only in the suspect’s RAM (referred to as volatile data storage) and swap space. The RAM and swap space may reveal programs used to hide or transmit intellectual property, in addition to the intellectual property itself (past or current). You have a four-hour window to acquire the RAM and swap space of his live computer. When you arrive at the suspect’s office, the computer is running, but locked. Fortunately, the company IT department has provided you with the administrator password, so you log on to the system. Review the lab instructions in the box below, and then go to the virtual lab. Follow the steps required to acquire and analyze the RAM and swap space and perform imaging of a live computer.

In the previous step, you acquired and analyzed the RAM and swap space from the suspect’s live, local computer. In this step, you perform a similar analysis on his networked, off-site computer. Take a minute to consider forensic evidence in networks.

Your supervisor confirms that the suspect’s remote office is closed for the weekend, so you are free to image his computer via the network to store the digital evidence. The remote computer is locked, but the company IT department has provided an administrator password for your investigation. Using your forensic workstation at headquarters, you log on to the remote system.

If the image were going to pass unencrypted over an untrusted network (such as the internet), you’d would want to conduct the transfer over SSH, but since you’re on the company network and connecting to the remote office via a VPN, you can use the dd command to transfer a copy of the remote hard drive to your local workstation using the netcat tool.

Review the lab instructions in the box below, and then go to the virtual lab. Follow the steps required to image the computer over the network.

Provide any information related to the issue that you are experiencing and attach any screenshot that you may be able to produce related to the issue.

Review your lab notes and report carefully for accuracy and completeness; they will be included in your final forensic imaging lab report.

Phew! You have conducted an exhaustive investigation of all the suspect’s computer devices in this possible “insider cyber-crime.” In the process, you have written up lab notes and four reports, as well as providing responses to questions from your legal team. The last step in the investigative process is to combine the information that you’ve gathered into a single forensic report that can be presented in a court of law.

Step 7

Now that you’ve completed the necessary acquisition and imaging tasks, you’re ready to compile all your reports and lab notes into a single forensic imaging lab report that you will submit to your supervisor. Your supervisor reminds you that your report may be presented in a court case, so it needs to meet legal requirements. The report should include the following sections:

1. One- to two-page memo addressing the types, sources, collection of digital information, as well as file formats

2. Imaging of a USB drive using Linux tools (lab notes, report)

3. Imaging of a USB drive using Windows tools (lab notes, report)

4. One- to two-page memo responding to questions about imaging procedures

5. RAM and swap acquisition—live, local computer (lab notes, report)

6. Forensic imaging over a network (lab notes, report)

Submit your forensic imaging lab report to your supervisor (instructor) for evaluation

rpaper

Considering the importance of data in organization, it is absolutely essential to secure the data present in the database. What are the strategic and technical security measures for good database security? Be sure to discuss at least one security model to properly develop databases for organizational security. Create a diagram of a security model for your research paper.

Your paper should meet the following requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Wk 2 – Apply: Configuring and Deploying a Private Cloud with System Center 2012

 

he director of IT has indicated that the Board of Directors is compiling a corporate portfolio on ethics and has asked all departments to contribute information on how a code of ethics impacts daily decisions. The director of IT has asked for you to help by providing an example.

Using the links provided, research at least 2 of the following codes of ethics:

Write a 1- to 2-page ethical choice example using Microsoft® Word. Complete the following in your document:

  • Reflect on ethical considerations for each type of data involved (e.g., Active Directory user information, reporting information,logs). Explain how to apply your knowledge of ethical theories to decisions you would make as a security administrator for System Center 2012.
  • Select 2 of the codes of ethics you researched and quote the items you would use in your corporate code of ethics. Explain how they would help you implement ethical choices when working as an administrator of System Center 2012 Active Directory user information, reporting information, and logs.

Cite any references to support your assignment.

Format your assignment according to APA guidelines.

Submit your assignment.

C++ coding lab task

Write a Program to calculate:
1) Kinetic Energy
2) Potential Energy
3) Total Energy
Requirement for this assignment includes the use of at least 3 Programmer Defined Functions, with at least one of the functions using PASS BY REFERENCE Parameters. 
Please DO NOT  use global variables unless specified.
But can use global constant to store “acceleration due to gravity”.
 
Formula & Explanation for these three are as follows:
Screen Shot 2020-03-25 at 11.01.03 PM.png
Screen Shot 2020-03-25 at 11.02.51 PM.png
For Kinetic Energy:
Mass is in “kg”
Velocity is in “m/s”
 
For Potential Energy:
Mass is in “kg”
Height is in “m”
Gravitational Acceleration is going to be considered as constant for the purpose of the program ie 9.81
 
Sample Output:
1)
Please enter mass in kg, for calculation of Kinetic Energy :2                                                                          
Please enter velocity in m/s, for calculation of Kinetic Energy :5                                                                     
Kinetic Energy in Joule is: 25                                                                                                         
                                                                                                                                       
Please enter mass in kg, for calculation of Potential Energy :5                                                                        
Please enter height in meters, for calculation of Potential Energy :2                                                                   
Potential Energy in Joule is: 98.1      
                                                                                                       
Total Energy is :123.1     
2)
Please enter mass in kg, for calculation of Kinetic Energy :2                                                                          
Please enter velocity in m/s, for calculation of Kinetic Energy :2                                                                     
Kinetic Energy in Joule is: 4                                                                                                          
                                                                                                                                       
Please enter mass in kg, for calculation of Potential Energy :2                                                                        
Please enter height in meters, for calculation of Potential Energy :2                                                                   
Potential Energy is: 39.24         
                                                                                                    
Total Energy in Joule is :43.24 
3)
Please enter mass in kg, for calculation of Kinetic Energy :10                                                                         
Please enter velocity in m/s, for calculation of Kinetic Energy :10                                                                    
Kinetic Energy in Joule is: 500                                                                                                        
                                                                                                                                       
Please enter mass in kg, for calculation of Potential Energy :10                                                                       
Please enter height in meters, for calculation of Potential Energy :10                                                                  
Potential Energy is: 981                    
                                                                                           
Total Energy in Joule is :1481
 
Note: Here is a link to understanding the concept of Kinetic Energy & Potential Energy, in case some one wants/needs to look at it.
https://www.mathsisfun.com/physics/energy-potential-kinetic.html
 
Point Distribution:
-50 Does not compile
-5 Warnings
-5 No description multiple line comments (name, date, etc)
-5 No single line comments (logic, input, output, etc)
-10 Kinetic Energy
-10 Potential Energy
-10 Total Energy
-10 Does not use at least 3 programmer defined functions
-10 Does not use at least 1 reference parameter

Create summary tables that address relevant factors related to COVID-19

COVID-19 Open Research Dataset Challenge (CORD-19)

An AI challenge with AI2, CZI, MSR, Georgetown, NIH & The White House

(1) FULL-LENGTH PROJECT

Dataset Description

In response to the COVID-19 pandemic, the White House and a coalition of leading research groups have prepared the COVID-19 Open Research Dataset (CORD-19). CORD-19 is a resource of over 44,000 scholarly articles, including over 29,000 with full text, about COVID-19, SARS-CoV-2, and related coronaviruses. This freely available dataset is provided to the global research community to apply recent advances in natural language processing and other AI techniques to generate new insights in support of the ongoing fight against this infectious disease. There is a growing urgency for these approaches because of the rapid acceleration in new coronavirus literature, making it difficult for the medical research community to keep up.

Call to Action

We are issuing a call to action to the world’s artificial intelligence experts to develop text and data mining tools that can help the medical community develop answers to high priority scientific questions. The CORD-19 dataset represents the most extensive machine-readable coronavirus literature collection available for data mining to date. This allows the worldwide AI research community the opportunity to apply text and data mining approaches to find answers to questions within, and connect insights across, this content in support of the ongoing COVID-19 response efforts worldwide. There is a growing urgency for these approaches because of the rapid increase in coronavirus literature, making it difficult for the medical community to keep up.

A list of our initial key questions can be found under the Tasks section of this dataset. These key scientific questions are drawn from the NASEM’s SCIED (National Academies of Sciences, Engineering, and Medicine’s Standing Committee on Emerging Infectious Diseases and 21st Century Health Threats) research topics and the World Health Organization’s R&D Blueprint for COVID-19.

Many of these questions are suitable for text mining, and we encourage researchers to develop text mining tools to provide insights into these questions.

In this project, you will follow your own interests to create a portfolio worthy single-frame viz or multi-frame data story that will be shared in your presentation. You will use all the skills taught in this course to complete this project step-by-step, with guidance from your instructors along the way. You will first create a project proposal to identify your goals for the project, including the question you wish to answer or explore with data. You will then find data that will provide the information you are seeking. You will then import that data into Tableau and prepare it for analysis. Next, you will create a dashboard that will allow you to explore the data in-depth and identify meaningful insights. You will then give structure to your data story by writing the story arc in narrative form. Finally, you will consult your design checklist to craft the final viz or data story in Tableau. This is your opportunity to show the world what you’re capable of – so think big, and have confidence in your skills!

Kaggle Website:

https://www.kaggle.com/allen-institute-for-ai/CORD-19-research-challenge

Assignment Length (word count): at least 15 pages.

References: At least 10 peer-reviewed, scholarly journal references.

Aritifical Intelligence and Business

The theme of this research paper is Artificial Intelligence (AI) and Business. For this

assignment, you must think about the future of business, considering current trends toward

automation of business processes. You must research current trends and summarize your

research as a report. The general structure of the report is as follows

An introductory section about current technological trends providing context for your

report;

2. A description of select applications of AI to business (minimum 3) in one particular business area Have particularly

business areas (of your interest) in mind (e.g., HR, Marketing and Sales, Finance,

Operations). You must also describe and analyze these technologies based on their

potential to be game changers;

3. The challenges for such applications to become widespread and beneficial to

companies;

4. A conclusion section (with your takeaway from the discussion).

To write the report you will need to cover at least the following:

1. Your report must adhere to APA formatting;

2. You must research at least 5 recent (i.e., less than 10 years) peer-reviewed articles.

Exceptionally, highly regarded industry sources (e.g., IBM, Oracle, SAP, McKinsey,

Accenture, Deloitte, Capgemini) will be accepted;

3. Other than APA formatting, the structure for the paper is not fixed, if there is a logical

flow of ideas. The length of the paper is not an issue and maximum should be 5-6 pages

SEC 575

1. The federal government regulates labels, warranties, and consumer products. Without government regulation, what abuses are likely to occur?

2. Compare the minimum contacts test, as it is applied to the bricks-and-mortar activity of businesses, to their cyberspace activity. If you were a small business, seeking to sell to customers located in other states, what are some things you could do to avoid having states where these customers live require you to collect sales tax?

3. The EU has recently changed its trade laws and now refuses, among member nations, to enforce choice of forum clauses when a consumer is a purchaser. How might this refusal to enforce choice of forum clauses impact websites within the EU?

report paper

i need a report paper 8 pages in length double-spaced, using font size 11 point. The report can be of one of the three forms:

1. a survey;
2. description of your design and implementation of a security approach (original ideas preferred);
3. your practical experience on a particular security topic.

 the report should be about security and ethics including a references. be sure to summarize, rephrase instead of directly “copy” 

Try to make your report organized; you can divide your articles into several sections such as overview, design and implementation, discussion, related work and conclusion.

Eclipse Project Javascript

 

Using the concepts from the Concurrency Basics Tutorial I provided in Modules, write a program that consists of two threads. The first is the main thread that every Java application has. The main thread should create a new thread from the Runnable object, MessageLoop, and wait for it to finish. If the MessageLoop thread takes too long to finish, the main thread should interrupt it. Use a variable named maxWaitTime to store the maximum number of seconds to wait. The main thread should output a message stating that it is still waiting every half second.

The MessageLoop thread should print out a series of 4 messages. These messages should be numbered, as in the example below. It should wait 850 milliseconds between printing messages to create a delay.  If it is interrupted before it has printed all its messages, the MessageLoop thread should print “Message loop interrupted” and exit. Or you can let main print “Message loop interrupted”.

Your program must demonstrate that it can both output messages and interrupt the message output. To do this, place the body of main into a for loop using maxWaitTime as the index. As in the following example, it should finally output all 4 messages in the last iteration.

So in main your code will be

for (int maxWaitTime = 1;  maxWaitTime <= 4;  maxWaitTime++) {

// All of main’s processing goes here (Note that it does not say some, it says all).

}

Sample output :

maxWaitTime: 1 second(s)
main : Starting MessageLoop thread
main : Waiting for MessageLoop thread to finish
main : Continuing to wait…
main : Continuing to wait…
Thread-0 : 1. All that is gold does not glitter, Not all those who wander are lost
main : MessageLoop interrupted
maxWaitTime: 2 second(s)
main : Starting MessageLoop thread
main : Waiting for MessageLoop thread to finish
main : Continuing to wait…
main : Continuing to wait…
Thread-1 : 1. All that is gold does not glitter, Not all those who wander are lost
main : Continuing to wait…
main : Continuing to wait…
Thread-1 : 2. The old that is strong does not wither, Deep roots are not reached by the frost
main : MessageLoop interrupted
maxWaitTime: 3 second(s)
main : Starting MessageLoop thread
main : Waiting for MessageLoop thread to finish
main : Continuing to wait…
main : Continuing to wait…
Thread-2 : 1. All that is gold does not glitter, Not all those who wander are lost
main : Continuing to wait…
main : Continuing to wait…
Thread-2 : 2. The old that is strong does not wither, Deep roots are not reached by the frost
main : Continuing to wait…
main : Continuing to wait…
Thread-2 : 3. From the ashes a fire shall be woken, A light from the shadows shall spring
main : MessageLoop interrupted
maxWaitTime: 4 second(s)
main : Starting MessageLoop thread
main : Waiting for MessageLoop thread to finish
main : Continuing to wait…
main : Continuing to wait…
Thread-3 : 1. All that is gold does not glitter, Not all those who wander are lost
main : Continuing to wait…
main : Continuing to wait…
Thread-3 : 2. The old that is strong does not wither, Deep roots are not reached by the frost
main : Continuing to wait…
main : Continuing to wait…
Thread-3 : 3. From the ashes a fire shall be woken, A light from the shadows shall spring
main : Continuing to wait…
Thread-3 : 4. Renewed shall be blade that was broken
main : Done!

Your class must be in a package named mypackage and be named Concurrency, as explained in last week’s videos. It should be contained in 1 and only 1 source file.

Include your name at the top of the source file.

Upload Concurrency.java