Investigation 3 – Digital Forensics Report

Purpose

In this assignment, you will examine a forensic disk image for evidence of coupon forgery creation. Read the scenario document carefully, as you may consider it interview notes with your client. This represents a more complex scenario than Investigation 2 and thus contains a greater degree of irrelevant data. Be sure to give yourself plenty of time to perform the examination and be sure to take advantage of Autopsy’s features to assist your disambiguation. 

Instructions

You’ll need to use the following resources to complete the assignment:

  • Investigation 03 Sample Evidence*
  • Autopsy the open-source forensic suite* (or another suite, such as EnCase or FTK.)
  • (Optional) Download and use the report template (See the Investigation and Forensics Challenge module for the templates)

*Accessed via the Virtual Lab.

After reading the Investigation 3 Scenario, open your forensic tool and import the sample evidence into the case. Begin a forensic report to document your examination.

Scenario

This scenario takes place circa 2013.

As part of normal business practice, Walmart security receives Counterfeit Coupon Alerts from the Coupon Information Corporation. Within the past month, Walmart security has received specific information regarding fraudulent coupons being passed at their store. Using the received information, they conducted an internal investigation using video surveillance footage in an effort to identify the customers who are engaged in this activity.

One of the suspects was an unknown white, male adult, approximately 28 years old, brown hair, 5′ 9″, 200 pounds, no facial hair, and no visible tattoos. A photograph of this suspect was circulated to the employees in the store.

On December 22, 2013, Craig Tucker was detained by Walmart security as he matched the description, and he had just passed two fraudulent coupons for Monster energy drink and Arizona Iced Tea beverages while paying for other items. Walmart security contacted the Santa Monica Police Department to arrest and prosecute Tucker for theft. Santa Monica PD Officer Smith interviewed Tucker, and he denied knowing the coupons were fraudulent. He claimed to have received the coupons after completing an online survey for students at Santa Monica Community College.

Although Tucker gave consent to the search of his personal computer, a search warrant was obtained to search his computer for evidence as it may be an instrument to committing a crime. You have been given a forensic image of his hard drive. Based on your review of the search warrant, you are authorized to search for any information or communication associated with the creation, downloading, distribution, and possession of fraudulent consumer coupons.

Questions

1) Can we find any digital artifacts indicating recent activity related to coupon fraud, such as temporary files, cache, or registry entries?

2) Are there indications on Tucker’s computer of tools or files used for creating or altering coupons, and evidence in communications of Tucker distributing or discussing fraudulent coupons?

3) Was Craig Tucker communicating with anyone regarding these coupons? 

4) How did Craig know these could be used at Walmart (as there is no indication of this on the coupons themselves)?

5) How long has Craig Tucker been using these coupons? When was the first instance?

6) Is there any evidence to suggest that Tucker visited any websites or other online platforms that are linked to the distribution of fake coupons?

7) Do the file creation or modification dates align with the time Tucker allegedly obtained the coupons?

Format

You can submit your forensic report in Adobe PDF format. It should be a complete report. A template has been provided if you need help, but be aware that not all sections shown in the template will be relevant to this investigation:

  • Upload one file (PDF).
  • Your forensic report should include a cover page and a page dedicated to answering the accompanying questions at the end.
  • You may include screenshots or other evidence to support your conclusions, but a screenshot is not a shortcut to a complete report.

Grading and Submission

In brief, I’ll be evaluating you on the following:

  • Forensic Reporting
  • The report is complete and contains only the truth.
  • Examination Process
  • Your examination is fully documented and uses accepted practices.
  • Identifying Evidence
  • While you are not expected to find every relevant evidence item, you should discover enough to adequately support the conclusions in your report.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Information Security

 

I need some help here to get this on the way. It is divided into two portions. You need to pay attention to this and read everything before bidding on it. Do not pick up this assignment if you do not have a strong IT background. 

PART 1

a. Write a problem statement for this Master Thesis Topic.

Endpoint Security Solution protecting Remote Work Environment.

b. Provide at least 6-8 research questions for the research topic. Understand that you need to be very proficient, so you may be unable to tackle multiple big problems using endpoint security solutions to protect remote work environments. Your research question needs to test a very small problem, so narrow it down and direct it to the point. It must be completed in a very short amount of time.

For example, do not use research questions like, “What strategy should organizations use to protect their remote work environment from threats?” and “What are the key features and functionalities of endpoint security solutions that are most effective in protecting remote work environments?” These are vast questions with nearly unlimited answers.

You need to find a simple problem within the endpoint security solutions such as Zero Trust Architecture (ZTA), Virtual Private Network (VPN), Multi-factor Authentication (MFA), etc, and develop an action to fix that problem. In this method, you are only left with developing new software; at least, the Research Questions should clearly delineate this new software you are developing.

*NOTE: You are limited in what methods we can use. Most people do not have sufficient time to go to an institutional review board (IRB) for approval to perform any capstone research involving human subjects. Thus, the methods you select to test your research question cannot include research methods involving human subjects, such as online surveys or interviewing people. You cannot use statistical analysis because institutional Review board Approval was not sought for statistical analysis.

PART 2.

This part of the discussion aims to formalize the research method you will use to achieve your goals and provide the initial application or system design.

a. Prove to your audience that your problem statement and research question are achievable using a well-supported and accepted research methodology from scholarly literature.

b. The research method should detail how you will answer your research question and the formal process you will use to design your prototype.

c. Find at least three APA (3) scholarly articles that use your selected research methodology and support your research methodology to address your research question(s).

d. Justify why this research method will work and how it will answer your research question.

e. Include a minimum of one-use case description with detailed flows and sub-flows and the correlated activity diagram and class diagram of your application of the system prototype.

f. Embed screenshots of the diagrams in your post.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IT543 Assn 2

 

  • Identify the major people and organizations involved in the development of cryptographic standards.
  • Examine the role of technology in the evolution of cryptography.
  • Evaluate symmetric key cryptography, including the implementation of at least one symmetrical algorithm.
  • Explain the role symmetric algorithms play in securing network protocols.

Course Outcome:

IT543-2: Evaluate various cryptographic methods.

Standards, Symmetric Encryption, and the Development of AES

Assignment Instructions:

Write a 5- to 7-page paper outlining the development of encryption standards, highlighting recent developments and the state of standards today. Identify at least three different standards currently in use today. Expound on their origins and development. Explain the strengths and weaknesses of different approaches and cite your sources. Discuss the importance and impact of these standards.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Applied Practical Learning Paper. Due in next 2hrs 2 Pages required

Based on Organizational Communications and Computer and Network Security

The objectives of this course are as follows:

1) Apply concepts from coursework to your practical training experiences.

2) Apply experiences from your practical training experiences to academic projects.

3) Analyze connections between practical training experiences and coursework.

Consider these objectives when you write your Applied Practical Learning Paper and include the following:

1) List the course(s) that you are enrolled in this term.

2) Provide the Course Learning Objective for these course(s). Refer to each course syllabus.

3) What concepts and or skills have you learned in your coursework this term that could be used or put into practice at your workplace? 

4) Reflect on specific examples in your workplace.  If you are NOT currently working, please answer these same questions using past experiences or discuss how these concepts and skills could apply in your future workplace and career. 

5) What knowledge or skills do you think was missing from your current coursework that you think would have been helpful in your job or you think would be helpful in your career? 

Your Applied Practical Leaning Paper should be a minimum of two (2) pages double-spaced. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Techfite Case Study 2

 

Tasks may not be submitted as cloud links, such as links to Google Docs, Google Slides, OneDrive, etc., unless specified in the task requirements. All other submissions must be file types that are uploaded and submitted as attachments (e.g., .docx, .pdf, .ppt).

A.  Address ethical issues for cybersecurity by doing the following:

1.  Discuss the ethical guidelines or standards relating to information security that should apply to the case study.

a.  Justify your reasoning.

2.  Identify the behaviors, or omission of behaviors, of the people who fostered the unethical practices. 

3.  Discuss what factors at TechFite led to lax ethical behavior.
 

B.  Describe ways to mitigate problems and build security awareness by doing the following:

1.  Describe two information security policies that may have prevented or reduced the criminal activity, deterred the negligent acts, and decreased the threats to intellectual property. 

2.  Describe the key components of a Security Awareness Training and Education (SATE) program that could be implemented at TechFite.

a.  Explain how the SATE program will be communicated to TechFite employees.

b.  Justify the SATE program’s relevance to mitigating the undesirable behaviors at TechFite.
 

C.  Prepare a summary directed to senior management (suggested length of 1–2 paragraphs) that states TechFite’s ethical issues from Part A and the related mitigation strategies from Part B.
 

D.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
 

E.  Demonstrate professional communication in the content and presentation of your submission.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

MATH

 

Make your choice (Bouncing ball) the subject of your post, and then tell us in your own words about your find. Do not just make this up off the top of your head. The St Louis Arch, for example, is NOT a parabola—it is an inverted catenary.

To get credit for this Discussion, you must cite a source confirming that your example is, indeed, a conic and not some other more exotic curve.

Using a personal example (My eyebrow) will not count unless you can cite a source verifying that eyebrows are parabolic.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

242

 

  1. Why is an update/patch process crucial for any organization to have and follow? 
  2. Discuss some issues that may arise when patching and updating machines.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Programming Project 1: Design a spreadsheet to calculate the class’s grades

-Design a spreadsheet to calculate the class’s grades. 

-All the requirements and grading rubric in upload

-ONLY BID IF YOU CAN DO IT

MUST DUE 8/31 BEFORE NIGHT

  1. Consider the following requirements:
  2. Each project will be graded from 0 to 10.
  3. See your course syllabus to identify the contribution of each grade to the final grade.
  4. The final test will be graded from 0 to 100, but your solution should allow different grades (i.e 80 points, 90, or 95). This flexibility is very important.
  5. Program your solution to set a numeric final grade.
  6. Program your solution to translate the numeric grade to the letter grade using the corresponding table in the course syllabus.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

2 discussions and 1 case study and 1 book review

Discussion 5.1

There are several steps in the remote targeting phase.  Which step do you think is the most important?  Why?  Which one do you think is the least important?  Why?

Discussion 5.2

What are some of the wireless tools discussed in the remote targeting phase?  How are they used?  Which one do you think is the most important?  Why?  Which one do you think is least important?  Why?  

Case Study 5.1

Conduct additional research and write a 3 to 4 page paper explaining the steps you would take in Phase III, Remote Targeting.  Make sure you follow the grading rubric and write your paper in APA format. 

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)

Book Review Chapters 6 & 7 

Write a three to four-page paper, explaining the Information found in Chapters 6 and 7 concentrating on Wireless systems and what hackers know about them.  Make sure you follow the grading rubric and write your paper in APA format. 

Writing Requirements

  • 3–4 pages in length  (excluding cover page, abstract, and reference list)

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

project quality management

Suburban Homes Construction Project Quality Management Plan (QMP) 

Prepare a quality management plan using the elements described in the PMBOK 6e (Section 8.1.3.1) for the Suburban Homes Construction Project.

Content (90 points) Over the course the semester you’ve become familiar with the project and as part of the overall project management plan, a quality management plan is needed to communicate how quality will be met to the satisfaction of each stakeholder involved in a typical residential construction project.

You should perform research on quality standards associated with residential construction to determine applicable standards.  At least four (4) quality objectives associated with the project should be defined.

As part of the section on quality tools, include a separate appendix with at least three (3) quality tools that will be used as a part of the project.  These can be drawn from: 1) flow charts, 2) check sheets, 3) Pareto diagrams, 4) histograms, 5) control charts, 6) scatter diagrams, 7) affinity diagrams, 8) process decision programs charts, 9) interrelationship digraphs, 10) tree diagrams, 11) prioritization matrices, 12) activity network diagrams, 13) matrix diagrams, 14) inspections, and 15) statistical sampling.

Last, about 1/3 of the plan should be devoted to major procedures relevant for the project for dealing with non-conformance, corrective actions procedures, and continuous improvement procedures.

If information needed to complete a QMP is not explicitly stated in the scenario description or other project artifacts you’ve created or collected for this scenario in the past units, then develop (make-up) the information you need to complete the plan.  Use tables and illustrations as needed to convey information.

The plan (excluding the separate appendix) should be approximately 4 to 5 pages. 

Your Instructor will use Turn-it-in to ensure your paper is authentic work.  To avoid plagiarism, see the course home page for more information and use the Purdue Online Writing Lab to learn how to paraphrase, summarize and cite the references you use in all academic writing assignments.

Mechanics (10 points)  It is expected that each part of this assignment have excellent mechanics (presentation, grammar and spelling) and exhibit the quality of work capable of a group of graduate students and working professionals. All sections of the document submitted must be readable at 100% magnification.  Include any resources used in an APA formatted reference section.

Submit your assignment to the drop box in Moodle

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now