Category Archives: CIS 417

Strayer CIS 417 Week 2 Assignment 1: Computer Forensics Overview NEW

Strayer CIS 417 Week 2 Assignment 1: Computer Forensics Overview NEW

To purchase this material click below link

http://www.assignmentcloud.com/cis-417-strayer/cis-417-week-2-assignment-1-computer-forensics-overview-new

For more classes visit

www.assignmentcloud.com

CIS 417 Week 2 Assignment 1: Computer Forensics Overview NEW

Assignment 1: Computer Forensics Overview

Due Week 2 and worth 60 points

Suppose you were recently hired for a new position as the computer forensics specialist at a medium-sized communications company. You have been asked to prepare a presentation to the Board of Directors on your main duties for the company and how your position could help achieve business goals based on security and confidentiality. You are also aware that the company has just had some issues with employee complaints of ongoing sexual harassment over email and instant messaging systems but has been unable to obtain adequate evidence of any kind.

Write a two to three (2-3) page paper in which you:

1. Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist.

2. Provide an overview of how computing devices are used in crimes of today and how these crimes can affect a company’s data and information.

3. Discuss how computer forensics investigations pertain to the law and trying of cases.

4. Explain how you could assist in investigating the potential ongoing sexual harassment complaints and determine how you would communicate this to the Board of Directors.

5. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Identify the role of computer forensics in responding to crimes and solving business challenges.

• Outline system forensics issues, laws, and skills.

• Use technology and information resources to research issues in computer forensics.

• Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.

Strayer CIS 417 Week 3 Case Study 1 BTK NEW

Strayer CIS 417 Week 3 Case Study 1 BTK NEW

To purchase this material click below link

http://www.assignmentcloud.com/cis-417-strayer/cis-417-week-3-case-study-1-btk-new

For more classes visit

www.assignmentcloud.com

CIS 417 Week 3 Case Study 1 BTK

Case Study 1: BTK

Due Week 3 and worth 60 points

In 2005, serial killer Dennis Rader, also known as BTK, was arrested and convicted of murdering 10 people in Kansas between the years of 1974 and 1991. Further research this incident using quality and reputable resources.

Write a two to three (2-3) page paper in which you:

1. Explicate how digital forensics was used to identify Rader as a suspect and lead to more concrete physical evidence.

2. Describe in detail the digital evidence that was uncovered from the floppy disk obtained from Rader. Discuss why you believe it took so many years to find concrete evidence in order to build a case against Rader.

3. Explain how the acquisition of digital evidence aided the investigation and whether or not you believe Rader would’ve been a person of interest if the floppy disk evidence wasn’t sent.

4. Identify the software that was used by the authorities to uncover the evidence and summarize how this software can be used for digital forensics and evidence collection.

5. Use at least two (2) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Identify the role of computer forensics in responding to crimes and solving business challenges.

• Report investigative findings of potential evidentiary value.

• Use technology and information resources to research issues in computer forensics.

• Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.

Strayer CIS 417 Week 4 Assignment 2: Forensic Lab Design NEW

Strayer CIS 417 Week 4 Assignment 2: Forensic Lab Design NEW

To purchase this material click below link

http://www.assignmentcloud.com/cis-417-strayer/cis-417-week-4-assignment-2-forensic-lab-design-new

For more classes visit

www.assignmentcloud.com

CIS 417 Week 4 Assignment 2: Forensic Lab Design

Assignment 2: Forensic Lab Design

Due Week 4 and worth 90 points

Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization.

Write a four to five (4-5) page paper in which you:

1. Explicate the steps you would take to plan a budget for the lab, keeping in mind the general business objective to avoid unneeded costs.

2. Recommend the physical requirements and controls that you would consider implementing in order to keep the lab safe and secure.

3. Identify at least three (3) hardware and software tools that you would include in the design of the lab and explain your reasons behind your choices.

4. Identify the high-level criteria that would be considered when selecting the forensic workstations to be utilized.

5. Describe the mandatory policies, processes, and procedures you would implement in order to maintain the lab environment and preserve evidence.

6. Design a floor plan for the lab using a diagramming application such as Visio or Dia. Note: The graphically depicted solution is not included in the required page length.

7. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Visio or one of their equivalents such as Open Project Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

• Describe the purpose and structure of a digital forensics lab.

• Examine and explain the evidence life cycle.

• Describe the constraints on digital forensic investigations.

• Develop a computer forensics deployment plan that addresses and solves a proposed business problem.

• Use technology and information resources to research issues in computer forensics.

• Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.

Strayer CIS 417 Week 5 Case Study 2: External Intrusion of the PlayStation Network NEW

Strayer CIS 417 Week 5 Case Study 2: External Intrusion of the PlayStation Network NEW

To purchase this material click below link

http://www.assignmentcloud.com/cis-417-strayer/cis-417-week-5-case-study-2-external-intrusion-of-the-playstation-network-new

For more classes visit

www.assignmentcloud.com

CIS 417 Week 5 Case Study 2: External Intrusion of the PlayStation Network

Case Study 2: External Intrusion of the PlayStation Network

Due Week 5 and worth 60 points

On April 20, 2011, the Sony PlayStation Network was taken offline after an external intrusion was discovered. Further research this incident using quality and reputable resources.

Write a two to three (2-3) page paper in which you:

1. Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered.

2. Indicate what explanation Sony officials gave for the length of time that had passed from the start of the attack to when the general public was made aware of the details.

3. Analyze and explain what you believe the correct forensic investigative action would have been once the attack was uncovered.

4. Explicate whether or not you believe the Sony forensic teams could have provided a quicker analysis of the situation and the damage incurred. Discuss why you believe this way and what you think is an appropriate amount of time after a breach before those affected are made aware.

5. Use at least two (2) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. Explicate

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Identify the role of computer forensics in responding to crimes and solving business challenges.

• Outline system forensics issues, laws, and skills.

• Identify the procurement of evidence in physical and virtualized environments.

• Use technology and information resources to research issues in computer forensics.

• Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.

Strayer CIS 417 Week 6 Assignment 3 Securing the Scene NEW

Strayer CIS 417 Week 6 Assignment 3 Securing the Scene NEW

To purchase this material click below link

http://www.assignmentcloud.com/cis-417-strayer/cis-417-week-6-assignment-3-securing-the-scene-new

For more classes visit

www.assignmentcloud.com

CIS 417 Week 6 Assignment 3 Securing the Scene

Assignment 3: Securing the Scene

Due Week 6 and worth 60 points

Imagine you are a digital forensic investigator for a healthcare organization. You learn from your internal information security department that an employee has been using password-cracking software to access confidential customer insurance information. The account information extracted is unknown at this time, though it appears as though multiple computers were being used for the crime and it isn’t clear whether an attack is currently in progress. The employee has been detained but his computers remain online.

Write a two to three (2-3) page paper in which you:

1. Develop a detailed plan to approach and secure the incident scene based on the information you have from the scenario.

2. Discuss the initial steps you would take for the investigation, depending on whether or not the attack is still in progress. Include how your actions would differ based on the current status of the incident.

3. Explicate the importance of creating an order of volatility by identifying the potential evidence that is the most volatile. Explain, in detail, how you would extract this evidence.

4. Identify the high-level steps that would be performed in collecting and analyzing the evidence. Include steps that are required, as well as what should not be done, in order to maintain the potential admissibility of evidence.

5. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Outline system forensics issues, laws, and skills.

• Examine and explain the evidence life cycle.

• Analyze the impact of sequestration on the evidence-gathering process.

• Use technology and information resources to research issues in computer forensics.

• Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.

Strayer CIS 417 Week 7 Case Study 3: Casey Anthony Trial NEW

Strayer CIS 417 Week 7 Case Study 3: Casey Anthony Trial NEW

To purchase this material click below link

http://www.assignmentcloud.com/cis-417-strayer/cis-417-week-7-case-study-3-casey-anthony-trial-new

For more classes visit

www.assignmentcloud.com

CIS 417 Week 7 Case Study 3: Casey Anthony Trial

Case Study 3: Casey Anthony Trial

Due Week 7 and worth 60 points

On July 5, 2011, Casey Anthony was found not guilty of first-degree murder in the 2008 death of her daughter, Caylee. Further research this incident using quality and reputable resources.

Write a two to three (2-3) page paper in which you:

1. Provide a brief summary of the background, charges, and trial of this high-profile court case.

2. Explain, from a forensics perspective, the digital evidence found on the Anthony family computer that helped the prosecutors build a case against Anthony.

3. Describe what the prosecution was unable to prove based on the digital evidence found. Indicate whether or not you think this is a common problem with digital evidence and provide a rationale for your response.

4. Explain the software issue that was found to have caused inaccurate evidence to be admitted into the trial.

5. Determine whether the software issue, which caused inaccurate evidence in the trial, would’ve affected your perception of the prosecution’s case if you were a juror in this trial.

6. Use at least two (2) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Outline system forensics issues, laws, and skills.

• Develop plans that collect evidence in network and email environments.

• Use technology and information resources to research issues in computer forensics.

• Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.

• Examine automated digital forensic analysis.

Strayer CIS 417 Week 8 Assignment 4 Data-Hiding Techniques NEW

Strayer CIS 417 Week 8 Assignment 4 Data-Hiding Techniques NEW

To purchase this material click below link

http://www.assignmentcloud.com/cis-417-strayer/cis-417-week-8-assignment-4-data-hiding-techniques-new

For more classes visit

www.assignmentcloud.com

CIS 417 Week 8 Assignment 4 Data-Hiding Techniques

Assignment 4: Data-Hiding Techniques

Due Week 8 and worth 60 points

Suppose you are the Chief Security Officer for a financial institution. Someone on your information security staff has informed you that recent Web content filters have shown an end user who has been visiting sites dedicated to alternate data stream (ADS) and steganography hiding techniques. She is interested in what the end user may be doing and comes to you for some explanation on these techniques.

Write a two to three (2-3) page paper in which you:

1. Explain how a user could utilize ADS to hide data and explain other destructive uses which exist for ADS.

2. Determine how rootkits can be used as an alternative for data hiding and explicate why they can be used for this purpose.

3. Describe the processes and tools used by an investigator in determining whether signs of steganography are present in a given situation.

4. Select two (2) tools that could be used for steganography and explain how these tools can help someone hide data from others.

5. Use at least three (3) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Identify the role of computer forensics in responding to crimes and solving business challenges.

• Outline system forensics issues, laws, and skills.

• Develop plans that collect evidence in network and email environments.

• Describe the constraints on digital forensic investigations.

• Use technology and information resources to research issues in computer forensics.

• Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.

Strayer CIS 417 Week 10 Term Paper Investigating Data Theft

Strayer CIS 417 Week 10 Term Paper Investigating Data Theft

To purchase this material click below link

http://www.assignmentcloud.com/cis-417-strayer/cis-417-week-10-term-paper-investigating-data-theft-new

For more classes visit

www.assignmentcloud.com

CIS 417 Week 10 Term Paper Investigating Data Theft

Term Paper: Investigating Data Theft

Due Week 10 and worth 150 points

Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. You have been informed that an employee may have been using corporate email to send confidential corporate information to one or more personal email accounts, which may or may not belong to him. You have been told that this action has been happening each business day for the last 13 days and the employee is unaware of any suspicion.

Write an eight to ten (8-10) page paper in which you:

1. Explain, in detail, the initial actions you would take based on the provided information including formal plans to preserve the crime scene(s) and eventual transportation of evidence to a lab.

2. Analyze the physical and logical places where you would look for potential evidence on the suspect’s computer(s) and / or network servers.

3. Describe, in detail, how you proceed with the email investigation, including the review of email headers and tracing.

4. Describe the processes that would be utilized in order to recover data that may have been deleted from the suspect’s computer(s).

5. Identify the tools you would use to perform your investigation from beginning to end based on the information you have on the incident. Provide a brief overview of each tool, to include:

• A description of the tool.

• How you would use the tool in the investigation.

• How the tool helps the investigation and the evidence you expect it to provide.

• Why you believe the evidence the tool provides is critical to the investigation.

• Use at least five (5) quality resources in this assignment. Note:Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Identify the role of computer forensics in responding to crimes and solving business challenges.

• Outline system forensics issues, laws, and skills.

• Examine and explain the evidence life cycle.

• Identify the procurement of evidence in physical and virtualized environments.

• Analyze the impact of sequestration on the evidence-gathering process.

• Develop plans that collect evidence in network and email environments.

• Examine automated digital forensic analysis.

• Use technology and information resources to research issues in computer forensics.

• Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.