+1 (208) 254-6996 essayswallet@gmail.com
  

D2 : 

 Consider, in 500 words, how business processes as services can improve efficiency. This discussion is about business process as a service and security 

 Use at least three sources. Use the Research Databases available from the Danforth Library not Google.   Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes. 

D3:

 In 500 words , consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics. 

 Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes 

D4:

Discuss, in your own words using 500 words or more, how virtualization may create it’s own security vulnerabilities.  

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes.

D5:

 Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC. 

 Use at least three sources.   Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.  Stand alone quotes will not count toward the 3 required quotes. 

D6:

Compare and evaluate in 500 words or more qualitative v quantitative risk assessment.  

Use at least three sources. Use the Research Databases available from the Danforth Library not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list.  Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs.   Stand alone quotes will not count toward the 3 required quotes. 

D2: Digital Foreniscs

Do a bit of research on-line. Find a criminal case that involved Digital Forensics. 

Using WORD, write an ORIGINAL brief essay of 600 words or more describing the case and the how digital forensics were used  in the investigation. 

Chapter 1

The Anatomy of a Digital Investigation

1

Types of Investigation

Criminal

Government agency is the plaintiff

Accused is the defendant

Civil

A dispute between two entities (public or private)

Either side can be the plaintiff or defendant

More Investigation Types

Internal

An inquiry held within the confines of an organization (civil or federal) that is not meant for public review

May or may not be civil or criminal, but assume it could

The Basic Model (Kruse and Heiser)

Assess

Acquire

Analyze

Report

The Casey Model

Revision of the basic model by Eoghan Casey

Identification/Assessment

Collection/Acquisition

Preservation

Examination

Analysis

Reporting

Thurston, Michael (TM) – Some of this text is very small for a slide. Can you replace some of the smaller fonts?

Identification/Assessment

Define the scope of the examination

Collect all legal documentation needed

Get any permissions required for resources not covered by warrants

Identify the tools required

Identify the personnel needed

Identify the stakeholders

Collection/Acquisition

Collection methods must assure:

Data is authentic

Sources of data are reliable

Nothing was modified throughout the process

All tools used are valid

Personnel are qualified to do their jobs

Enough evidence exists to prove a point

Conclusions are valid

Preservation

NEVER work on original data sources

Forensically sound copies must be identical to originals

Media used to store copies must be uncontaminated

A chain of custody must be maintained

Examination

All possible sources of data must be examined

File system

Slack space

Unallocated space

Hidden partitions

All tools used must be tested and verified

Analysis

People other than the investigator may be called upon to examine data

Technique is as critical as the tools used

Exculpatory evidence is as critical as incriminating evidence

Reporting

Actually begins when the assignment is accepted

First response documentation

Case documentation

Process documentation

Analysis and conclusion

Understanding Scope

Defines precisely what can be searched and what is being looked for

Can vary with the type of investigation

Must never be exceeded

The Stakeholders

Principles (accused and accuser)

Decision makers

Mediator

Regulators

Management

Process owners

Documentation

General case documentation

Procedural documentation

Process documentation

Timelines

Case timeline

Process timeline

Chain of custody

Case Documentation

Contact information for everyone involved

First response documentation

Notes

Photographs

Videos

All legal authorizations

Procedural Documentation

Every task that was performed related to the investigation (not process)

Summary of events

List of equipment seized

What steps were taken and what tools were used

Detailed analysis of the data

Process Documentation

User manuals

Installation manuals

README files

Update history logs

Results of testing

Timeline

Case timeline

Systematic analysis of what transpired

Times and dates of related events

MAC data of files involved

Procedural timeline

Detailed list of steps taken

Times and dates each step began and ended

Chain of Custody

Begins when evidentiary materials are first seized

Time and date taken

From whom and where

Complete description of each item

Every time an item changes hands, time, date and people involved

There can be no gaps in history