​Timeline Assignment

 Timeline AssignmentInstructions

  1. Do you have the two Dr. Evil E01 images downloaded to your computer? If not, please do this.
  2. Did you already download and install Autopsy on your workstation? If not, please do this. Also, don’t forget to watch the video on using Autopsy if you are not familiar with it. Note – the tool is very intuitive so you should not have problems with it.
  3. Ingest (load) the two E01 images into Autopsy by selecting File à Add Data Source. If you are not sure what is the data source– then select the Disk Image data source and you can browse to the E01 images. 
  4. Autopsy will then process the images. This should take about 10-20 minutes.

  1. Now click on the Timeline button on top of the Autopsy GUI and then familiarize yourself with the environment before answering these questions for total of 50 points. This timeline functionality is extremely powerful so click everywhere. Check out the different options. Right click a file and see what options are existing. I think you will be able to immediately grasp the possibilities of how you can pivot to a very specific MINUTE. See sample screenshot.

Questions (100 points)

  1. What website was searched on 8-25-2004?
  2. What was search query used on that website on 8-25-2004. Please provide screenshots.
  3. What websites were visited on 8-27-2004?. Please provide screenshots.
  4.  There was email activity on 07-27-1992. What was that email activity? Please provide screenshots.
  5. You want proof that Dr. Evil used Ghostware and you think it was done in August 2004. When exactly was this? Please provide screenshots.
  6. What software / driver is keys.text associated with? Please provide screenshots.
  7. Please send me a snapshot report.

Security Architecture & design

Length:  Minimum of 600 words

Total points: 40 points

Due date: Sunday, November 29, 2020

In week #8, your midterm project was to provide a security assessment for Vestige, Inc, an online software company that specialize in selling ad spaces in their parent company’s magazine.  Vestige manages an online database that allows their customers to upload and pay for their business ads for magazine placement.  Because Vestige’s database needs to connect to the parent company’s database, the parent company has requested that Vestige system be assessed and verified as secure.

Now that you have provided your security assessment, the next step is to provide Vestige, Inc. with your Security Portfolio. Using this week’s Reading on the NIST framework that includes the 5-step process for creating a balanced portfolio of security products, your assignment will be to create a Security Portfolio with the following sections:

1. Cover Page (i.e. APA title page)

2. Background (provide a synopsis your midterm security assessment on Vestige)

3. For each security need identified (or needs to be identified) from your Week #8’s Midterm Assignment, Find the products that will deliver the needed capabilities for the right price, and tell why you chose that product.

This assignment should be about the security needs only.  Do NOT discuss how the client can achieve more business (That is not your job). Please use  APA format and include at least two references.

discussion

 

A picture is worth a thousand words” may be a lovely cliché, but it’s exactly the wrong way to view visualization. 

Reply post

For this week’s discussion, please view the Periodic Table of Visualization at the following link (http://www.visual-literacy.org/periodic_table/periodic_table.html). Choose one Data Visualization and one Compound Visualization by placing your mouse cursor over each option. Provide the class with a brief description of your choices and explain why you made your choices. Also, describe what advantage do your choices have over the others. Remember to also reply to at least two of your classmate’s posts on this questions and include all in one single thread.

Contingency Planning

Contingency planning is a risk mitigation process for developing back-up plans in anticipation of events (scenarios) that might disrupt ‘business as usual’. Business continuity planning is an expanded version of contingency planning that typically encompasses a more comprehensive and extended response plan for getting back to ‘business as usual’. In a well-formatted, highly-detailed research paper, address the need to contingency planning, ensuring to address the following items:(1) Benefits of scenario events/planning.
(2) Questions to consider when implementing scenario planning.
(3) The common types of scenario planning.Your paper should meet these requirements:

  • Be approximately four to six pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

paper and Powerpoint presentation

 

Pick one of the below operating systems and present information on the operating systems, and your thoughts comparing the selected operating system with other systems. Explain with an example for each OS mangers. You will need to submit both your presentation and project paper (10-15pages Max) and showing your references and citations.

  • Windows 
  • Linux 
  • Unix
  • Android
  • iOS

bharg research paper

 

Find a peer-reviewed scholarly journal article discussing government planning and/or entrepreneurial innovation. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use the UC library (https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles (https://scholar.google.com/ )

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

  • Be approximately 3-4 pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Discussion 4

 

in  this module, we will discuss network forensics. We move away from  cellular/smartphone discovery and look at wired and wireless  investigation. We will use the European Union Agency for  Cybersecurity’s Introduction to Network Forensics guide. The document is available at:

https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/documents/introduction-to-network-forensics-handbook.pdf

For the discussion, answer the following questions:

1) What types of network investigations are typical of those that fall under the topic of network forsensics?

2) How is information acquired from the various types of networks?

3) Describe several tools for network forensics and how the tools function? 

Your  response to the DQ must be a minimum of 400 words. You must provide  references for your response (APA format). You will need to reply to two  (2) other fellow student’s posts (See the syllabus). The responses must be made in the week due.