Digital Forensics

Computer Forensics, also known as Digital Forensics, is a scientific examination by a certified computer forensic specialist, which includes the identification, collection, preservation, and analysis of all forms of Electronically Stored Information (ESI). What is CoC (Chain of Custody) and why is it important for evidence integrity? What are the common situations in which forensics are used? How a forensic investigation is typically approached? Are there any actions that should be avoided during an investigation? Please explain. 

Assignment 2

 Complete a Physical Security Assessment (internal and external) of your place of work or living area.  If you use your work area make sure you inform the Security Manager to get permission as to what you are doing. If you live in a gated community inform the security guard of your activities. Refer to your text on the importance of Lighting and Access Control and be sure to cover the salient issues discussed in the text. 

Software Methodology

1. Briefly address the goal of software methodology.

2. Briefly explain the fundamental difference between project-based and product-based software engineering. 

3. If that is a must to develop a prototype before you start developing a new software product? 

4. As you develop software system, there are 3 common models (Waterfall, Incremental, and Integration & Configuration) and 4 fundamental phases (Software Specification, Development, Validation, and Evolution), is that a standard or just an example with flexibility that can be modified according to physical need?

As you join this section’s discussion, you will collect points. The extra points you collected will definitely be counted.

5. What are the 4 V characteristics of Big Data ? 

6. Please describe the common characteristics for the operational data sources 

Data visualization-18hr

Select any example of a visualization or infographic, maybe your own work or that of others. The task is to undertake a deep, detailed ‘forensic’ like assessment of the design choices made across each of the five layers of the chosen visualization’s anatomy. In each case your assessment is only concerned with one design layer at a time.For this task, take a close look at the annotation choices:

  1. Start by identifying all the annotation features deployed, listing them under the headers of either project or chart annotation
  2. How suitable are the choices and deployment of these annotation features? If they are not, what do you think they should have been?
  3. Go through the set of ‘Influencing factors’ from the latter section of the book’s chapter to help shape your assessment and to possibly inform how you might tackle this design layer differently
  4. Also, considering the range of potential annotation features, what would you do differently or additionally?

Submit a two-page document answering all of the questions above.  Be sure to show the visualization first and then thoroughly answer the above questions. Ensure that there are at least two-peer reviewed sources utilized this week to support your work.

analyze 3.3

 

Take the assignment from the previous week, add at least twice as much data to the data sets.  Note how this impacted the results from the previous week.  Be sure to have a visualization to show the initial results and the new results. Use graphs to present your results. Be sure to explain why the results are different or similar from last week.

Use RStudio to generate a word document with simple graphs of the following dataset:    dataset_price_personal_computers.csv  

Provide full screenshots and explanations of how the tasks were completed.

Your graphs must contain pie chart, bar chart, histograph, scatter plot, and box plot.

Must use the template provided in Week 1 (sample paper)

Business process in a specific industry.

 Discussion Question #1: Some say that analytics in general dehumanize managerial activities, and others say they do not. Discuss arguments for both points of view. Discussion Question #3: What are some of the major privacy concerns in employing intelligent systems on mobile data? Discussion Question #4: identify some cases of violations of user privacy from current literature and their impact on data science as a profession. Exercise #2: Search the Internet to find examples of how intelligent systems can facilitate activities such as empowerment, mass customization, and teamwork. Write a report.

Snort

  

1. Introduction 

a. What is snort? 

i. Creation & history 

1. Created in 1998 

2.Martin Roesch 

3.Pcap origin 

4.Cisco Acquisition 

ii. Value to network admins 

1. Open-source nature 

2.Consistent rule updates 

1. Overview of important features 

a. Traffic monitoring 

a. Packet Logging 

a. OS fingerprinting