Premium Essay

Cis 417 Week 4 Assignment 2 Forensic Lab Design

In: Business and Management

Submitted By activitymode
Words 640
Pages 3
CIS 417 WEEK 4 ASSIGNMENT 2 FORENSIC LAB DESIGN
To purchase this visit here: http://www.activitymode.com/product/cis-417-week-4-assignment-2-forensic-lab-design/ Contact us at:
SUPPORT@ACTIVITYMODE.COM
CIS 417 WEEK 4 ASSIGNMENT 2 FORENSIC LAB DESIGN
Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization.
Write a four to five (4-5) page paper in which you:
1. Explicate the steps you would take to plan a budget for the lab, keeping in mind the general business objective to avoid unneeded costs.
2. Recommend the physical requirements and controls that you would consider implementing in order to keep the lab safe and secure.
3. Identify at least three (3) hardware and software tools that you would include in the design of the lab and explain your reasons behind your choices.
4. Identify the high-level criteria that would be considered when selecting the forensic workstations to be utilized.
More Details hidden…
Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 4 Assignment 2 Forensic Lab Design in order to ace their studies.
CIS 417 WEEK 4 ASSIGNMENT 2 FORENSIC LAB DESIGN
To purchase this visit here: http://www.activitymode.com/product/cis-417-week-4-assignment-2-forensic-lab-design/ Contact us at:
SUPPORT@ACTIVITYMODE.COM
CIS 417 WEEK 4 ASSIGNMENT 2 FORENSIC LAB DESIGN
Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization.
Write a four to five (4-5) page paper in which you:
1. Explicate the steps you would take to plan a budget for the lab, keeping…...

Similar Documents

Free Essay

Week 2 Lab #4 Assessment

...ISSC362: IT Security: Attack & Defense 14 Apr 2013 Lab #4 – Assessment Worksheet 1. Phase 1—Reconnaissance, Phase 2—Scanning, Phase 3—Gaining Access, Phase 4—Maintaining Access, Phase 5—Covering Tracks 2. Zenmap does an intense scan of all TCP ports in order to find open and vulnerable ports. 3. Phase 1 Reconnaissance 4. This is referred to by many names, but typically just called a vulnerability scan. Can be done with tools such as Nessus or Microsoft baseline security analyzer. 5. MS04-022: Microsoft Windows Task Scheduler Remote Overflow (841873), MS04-012: Cumulative Update for Microsoft RPC/DCOM (828741), MS03-043: Buffer Overrun in Messenger Service (828035), MS06-035: Vulnerability in Server Service Could Allow Remote Code Execution (917159), MS06-040: Vulnerability in Server Service Could Allow Remote Code Execution (921883), MS09-001: Microsoft Windows SMB Vulnerabilities Remote Code Execution (958687), MS03-039: Microsoft RPC Interface Buffer Overrun (824146), MS04-011: Security Update for Microsoft Windows (835732), MS04-007: ASN.1 Vulnerability Could Allow Code Execution (828028), MS05-027: Vulnerability in SMB Could Allow Remote Code Execution (896422), MS05-043: Vulnerability in Printer Spooler Service Could Allow Remote Code Execution (896423), MS03-026: Microsoft RPC Interface Buffer Overrun (823980), MS08-067: Microsoft Windows Server Service Crafted RPC Request Handling Remote Code Execution (958644), MS02-045: Microsoft Windows SMB Protocol......

Words: 343 - Pages: 2

Premium Essay

Week 4 Assignment 2

...Assignment 2: Scope and Time Management By: Joshua Roberts CIS 517: IT Project Management Dr. Reddy Urimindi February 2, 2014 Scope and Time Management Summarize how this activity improves the chances of your future IT project being a success. Given that the IT project in scope, i.e. installation of 10 wireless access points in the company is a complex undertaking that would impact a lot of stakeholders and also incur a lot of company resources, it is very essential that it is done in an effective and efficient manner. Also, given that the scope of this project spans across different departments, and would go on for about three months, there needs to be very high degree of coordinated efforts, aided by regular and effective communication that would ensure that the project is a success (Project Management Certification, n.d). The creation of a WBS allows the company both these points above, by bringing in structure to project planning and execution and providing very good visibility on what is to be performed and achieved in order to execute the project effectively. This essentially translates into the project teams and sponsors having a good view on the schedule estimates, and also to effectively manage the schedule to ensure that the project gets completed on time. The activity of creating a project plans ensures that the project team has given enough though to all the key areas, and is well prepared to execute the project, thus enabling complex tasks to be broken......

Words: 340 - Pages: 2

Free Essay

Digital Forensics Lab 4

...CCSI 410 Forensic Lab Report 1) Investigator’s Name: 2) Date of Investigation: August 2, 2014 3) Lab Number and Title: Lab 4 Keyword Searches 4) Summary of Findings: I did the steps required to fulfill my report. I found there is enough evidence to continue the investigation due to the search results. 5) Details of Investigation 1. 11.45 pm – Turned on suspect computer 2. 11: 47 pm – Entered lab environment 3. 11: 49 pm – Determined keyword list 4. 11:59 pm – Added the floppy image 5. Augest 3rd 12:05 am – Added keywords to the search utility 6. 12:09 am – Initial look at .emi files and addressbook.csv complete 7. 12:11 am – Search using keywords 8. 12:15 am – Completed report 6) Please type the answers to the questions found throughout the lab here. 1. Bid rigging is well rigging a bid so that a certain firm will win the bid. http://www.ftc.gov/tips-advice/competition-guidance/guide-antitrust-laws/dealings-competitors/bid-rigging Bid Rotation is when bidding is predetermined which firm is going to win and the other firms involved in the process get something out of it as well so basically a win-win situation for all involved parties. Bid suppression is where firms can enter the bid but choose to not do so in order to let another firm win. Bid cover is when the firms making the bid knows their bid will be rejected so that another firm will the bid. 2. There are many words and......

Words: 579 - Pages: 3

Premium Essay

Cis 510 Week 9 Assignment 4

...A++PAPER;http://www.homeworkproviders.com/shop/cis-510-week-9-assignment-4/ CIS 510 WEEK 9 ASSIGNMENT 4 CIS 510 Week 9 Assignment 4, CIS 510 Week 9 Assignment 4 – Strayer Assignment 4: Diversity of Approaches Due Week 9 and worth 150 points According to the textbook, there are at least two (2) approaches to the SDLC, two (2) approaches to software construction and modeling, and many techniques and models. The following could be possible reasons for such a diversity of approaches: The field is young. The technology changes quickly. Different organizations have different needs. There are many types of systems. Developers have widely different backgrounds. Write a two to three (2-3) page paper in which you: Analyze each reason listed above as a reason for a diversity of approaches to software construction and modeling, and give your opinion on whether or not each reason is valid. Propose at least one (1) additional reason why you believe such diversity of approaches exists. Provide support for your recommendation. Use at least three (3) quality resources outside of the suggested resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any......

Words: 339 - Pages: 2

Premium Essay

Cis 524 Week 4 Case Study 2

...A++PAPER;http://www.homeworkproviders.com/shop/cis-524-week-4-case-study-2/ CIS 524 WEEK 4 CASE STUDY 2 CIS 524 Week 4 Case Study 2, CIS 524 Week 4 Case Study 2 Case Study 2: Design Process Due Week 4 and worth 90 points You have recently started your own software design company. You discover that your local DMV is looking to build a system that will allow receptionists to check customers in quickly. They would like for the system to allow customers to self-check-in during busy times, but have receptionists check customers in the rest of the time. Your company puts a bid in for the project and wins. Read the article located at http://www.bcs.org/upload/pdf/ewic_hc07_lppaper18.pdf. Write a four to five (4-5) page paper in which you: 1. Suggest the prototyping technique you would use for this system and support your rationale. 2. Create a management plan containing eight to ten (8-10) stages for proper design of such a system. 3. Explain each stage of the management plan and justify your rationale. 4. Estimate the length of time it will take to complete each stage of the management plan. 5. Compare and contrast the self-check-in interface with the interface a receptionist would use. 6. Use Microsoft Visio or an open source alternative, Dia, to create a total of two (2) graphical representations of your proposed interfaces, one (1) for the self-check-in and one (1) for the receptionist. Note: The graphically depicted solution is not......

Words: 466 - Pages: 2

Free Essay

Cis 524 Week 9 Assignment 4

...A++PAPER;http://www.homeworkproviders.com/shop/cis-524-week-9-assignment-4/ CIS 524 WEEK 9 ASSIGNMENT 4 CIS 524 Week 9 Assignment 4, CIS 524 Week 9 Assignment 4 Assignment 4: User Frustration Due Week 9 and worth 80 points The quality of the user experience is very important to the success of an application. In the early days of computing, users often experienced long delays since computing power was poor and networks had comparatively slow throughput. Modern systems have largely eliminated these delays due to increased network and computing power, yet users still report a high level of frustration. Write a four to five (4-5) page paper in which you: 1. Describe three (3) reasons users are still frustrated with modern applications. 2. Suggest one (1) method for reducing the frustrations for each of the reasons you supplied in Question one (1). 3. Describe methods for determining if user frustration is caused by poor system design or from the natural frustration associated with learning a new software product. 4. Suggest at least three (3) methods to reduce the frustrations among the disabled population and how this population can be better served. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all......

Words: 350 - Pages: 2

Premium Essay

Cis 331 Week 4 Case Study Assignment

...CIS 331 Week 4 Case Study Assignment http://hwguiders.com/downloads/cis-331-week-4-case-study-assignment CIS 331 Week 4 Case Study Assignment There are many possibilities you can take when dealing with an SS. A SRS is basically an organization understands of the customer or potential client’s system requirements and dependencies at a particular point in time prior to any actual design or even change development work. This is known as a two-way insurance policy that makes sure that both the client and the organization understand the other’s requirements from a certain perspective at a given point in time. In this essay I will create a SRS of a hotel managements system. I will also give you examples of an SRS and explain things such as the description, the function, and the specifications. User & System Requirements With this system come user requirements. These are certain requirements that will help gain access to the SRS for the hotel. It will also be broken down into specific categories. For example; the software that will most likely be used is the oracle. While some of the user requirements will be login credentials, reservations, check ins, payments and room service. The external requirements will include things such as a computer or laptop, keyboard, mouse, and a printer. As for the hardware requirements, this system will most likely be running on windows by Microsoft. Functional and Nonfunctional Requirements Most of the functional requirements...

Words: 267 - Pages: 2

Free Essay

Cis 525 Week 2 Assignment 1

...CIS 525 WEEK 2 ASSIGNMENT 1 A+ Graded Tutorial Available At: http://hwsoloutions.com/?product=cis-525-week-2-assignment-1 Visit Our website: http://hwsoloutions.com/ Product Description CIS 525 Week 2 Assignment 1, Assignment 1: Agile versus Waterfall Due Week 2 and worth 80 points The following resources may be helpful when completing this assignment. •Agile vs. waterfall methodology (http://agileintro.wordpress.com/2008/01/04/waterfall-vs-agile-methodology/). •Understanding the pros and cons of the waterfall model of software development. Retrieved from TechRepublic Website (http://www.techrepublic.com/article/understanding-the-pros-and-cons-of-the-waterfall-model-of-software-development/6118423). •Transitioning from waterfall to iterative development. Retrieved from IBM DeveloperWorks Website (http://www.ibm.com/developerworks/rational/library/4243.html). Agile approach to project management has become more and more popular in recent years. Agile framework is different from traditional waterfall model. It has considerable impact on how projects are planned and executed. Imagine that you have been assigned as a project manager to manage your company’s e-Commerce Website where customers can browse the company’s products, place orders, and interact with the company’s customer service representatives. Your project must be completed in three (3) months and you have about twelve (12) people in the team. There are three (3) offshore developers in Ireland and two...

Words: 429 - Pages: 2

Free Essay

Cis 417 Week 2 Assignment 1

...CIS 417 WEEK 2 ASSIGNMENT 1 To purchase this visit here: http://www.activitymode.com/product/cis-417-week-2-assignment-1/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 2 ASSIGNMENT 1 – COMPUTER FORENSIC OVERVIEW Suppose you were recently hired for a new position as the computer forensics specialist at a mediumsized communications company. You have been asked to prepare a presentation to the Board of Directors on your main duties for the company and how your position could help achieve business goals based on security and confidentiality. You are also aware that the company has just had some issues with employee complaints of ongoing sexual harassment over email and instant messaging systems but has been unable to obtain adequate evidence of any kind. Write a two to three (2-3) page paper in which you: 1. Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist. 2. Provide an overview of how computing devices are used in crimes of today and how these crimes can affect a company’s data and information. 3. Discuss how computer forensics investigations pertain to the law and trying of cases. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 2 Assignment 1 – Computer Forensic Overview in order to ace their studies. CIS 417 WEEK 2 ASSIGNMENT 1 To purchase this visit......

Words: 679 - Pages: 3

Premium Essay

Cis 417 Complete Class All Assignments and Case Studies

...CIS 417 COMPLETE CLASS ALL ASSIGNMENTS AND CASE STUDIES To purchase this, Click here http://www.activitymode.com/product/cis-417-complete-class-all-assignments-and-case-studies/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 COMPLETE CLASS ALL ASSIGNMENTS AND CASE STUDIES CIS 417 WK 2 Assignment 1 - Computer Forensic Overview, CIS 417 WK 3 Case Study 1 - BTK, CIS 417 WK 4 Assignment 2 - Forensic Lab Design, CIS 417 WK 5 Case Study 2 - External Intrusion of the PlayStation Network, CIS 417 WK 6 Assignment 3 - Securing the Scene, CIS 417 WK 7 Case Study 3 - Casey Anthony Trial, CIS 417 WK 8 Assignment 4 - Data-Hiding Techniques, CIS 417 WK 10 Term Paper - Investigating Data Theft, Click Here to Buy this; http://www.activitymode.com/product/cis-417-complete-class-all-assignments-and-case-studies Activity modeaims to provide quality study notes and tutorials to the students of CIS 417 Complete Class all assignment in order to ace their studies. CIS 417 COMPLETE CLASS ALL ASSIGNMENTS AND CASE STUDIES To purchase this, Click here http://www.activitymode.com/product/cis-417-complete-class-all-assignments-and-case-studies/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 COMPLETE CLASS ALL ASSIGNMENTS AND CASE STUDIES CIS 417 WK 2 Assignment 1 - Computer Forensic Overview, CIS 417 WK 3 Case Study 1 - BTK, CIS 417 WK 4 Assignment 2 - Forensic Lab Design, CIS 417 WK 5 Case Study 2 - External Intrusion of the PlayStation Network, CIS 417 WK 6 Assignment......

Words: 490 - Pages: 2

Premium Essay

Cis 417 Week 5 Case Study 2

...CIS 417 WEEK 5 CASE STUDY 2 To purchase this visit here: http://www.activitymode.com/product/cis-417-week-5-case-study-2/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 5 CASE STUDY 2 – EXTERNAL INTRUSION OF THE PLAYSTATION NETWORK On April 20, 2011, the Sony PlayStation Network was taken offline after an external intrusion was discovered. Further research this incident using quality and reputable resources. Write a two to three (2-3) page paper in which you: 1. Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered. 2. Indicate what explanation Sony officials gave for the length of time that had passed from the start of the attack to when the general public was made aware of the details. 3. Analyze and explain what you believe the correct forensic investigative action would have been once the attack was uncovered. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 WK 5 Case Study 2 – External Intrusion of the PlayStation Network in order to ace their studies. CIS 417 WEEK 5 CASE STUDY 2 To purchase this visit here: http://www.activitymode.com/product/cis-417-week-5-case-study-2/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 5 CASE STUDY 2 – EXTERNAL INTRUSION OF THE PLAYSTATION NETWORK On April 20, 2011, the Sony PlayStation Network was taken offline after an external intrusion......

Words: 580 - Pages: 3

Free Essay

Cis 417 Week 10 Term Paper

...CIS 417 WEEK 10 TERM PAPER To purchase this visit here: http://www.activitymode.com/product/cis-417-week-10-term-paper/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 10 TERM PAPER – INVESTIGATING DATA THEFT Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. You have been informed that an employee may have been using corporate email to send confidential corporate information to one or more personal email accounts, which may or may not belong to him. You have been told that this action has been happening each business day for the last 13 days and the employee is unaware of any suspicion. Write an eight to ten (8-10) page paper in which you: 1. Explain, in detail, the initial actions you would take based on the provided information including formal plans to preserve the crime scene(s) and eventual transportation of evidence to a lab. 2. Analyze the physical and logical places where you would look for potential evidence on the suspect’s computer(s) and / or network servers. 3. Describe, in detail, how you proceed with the email investigation, including the review of email headers and tracing. 4. Describe the processes that would be utilized in order to recover data that may have been deleted from the suspect’s computer(s). More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week......

Words: 784 - Pages: 4

Free Essay

Cis 417 Assignment 4 Data-Hiding Techniques

...CIS 417 Assignment 4 Data-Hiding Techniques Buy Now From Below: http://www.homeworkarena.com/cis-417-assignment-4-data-hiding-techniques Assignment 4 Data-Hiding Techniques.. Suppose you are the Chief Security Officer for a financial institution. Someone on your information security staff has informed you that recent Web content filters have shown an end user who has been visiting sites dedicated to alternate data stream (ADS) and steganography hiding techniques. She is interested in what the end user may be doing and comes to you for some explanation on these techniques. Write a two to three (2-3) page paper in which you: 1. Explain how a user could utilize ADS to hide data and explain other destructive uses which exist for ADS. 2. Determine how rootkits can be used as an alternative for data hiding and explicate why they can be used for this purpose. 3. Describe the processes and tools used by an investigator in determining whether signs of steganography are present in a given situation. 4. Select two (2) tools that could be used for steganography and explain how these tools can help someone hide data from others. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA......

Words: 297 - Pages: 2

Free Essay

Cis 510-Week 4 Assignment 2

...Creating a Use Case Samuel Ofarril Dr. Kegan, Samuel CIS 510 Strayer University July 28, 2014 Creating a Use Case In this particular diagram we are showing the basic parts of an use case diagram and the relationship that each item in the case has with each other and possibly with other use cases. The actors in the CSMS marketing subsystem are represented by stick figure that will represent the particular role that it will be playing in the diagram. The actual use case is represented by the oval figures with the name of what it represents on the inside of it. Finally you will have arrows that will demonstrate the relationship that the actors have with the use case and how they interact with each other at different points of the diagram. The first actors which are the merchandising and the marketing share the first part of the use case, add/update product information. Both of these actors depend on the correct product information in order to market it properly to the customers and they know exactly what they are getting. At the same time the merchandising actor needs to ensure that the right product information is available so they can prepare, package and ship the correct item with what the customer is expecting to receive from the company. Both share an equal importance with this use case. Next use case is the add/update promotion, this use case is only handled by the marketing actor. This actor ensures......

Words: 624 - Pages: 3

Premium Essay

Cis 210 Week 7 Assignment 4 Str

...CIS 210 WEEK 7 ASSIGNMENT 4 STR TO purchase this tutorial visit following link: http://wiseamerican.us/product/cis-210-week-7-assignment-4-str/ Contact us at: SUPPORT@WISEAMERICAN.US CIS 210 WEEK 7 ASSIGNMENT 4 STR Strayer CIS 210 Assignment 4: Databases Due Week 7 and worth 100 points You are working as a corporate trainer for a large organization. There are several other trainers and many training topics. The company has grown quickly and scheduling has become difficult. The current method for scheduling involves writing trainer names and courses on a dry-erase board. This has led to issues with trainers changing the assignments in their favor and accidental erasure of some course assignments. Write a 4-5 page paper in which you: 1. Discuss the requirements needed to build a database for the scheduling process. 2. Describe the advantages and disadvantages of moving the schedule to a database. 3. Create a graphical representation of your proposed database environment. 4. Explain how referential integrity can prevent mistakes in a database, and do the advantages outweigh the difficulty of setting it up? 5. Impress your boss by creating a database in Microsoft Access that will match trainers with courses and meet the following requirements: a. Two (2) tables, one (1) containing trainer information and the other containing course information. Create data for five (5) instructors and five (5) courses. The trainer data should include: employee ID number, last name,...

Words: 786 - Pages: 4