CIS 562 Week 4 Discussion 1

CIS 562 Week 4 Discussion 1

 

 

“Incident and Crime Scene Procedures” Please respond to the following:

  • Compare and contrast collecting evidence at a private-sector incident scene and processing a law enforcement crime scene. Compare the differences and similarities of evidence seizure and storage procedures for these two types of investigations.
  • Determine the purpose of creating a digital hash. Explain in detail the need for this procedure and the potential damage if this critical step is not taken.

 

 

 

 

Latest A+ Graded at link below

 

 

https://hwacer.com/Tutorial/cis-562-week-4-discussion-1/

 

 

 

 

 

“Incident and Crime Scene Procedures” Please respond to the following:

  • Compare and contrast collecting evidence at a private-sector incident scene and processing a law enforcement crime scene. Compare the differences and similarities of evidence seizure and storage procedures for these two types of investigations.
  • Determine the purpose of creating a digital hash. Explain in detail the need for this procedure and the potential damage if this critical step is not taken.
“Incident and Crime Scene Procedures” Please respond to the following:

  • Compare and contrast collecting evidence at a private-sector incident scene and processing a law enforcement crime scene. Compare the differences and similarities of evidence seizure and storage procedures for these two types of investigations.
  • Determine the purpose of creating a digital hash. Explain in detail the need for this procedure and the potential damage if this critical step is not taken.
“Incident and Crime Scene Procedures” Please respond to the following:

  • Compare and contrast collecting evidence at a private-sector incident scene and processing a law enforcement crime scene. Compare the differences and similarities of evidence seizure and storage procedures for these two types of investigations.
  • Determine the purpose of creating a digital hash. Explain in detail the need for this procedure and the potential damage if this critical step is not taken.
“Incident and Crime Scene Procedures” Please respond to the following:

  • Compare and contrast collecting evidence at a private-sector incident scene and processing a law enforcement crime scene. Compare the differences and similarities of evidence seizure and storage procedures for these two types of investigations.
  • Determine the purpose of creating a digital hash. Explain in detail the need for this procedure and the potential damage if this critical step is not taken.
CIS 562 Week 4 Discussion 1
CIS 562 Week 4 Discussion 1
CIS 562 Week 4 Discussion 1

CIS 562 Week 3 Discussion

CIS 562 Week 3 Discussion

 

 

CIS 562 Week 3 Discussion 1

“Data Acquisition and RAID” Please respond to the following:

  • Describe at least three challenges of performing data acquisition on a device using a RAID (Redundant Array of Independent Disks) disk configuration. Determine whether or not you believe any one RAID configuration presents more challenges than the others and provide justification.
  • From the e-Activity, thoroughly describe the RAID data acquisition forensics tool you researched, including at a minimum its functions, advantages / disadvantages, and cost. Explain why you would consider utilizing this tool as a system forensics specialist, and provide a scenario where this tool would assist you in an investigation.

 

 

 

 

Latest A+ Graded at link below

 

 

https://hwacer.com/Tutorial/cis-562-week-3-discussion/

 

 

 

 

CIS 562 Week 3 Discussion 2

 

“Data Acquisition and RAID” Please respond to the following:

  • Describe at least three challenges of performing data acquisition on a device using a RAID (Redundant Array of Independent Disks) disk configuration. Determine whether or not you believe any one RAID configuration presents more challenges than the others and provide justification.
  • From the e-Activity, thoroughly describe the RAID data acquisition forensics tool you researched, including at a minimum its functions, advantages / disadvantages, and cost. Explain why you would consider utilizing this tool as a system forensics specialist, and provide a scenario where this tool would assist you in an investigation.

 

CIS 562 Week 3 Discussion 2

 

“Data Acquisition and RAID” Please respond to the following:

  • Describe at least three challenges of performing data acquisition on a device using a RAID (Redundant Array of Independent Disks) disk configuration. Determine whether or not you believe any one RAID configuration presents more challenges than the others and provide justification.
  • From the e-Activity, thoroughly describe the RAID data acquisition forensics tool you researched, including at a minimum its functions, advantages / disadvantages, and cost. Explain why you would consider utilizing this tool as a system forensics specialist, and provide a scenario where this tool would assist you in an investigation.

 

CIS 562 Week 2 Discussion

CIS 562 Week 2 Discussion

 

CIS 562 Week 2 Discussion 1

“Corporate Investigations” Please respond to the following:

  • From the first e-Activity, explain the procedures followed in the corporate investigation you researched. Provide a separate situation / scenario in which these same procedures would be ideal.
  • Explain in your own words the purpose and importance of utilizing proper investigation procedures in corporate incidents and cases in both enterprise and small- to medium-sized businesses. Indicate the potential downfalls of not using these procedures.

 

 

 

Latest A+ Graded at link below

 

 

 

https://hwacer.com/Tutorial/cis-562-week-2-discussion/

 

 

 

 

CIS 562 Week 2 Discussion 2

“Forensic Labs and Certification” Please respond to the following:

  • Determine what you perceive to be the value of forensics lab accreditation and whether or not it is important. Explain whether or not you believe lab certification is a requirement for law enforcement agencies and provide justification.
  • From the second e-Activity, outline the process of forensic lab accreditation and determine what a laboratory needs to do in order to fulfill the requirements. Identify an ASCLD accredited lab in your geographic location and further research this lab. Povide an overview of its operations and accredited capabilities.

 

“Corporate Investigations” Please respond to the following:

  • From the first e-Activity, explain the procedures followed in the corporate investigation you researched. Provide a separate situation / scenario in which these same procedures would be ideal.
  • Explain in your own words the purpose and importance of utilizing proper investigation procedures in corporate incidents and cases in both enterprise and small- to medium-sized businesses. Indicate the potential downfalls of not using these procedures.

CIS 562 Week 2 Discussion 2

“Forensic Labs and Certification” Please respond to the following:

  • Determine what you perceive to be the value of forensics lab accreditation and whether or not it is important. Explain whether or not you believe lab certification is a requirement for law enforcement agencies and provide justification.
  • From the second e-Activity, outline the process of forensic lab accreditation and determine what a laboratory needs to do in order to fulfill the requirements. Identify an ASCLD accredited lab in your geographic location and further research this lab. Povide an overview of its operations and accredited capabilities.

 

CIS 562 Week 1 Discussion

CIS 562 Week 1 Discussion

 

 

Latest A+ Graded at link below

 

 

 

https://hwacer.com/Tutorial/cis-562-week-1-discussion/

“Legal Banners in the Workplace”  Please respond to the following:

  • Determine whether or not you believe displaying warning banners on your company- issued personal computers are a necessary security control. Explain what a warning banner can add to the overall security program and eventual potential legal posture of the company.
  • Based on your experience (e.g., work, school, public computer, etc.), indicate whether or not you have seen warning banners displayed and describe the situation(s). Explain whether or not you believe the company did or did not recognize the need to use warning banners.

CIS 562 Week 1 Discussion 2

“Current Legal Processes” Please respond to the following:

  • Summarize the legal process for cases involving digital crimes and the affect you perceive that computer investigations can have on the process. Determine why it is important for a computer investigator to have Level 3 training to conduct an investigation.
  • Conclude whether or not you believe the legal process for cases involving digital crimes is keeping up with the times and the advancement of technology. Explain one area of law that you believe should be improved when it comes to digital crimes, legislation, and investigations.
“Legal Banners in the Workplace”  Please respond to the following:

  • Determine whether or not you believe displaying warning banners on your company- issued personal computers are a necessary security control. Explain what a warning banner can add to the overall security program and eventual potential legal posture of the company.
  • Based on your experience (e.g., work, school, public computer, etc.), indicate whether or not you have seen warning banners displayed and describe the situation(s). Explain whether or not you believe the company did or did not recognize the need to use warning banners.

CIS 562 Week 1 Discussion 2

“Current Legal Processes” Please respond to the following:

  • Summarize the legal process for cases involving digital crimes and the affect you perceive that computer investigations can have on the process. Determine why it is important for a computer investigator to have Level 3 training to conduct an investigation.
  • Conclude whether or not you believe the legal process for cases involving digital crimes is keeping up with the times and the advancement of technology. Explain one area of law that you believe should be improved when it comes to digital crimes, legislation, and investigations.

CIS 562 Week 5 Discussion 2

CIS 562 Week 5 Discussion 2

CIS 562 Week 5 Discussion 2

CIS 562 Week 5 Discussion 2

CIS 562 Week 5 Discussion 2

 

“Operating System Forensics” Please respond to the following:

 

 

 

 

 

Latest A+ Graded at link below

 

 

 

https://hwacer.com/Tutorial/cis-562-week-5-discussion-2/

 

 

 

 

 

 

  • Compare and contrast the forensic processes when dealing with Windows-based, Linux-based, and Macintosh-based systems. Explain the challenges of each of these operating systems in regard to system forensics and determine which of these you consider to be the most challenging and why.
  • From the second e-Activity, discuss the tool’s primary uses, strengths and weaknesses, competing products, costs, system requirements, and whether military, law enforcement and / or private corporations use the tool. Decided whether or not you would consider utilizing this tool as a system forensics specialist. If you would utilize the tool, provide a scenario where it would assist you in an investigation. If you would not utilize the tool, justify your reason why.

 

 

“Operating System Forensics” Please respond to the following:

  • Compare and contrast the forensic processes when dealing with Windows-based, Linux-based, and Macintosh-based systems. Explain the challenges of each of these operating systems in regard to system forensics and determine which of these you consider to be the most challenging and why.
  • From the second e-Activity, discuss the tool’s primary uses, strengths and weaknesses, competing products, costs, system requirements, and whether military, law enforcement and / or private corporations use the tool. Decided whether or not you would consider utilizing this tool as a system forensics specialist. If you would utilize the tool, provide a scenario where it would assist you in an investigation. If you would not utilize the tool, justify your reason why.

 

 

“Operating System Forensics” Please respond to the following:

  • Compare and contrast the forensic processes when dealing with Windows-based, Linux-based, and Macintosh-based systems. Explain the challenges of each of these operating systems in regard to system forensics and determine which of these you consider to be the most challenging and why.
  • From the second e-Activity, discuss the tool’s primary uses, strengths and weaknesses, competing products, costs, system requirements, and whether military, law enforcement and / or private corporations use the tool. Decided whether or not you would consider utilizing this tool as a system forensics specialist. If you would utilize the tool, provide a scenario where it would assist you in an investigation. If you would not utilize the tool, justify your reason why.

 

CIS 562 Week 5 Discussion 1

CIS 562 Week 5 Discussion 1

CIS 562 Week 5 Discussion 1

 

CIS 562 Week 5 Discussion 1

 

CIS 562 Week 5 Discussion 1

 

CIS 562 Week 5 Discussion 1

 

 

 

Latest A+ Graded at link below

 

 

 

https://hwacer.com/Tutorial/cis-562-week-5-discussion-1/

 

 

 

 

“Forensic Tool Testing” Please respond to the following:

  • Determine the importance of forensic tool testing and validation and if this is a critical component of your forensic operations. Justify your answer.
  • From the first e-Activity, discuss the advantage you believe the Computer Forensics Tool Testing (CFTT) provides for system forensics specialists and law enforcement agencies. Determine if the testing of tools is more effective and trustworthy being that it is a function of the National Institute of Standards and Technology (NIST). Decide if the testing of tools by NIST makes the testing more unbiased than if it were performed in the private sector. Provide a rationale with your response.

 

“Forensic Tool Testing” Please respond to the following:

  • Determine the importance of forensic tool testing and validation and if this is a critical component of your forensic operations. Justify your answer.
  • From the first e-Activity, discuss the advantage you believe the Computer Forensics Tool Testing (CFTT) provides for system forensics specialists and law enforcement agencies. Determine if the testing of tools is more effective and trustworthy being that it is a function of the National Institute of Standards and Technology (NIST). Decide if the testing of tools by NIST makes the testing more unbiased than if it were performed in the private sector. Provide a rationale with your response.

“Forensic Tool Testing” Please respond to the following:

  • Determine the importance of forensic tool testing and validation and if this is a critical component of your forensic operations. Justify your answer.
  • From the first e-Activity, discuss the advantage you believe the Computer Forensics Tool Testing (CFTT) provides for system forensics specialists and law enforcement agencies. Determine if the testing of tools is more effective and trustworthy being that it is a function of the National Institute of Standards and Technology (NIST). Decide if the testing of tools by NIST makes the testing more unbiased than if it were performed in the private sector. Provide a rationale with your response.

 

http://homeworkacer.blogspot.com/2018/08/cis-562-week-5-discussion-1.html

 

“Forensic Tool Testing” Please respond to the following:

  • Determine the importance of forensic tool testing and validation and if this is a critical component of your forensic operations. Justify your answer.
  • From the first e-Activity, discuss the advantage you believe the Computer Forensics Tool Testing (CFTT) provides for system forensics specialists and law enforcement agencies. Determine if the testing of tools is more effective and trustworthy being that it is a function of the National Institute of Standards and Technology (NIST). Decide if the testing of tools by NIST makes the testing more unbiased than if it were performed in the private sector. Provide a rationale with your response.

CIS 562 Week 4 Discussion 2

CIS 562 Week 4 Discussion 2

CIS 562 Week 4 Discussion 2

 

 

 

“Virtual Machine Forensics” Please respond to the following:

  • Determine what you perceive to be the greatest challenge when dealing with virtual machines from a system forensics perspective. Provide a rationale with your response.
  • From the e-Activity, determine how virtual machines can be used as both useful forensic tools and tools to thwart forensic investigations. Decide which of these two uses of virtual machines you perceive is more common and justify your answer.

 

 

 

 

Latest A+ Graded at link below

 

 

 

 

https://hwacer.com/Tutorial/cis-562-week-4-discussion-2/

 

 

 

 

“Virtual Machine Forensics” Please respond to the following:

  • Determine what you perceive to be the greatest challenge when dealing with virtual machines from a system forensics perspective. Provide a rationale with your response.
  • From the e-Activity, determine how virtual machines can be used as both useful forensic tools and tools to thwart forensic investigations. Decide which of these two uses of virtual machines you perceive is more common and justify your answer.
“Virtual Machine Forensics” Please respond to the following:

  • Determine what you perceive to be the greatest challenge when dealing with virtual machines from a system forensics perspective. Provide a rationale with your response.
  • From the e-Activity, determine how virtual machines can be used as both useful forensic tools and tools to thwart forensic investigations. Decide which of these two uses of virtual machines you perceive is more common and justify your answer.
“Virtual Machine Forensics” Please respond to the following:

  • Determine what you perceive to be the greatest challenge when dealing with virtual machines from a system forensics perspective. Provide a rationale with your response.
  • From the e-Activity, determine how virtual machines can be used as both useful forensic tools and tools to thwart forensic investigations. Decide which of these two uses of virtual machines you perceive is more common and justify your answer.
“Virtual Machine Forensics” Please respond to the following:

  • Determine what you perceive to be the greatest challenge when dealing with virtual machines from a system forensics perspective. Provide a rationale with your response.
  • From the e-Activity, determine how virtual machines can be used as both useful forensic tools and tools to thwart forensic investigations. Decide which of these two uses of virtual machines you perceive is more common and justify your answer.
CIS 562 Week 4 Discussion 2 “Virtual Machine Forensics” Please respond to the following: Determine what you perceive to be the greatest challenge when deali
CIS 562 Week 4 Discussion 2 “Virtual Machine Forensics” Please respond to the following: Determine what you perceive to be the greatest challenge when deali
CIS 562 Week 4 Discussion 2 “Virtual Machine Forensics” Please respond to the following: Determine what you perceive to be the greatest challenge when deali

CIS 562 Week 7 Discussion

CIS 562 Week 7 Discussion

 

Week 7 DQ 1

  • Assess the importance of forensics in network-based crimes and incidents. Determine the advantages an investigator gains by having the ability to analyze network-based crimes. Propose how you, as someone in a management position, would emphasize this importance to your organization.
  • From the first e-Activity, summarize the article you researched and specify how cyberforensics were utilized to analyze the crime. Provide an example with your response.

 

 

 

Latest A+ Graded at link below

 

 

 

 

https://hwacer.com/Tutorial/cis-562-week-7-discussion/

 

 

 

 

Week 7 DQ 2

 

“Email Investigations” Please respond to the following:

  • Compare and contrast forensic investigations of email in a client-server environment and webmail environments. Choose which one you believe is the more difficult of these investigations and provide a rationale with your response. Determine if you believe mobile device email has increased the difficulty with email evidence gathering and if you believe this will continue to evolve in the future.
  • From the second e-Activity, suppose you are a Chief Information Security Officer (CISO) for a large corporation. Choose what you believe is the greatest concern with email investigations. Conclude whether or not you agree with the authors that speed in preservation is the key to an email investigation. Justify your response.

 

Week 7 DQ 1

  • Assess the importance of forensics in network-based crimes and incidents. Determine the advantages an investigator gains by having the ability to analyze network-based crimes. Propose how you, as someone in a management position, would emphasize this importance to your organization.
  • From the first e-Activity, summarize the article you researched and specify how cyberforensics were utilized to analyze the crime. Provide an example with your response.

 

Week 7 DQ 2

 

“Email Investigations” Please respond to the following:

  • Compare and contrast forensic investigations of email in a client-server environment and webmail environments. Choose which one you believe is the more difficult of these investigations and provide a rationale with your response. Determine if you believe mobile device email has increased the difficulty with email evidence gathering and if you believe this will continue to evolve in the future.
  • From the second e-Activity, suppose you are a Chief Information Security Officer (CISO) for a large corporation. Choose what you believe is the greatest concern with email investigations. Conclude whether or not you agree with the authors that speed in preservation is the key to an email investigation. Justify your response.

 

 

CIS 562 Week 7 Discussion,CIS 562 Week 7 Discussion,CIS 562 Week 7 Discussion,CIS 562 Week 7 DiscussionCIS 562 Week 7 DiscussionCIS 562 Week 7 DiscussionCIS 562 Week 7 DiscussionCIS 562 Week 7 Discussion

CIS 562 Week 10 Discussion

CIS 562 Week 10 Discussion

 

    • Determine what role the professional organization should play in the ethical makeup of an investigator and / or expert witness and explicate whether or not you believe an organization’s code of ethics could negatively affect an investigator and / or expert witness.
    • Identify three ethical responsibilities expected from persons such as attorneys, the court, and others, when protecting an expert witness in a case. Determine how they should protect the expert witness and how unethical actions by others could negatively affect an expert witness. Provide a rationale with your response.
    CIS 562 Week 10 Discussion 2
    • Suppose you are a director for a system forensics company. Develop a list of ethical guidelines that you would publish for your employees based on ethical standards from appropriate sources, such as professional associations. Justify why the items in your guidelines are necessary to add to the code.
    • Create a scenario that presents an ethical dilemma for an expert witness. Determine why this would be a dilemma for the expert witness and how you believe he / she should handle such a scenario in an ethical manner.
    • .
    • Determine what role the professional organization should play in the ethical makeup of an investigator and / or expert witness and explicate whether or not you believe an organization’s code of ethics could negatively affect an investigator and / or expert witness.
    • Identify three ethical responsibilities expected from persons such as attorneys, the court, and others, when protecting an expert witness in a case. Determine how they should protect the expert witness and how unethical actions by others could negatively affect an expert witness. Provide a rationale with your response.
    CIS 562 Week 10 Discussion 2
    • Suppose you are a director for a system forensics company. Develop a list of ethical guidelines that you would publish for your employees based on ethical standards from appropriate sources, such as professional associations. Justify why the items in your guidelines are necessary to add to the code.
    • Create a scenario that presents an ethical dilemma for an expert witness. Determine why this would be a dilemma for the expert witness and how you believe he / she should handle such a scenario in an ethical manner.
    • .

     

 

 

Latest A+ Graded at link below

 

 

 

https://hwacer.com/Tutorial/cis-562-week-10-discussion/

 

 

 

 

 

  • Determine what role the professional organization should play in the ethical makeup of an investigator and / or expert witness and explicate whether or not you believe an organization’s code of ethics could negatively affect an investigator and / or expert witness.
  • Identify three ethical responsibilities expected from persons such as attorneys, the court, and others, when protecting an expert witness in a case. Determine how they should protect the expert witness and how unethical actions by others could negatively affect an expert witness. Provide a rationale with your response.

 

 

CIS 562 Week 6 discussion

CIS 562 Week 6 discussion

 

“Validation” Please respond to the following:

  • Analyze the purpose of validating forensic data and determine why this is a necessary component of the investigation and analysis process.
  • As a system forensics manager, justify the importance of validation and determine the best method to use.

 

 

 

 

Latest A+ Graded at link below

 

 

 

https://hwacer.com/Tutorial/cis-562-week-6-discussion/

 

 

“Validation” Please respond to the following:

  • Analyze the purpose of validating forensic data and determine why this is a necessary component of the investigation and analysis process.
  • As a system forensics manager, justify the importance of validation and determine the best method to use.

 

 

 

“Validation” Please respond to the following:

  • Analyze the purpose of validating forensic data and determine why this is a necessary component of the investigation and analysis process.
  • As a system forensics manager, justify the importance of validation and determine the best method to use.

 

 

 

 

“Validation” Please respond to the following:

  • Analyze the purpose of validating forensic data and determine why this is a necessary component of the investigation and analysis process.
  • As a system forensics manager, justify the importance of validation and determine the best method to use.

 

 

 

 

“Validation” Please respond to the following:

  • Analyze the purpose of validating forensic data and determine why this is a necessary component of the investigation and analysis process.
  • As a system forensics manager, justify the importance of validation and determine the best method to use.

 

 

“Validation” Please respond to the following:

  • Analyze the purpose of validating forensic data and determine why this is a necessary component of the investigation and analysis process.
  • As a system forensics manager, justify the importance of validation and determine the best method to use.

 

 

 

“Validation” Please respond to the following:

  • Analyze the purpose of validating forensic data and determine why this is a necessary component of the investigation and analysis process.
  • As a system forensics manager, justify the importance of validation and determine the best method to use.

 

 

CIS 562 Week 6 discussion,CIS 562 Week 6 discussion,CIS 562 Week 6 discussionCIS 562 Week 6 discussionCIS 562 Week 6 discussionCIS 562 Week 6 discussion