JohnMiller_Termpaper outline (3)
.docx
keyboard_arrow_up
School
American Military University *
*We aren’t endorsed by this school
Course
351
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
4
Uploaded by MajorField11399 on coursehero.com
Digital Forensics and its Pivotal Role in investigations and Solving Cases
John Miller (4122216)
ISSC351
Thesis:
The application of digital forensics played a pivotal role in investigating and solving the case of
the fatal shooting of Air Force Captain Marty Thee, providing critical evidence, uncovering digital
trails, and aiding in the prosecution of John Diamond, ultimately contributing to the pursuit of
justice in this tragic incident. On Dec. 17, 2000, John Diamond shot and killed Air Force Capt.
Marty Theer. "There [was] no direct evidence, no eyewitness evidence. There is no physical
evidence. There is no confusion," said Theer's attorney Daniel Pollitt after the conviction.
But what prosecutors did have was 88,000 e-mails and instant messages on Theer's computer,
including personal ads that Theer had written in 1999, web-mail that she had written in response
to those ads, clear evidence of a sexual relationship between Theer and Diamond, and
messages documenting the conspiracy to murder Theer's husband.
Introduction
●
Briefly introduce the topic of computer-related crimes.
●
Provide context for the importance of computer forensics in solving these crimes.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Rei computer program was published by distributed by her company without
her consent. This happened a year after Rei resigned from her position. Do
you think a cybercrime was committed? *
No, there wasn't what the company did was in their jurisdiction considering that Rei
was their former employee
Yes there was, Rei is a victim of social engineering since they published the program
without the distribution rights or even consent given by Rei
No, there wasn't since it is a computer program and copyright only applies to
materials that are literary
Yes there was, Rei was a victim of copy right infringement since the creative right of
the program is own by its developer or the programmer and without Rei consent what
the company did was unlawful
arrow_forward
Examples of data privacy breaches: We'll next discuss several precautionary strategies.
arrow_forward
List three questions that should be asked in a computer forensics investigation.
hint: Computer forensics, or digital forensics, is the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody.
arrow_forward
________ is a discipline that combines elements of law and computer science toidentify, collect, examine, and preserve data from computer system, networks, andstorage devices in a manner that preserves the integrity of data gathered so that it isadmissible as evidence in a court of law
arrow_forward
This week, we learned about oversharing and how it can help an attacker gain access to important user credentials. As you’ll see throughout the semester, sharing certain information online can potentially lead to a lot of problems later.
NOVA Labs put together an interesting story.A Cyber Privacy Parable (3:27)Links to an external site.Minimize VideoWatch the video and read the prompt above, and then respond to the following questions:
Why do you feel that people should (or should not) be concerned about oversharing?
What types of information do you share on your social media accounts?
Let’s say that you saw a friend post the following message to her Twitter account:
As someone familiar with cybersecurity, do you see anything wrong with this post?
After seeing this posted online, what would you say (if anything) to your friend?
Please make sure that all of your answers are numbered and in full sentences!
arrow_forward
INTRODUCTION TO INFORMATIO
The purpose of injurious falsehood or business disparagement is to protect the economic interests of the injured party
against pecuniary loss resulting from the publication.
Select one:
O True
O False
The oil industry files a defamation action against the President of the United States for allegedly defamatory statements
made by the President during the president's official weekly video address transmitted via the White House website.
Which defense would the President likely assert?
Select one:
O a. Privilege
O b. Mistake
C. Section 230 of the Communications Decency Act
O d. Consent
Which of the following is not generally a defense in an online defamation action but may be relevant to the amount of
arrow_forward
Hi I want to make a video presentation on this topic which should be 5 mins atleast, so need help below format:
Discussion: Misadventures of a Nation State Podcast
Discuss Darknet Diaries Episode 10. Why is this a video discussion instead of a written response? It is an important skill to master to be able to present and summarize the key concepts of a complex cybersecurity incident in a short time frame. Remember that unless you are talking to other cybersecurity professionals, probably no one thinks this stuff is as interesting as you do.
Instructions: The main purpose of the video discussion assignments is to get you to dig into the main four cybersecurity frameworks and references we use in the class. Use the context of the specific security incident to explore and explain some aspects of the NIST CSF, the CIS CSCs, ACSC Strategies to Mitigate Cyber Incidents, and the MITRE ATT&CK matrix.
Keep each discussion sub-topic focused and to approximately 1 minute for a TOTAL video…
arrow_forward
legal aspects of cybersecurity
The Supreme Court’s decision in US v. Jones was notable because of its discussion ofprivacy rights in the information technology age. Reading Justice Scalia’s opinion inconjunction with Justice Alito’s opinion, which of the following is not a mistake lawenforcement made in gathering evidence against Jones?A. Allowing the initial warrant’s timeframe to lapse before installing the GPS.B. Using a GPS to track Jones’ whereabouts for an extended period of time.C. Utilizing a product that is generally prohibitively expensive in the consumermarket.D. Committing a trespass by attaching a device to a vehicle.
arrow_forward
The Equifax Data Breach
In 2017, from mid-May to July, hackers gained unauthorized access to servers used by Equifax, a major credit reporting agency, and accessed the personal information of nearly one-half the U.S. population.9 Equifax executives sold off nearly $2 million of company stock they owned after finding out about the hack in late July, weeks before it was publicly announced on September 7, 2017, in potential violation of insider trading rules. The company’s shares fell nearly 14 percent after the announcement, but few expect Equifax managers to be held liable for their mistakes, face any regulatory discipline, or pay any penalties for profiting from their actions. To make amends to customers and clients in the aftermath of the hack, the company offered free credit monitoring and identity-theft protection. On September 15, 2017, the company’s chief information officer and chief of security retired. On September 26, 2017, the CEO resigned, days before he was to testify…
arrow_forward
Identity theft, in which private information is stolen, is a major concern for organizations and individuals alike. Let's say you manage the data for a huge company that has made its massive database available online. How would you avoid identity theft if you were in charge of a company's data storage system?
arrow_forward
Introduction to Computing Group Activity
Can Data Predict Your Grade?
background
As you move through your academic career, you leave an enormous swath of data: which courses
you chose to register for; which ones you looked at but didn't pick; and how you did on each
homework assignment, test, and project. Could this massive amount of data be analyzed to predict
your grade in a course? Could the data suggest which courses you should take next? Should those
predictions be public to your instructor, to you, and to financial aid officers?
research topics to consider
• Course Signals
• Degree Compass, Austin Peay State University
process
1. Divide the class into teams. Each team will select a webbased tool that allows access to
information.
2. Team members should each think of a situation where a person would benefit from the type
of results data mining can bring to a campus and a situation where it might be undesirable.
3. Team members should select the most powerful and best-constructed…
arrow_forward
Listen to the podcast and briefly answer the below questions with
Don’t Panic: The Unit 42 Podcast
Link to the podcast hxxps://unit42.libsyn.com
1) What you learned about this InfoSec topic?2) What further questions you have about this InfoSec topic?3) If you are interested in delving deeper into this InfoSec topic. Why or why not?4) If you think you'll listen to this podcast (or read this blog) in the future. Why or why not?
arrow_forward
legal aspect of cybersecurity
ScarJo Services, Inc. is a New York company allowing customers from around theworld to set up sight-seeing tours of cities where Scarlet Johansson has filmedmemorable scenes in film. One day, ScarJo gets an email from “Liev Kieturakis,” whoclaims to have used ScarJo’s services last year and wants all of his information deletedfrom ScarJo’s databases pursuant to GDPR. Which of the following should be ScarJo’sfirst response to Liev?A. Confirm receipt of request.B. Seek authentication that Liev is a ScarJo customer.C. Erase all information related to Liev within 30 days.D. Deny Liev’s request.
arrow_forward
Have you ever seen someone being harassed or tormented by another person on the internet? What was your first response when you learned about the situation? How did you get to the conclusion that the individual had been the victim of bullying conduct prior to your intervention?
arrow_forward
In this day and age, what specific federal legislation regulate the safeguarding of personally identifiable information and the response to the discovery of data breaches?
arrow_forward
Discuss with at least one (1) example the fundamental values and principles of ethical behavior and conduct that are required by digital forensic practitioners
arrow_forward
Is there a precise explanation of what the noun "privacy" means? Create a list of the top five things you can do to protect the confidentiality of your personal information.
arrow_forward
You are assisting with the Investigation of a report of Bestiality, and have been accessed to conduct the digital forensic examination of the Suspect’s Cellular telephone. You have been provided with a Warrant, which authorizes you to acquire a forensic image of all data on the phone, and then conduct a subsequent review of the data for images or videos of obscenity involving animals. The Warrant authorizes you to search all files and folders on the phone, to include deleted files, unallocated space which may exist on the phones flash memory, and, to conduct the same examination of any SD Card the phone may contain.
After conducting an acquisition of the data using the Cellebrite Physical Analyzer Mobile Device Toolkit, you realize no images or videos were extracted. After a little research, you realize that the phone uses a Cloud Based storage system, by default, to save all pictures and videos to the users Google Drive. In an attempt to verify this setting, you set up a digital…
arrow_forward
You are assisting with the Investigation of a report of Bestiality, and have been accessed to conduct the digital forensic examination of the Suspect’s Cellular telephone. You have been provided with a Warrant, which authorizes you to acquire a forensic image of all data on the phone, and then conduct a subsequent review of the data for images or videos of obscenity involving animals. The Warrant authorizes you to search all files and folders on the phone, to include deleted files, unallocated space which may exist on the phones flash memory, and, to conduct the same examination of any SD Card the phone may contain.
After conducting an acquisition of the data using the Cellebrite Physical Analyzer Mobile Device Toolkit, you realize no images or videos were extracted. After a little research, you realize that the phone uses a Cloud Based storage system, by default, to save all pictures and videos to the users Google Drive. In an attempt to verify this setting, you set up a digital…
arrow_forward
What is the significance of fingerprint in the modern criminal investigation?
arrow_forward
You are assisting with the Investigation of a report of Bestiality, and have been accessed to conduct the digital forensic examination of the Suspect’s Cellular telephone. You have been provided with a Warrant, which authorizes you to acquire a forensic image of all data on the phone, and then conduct a subsequent review of the data for images or videos of obscenity involving animals. The Warrant authorizes you to search all files and folders on the phone, to include deleted files, unallocated space which may exist on the phones flash memory, and, to conduct the same examination of any SD Card the phone may contain.
After conducting an acquisition of the data using the Cellebrite Physical Analyzer Mobile Device Toolkit, you realize no images or videos were extracted. After a little research, you realize that the phone uses a Cloud Based storage system, by default, to save all pictures and videos to the users Google Drive. In an attempt to verify this setting, you set up a digital…
arrow_forward
Discuss the Importance of Maintaining an Evidence Form and Establishing a Chain of Custody During an Investigation
arrow_forward
legal aspects of cybersecurity
Taissa, Sophie, Natalie, Misty, and Jackie all share a house in downtown Dayton. Duringthe great blizzard of 2023, all five co-habitants were snowed in and quickly ran out offood. Jackie tried to leave the house to get food, but quickly fell in the snow. Jackie’sroommates then murdered Jackie, and ate some of her remains to survive. Now the snowhas melted, and the girls are worried about the police finding out what they did.
Natalie has had enough. She takes Jackie’s remains, throws them in a black, thick,hefty bag, and tosses them into the Rumpke dumpster she wheels from the side of thehouse, past the fence surrounding her house, and onto the curb in front of her house thenight before trash collection. Police have been waiting in a car on the street andimmediately search the hefty bag as soon as Natalie goes inside the house. Police findthe remains, obtain a warrant for the home, and arrest the girls. Did the police commitany Fourth Amendment…
arrow_forward
legal aspects of cybersecurity
Taissa, Sophie, Natalie, Misty, and Jackie all share a house in downtown Dayton. Duringthe great blizzard of 2023, all five co-habitants were snowed in and quickly ran out offood. Jackie tried to leave the house to get food, but quickly fell in the snow. Jackie’sroommates then murdered Jackie, and ate some of her remains to survive. Now the snowhas melted, and the girls are worried about the police finding out what they did.
Taissa wants to keep some evidence to blackmail her friends just in case things turnsour in the future. Whenever the girls discuss Jackie’s murder, Taissa surreptitiouslyrecords the discussions on her iPhone without anyone else knowing. Which of thefollowing best describes Taissa’s actions?A. Taissa committed an unconstitutional act.B. Taissa violated the Wiretap ActC. Taissa violated the Electronic Communications Privacy ActD. Taissa’s actions recording her friends are legal in most states.
arrow_forward
Have you ever seen someone being harassed or bullied by someone else over the internet? When you initially learned of the issue, what was the very first thing that went through your head? How did you get at the conclusion that the individual had been the target of bullying conduct prior to your intervention? In other words, how did you come to that conclusion?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Related Questions
- Rei computer program was published by distributed by her company without her consent. This happened a year after Rei resigned from her position. Do you think a cybercrime was committed? * No, there wasn't what the company did was in their jurisdiction considering that Rei was their former employee Yes there was, Rei is a victim of social engineering since they published the program without the distribution rights or even consent given by Rei No, there wasn't since it is a computer program and copyright only applies to materials that are literary Yes there was, Rei was a victim of copy right infringement since the creative right of the program is own by its developer or the programmer and without Rei consent what the company did was unlawfularrow_forwardExamples of data privacy breaches: We'll next discuss several precautionary strategies.arrow_forwardList three questions that should be asked in a computer forensics investigation. hint: Computer forensics, or digital forensics, is the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody.arrow_forward
- ________ is a discipline that combines elements of law and computer science toidentify, collect, examine, and preserve data from computer system, networks, andstorage devices in a manner that preserves the integrity of data gathered so that it isadmissible as evidence in a court of lawarrow_forwardThis week, we learned about oversharing and how it can help an attacker gain access to important user credentials. As you’ll see throughout the semester, sharing certain information online can potentially lead to a lot of problems later. NOVA Labs put together an interesting story.A Cyber Privacy Parable (3:27)Links to an external site.Minimize VideoWatch the video and read the prompt above, and then respond to the following questions: Why do you feel that people should (or should not) be concerned about oversharing? What types of information do you share on your social media accounts? Let’s say that you saw a friend post the following message to her Twitter account: As someone familiar with cybersecurity, do you see anything wrong with this post? After seeing this posted online, what would you say (if anything) to your friend? Please make sure that all of your answers are numbered and in full sentences!arrow_forwardINTRODUCTION TO INFORMATIO The purpose of injurious falsehood or business disparagement is to protect the economic interests of the injured party against pecuniary loss resulting from the publication. Select one: O True O False The oil industry files a defamation action against the President of the United States for allegedly defamatory statements made by the President during the president's official weekly video address transmitted via the White House website. Which defense would the President likely assert? Select one: O a. Privilege O b. Mistake C. Section 230 of the Communications Decency Act O d. Consent Which of the following is not generally a defense in an online defamation action but may be relevant to the amount ofarrow_forward
- Hi I want to make a video presentation on this topic which should be 5 mins atleast, so need help below format: Discussion: Misadventures of a Nation State Podcast Discuss Darknet Diaries Episode 10. Why is this a video discussion instead of a written response? It is an important skill to master to be able to present and summarize the key concepts of a complex cybersecurity incident in a short time frame. Remember that unless you are talking to other cybersecurity professionals, probably no one thinks this stuff is as interesting as you do. Instructions: The main purpose of the video discussion assignments is to get you to dig into the main four cybersecurity frameworks and references we use in the class. Use the context of the specific security incident to explore and explain some aspects of the NIST CSF, the CIS CSCs, ACSC Strategies to Mitigate Cyber Incidents, and the MITRE ATT&CK matrix. Keep each discussion sub-topic focused and to approximately 1 minute for a TOTAL video…arrow_forwardlegal aspects of cybersecurity The Supreme Court’s decision in US v. Jones was notable because of its discussion ofprivacy rights in the information technology age. Reading Justice Scalia’s opinion inconjunction with Justice Alito’s opinion, which of the following is not a mistake lawenforcement made in gathering evidence against Jones?A. Allowing the initial warrant’s timeframe to lapse before installing the GPS.B. Using a GPS to track Jones’ whereabouts for an extended period of time.C. Utilizing a product that is generally prohibitively expensive in the consumermarket.D. Committing a trespass by attaching a device to a vehicle.arrow_forwardThe Equifax Data Breach In 2017, from mid-May to July, hackers gained unauthorized access to servers used by Equifax, a major credit reporting agency, and accessed the personal information of nearly one-half the U.S. population.9 Equifax executives sold off nearly $2 million of company stock they owned after finding out about the hack in late July, weeks before it was publicly announced on September 7, 2017, in potential violation of insider trading rules. The company’s shares fell nearly 14 percent after the announcement, but few expect Equifax managers to be held liable for their mistakes, face any regulatory discipline, or pay any penalties for profiting from their actions. To make amends to customers and clients in the aftermath of the hack, the company offered free credit monitoring and identity-theft protection. On September 15, 2017, the company’s chief information officer and chief of security retired. On September 26, 2017, the CEO resigned, days before he was to testify…arrow_forward
- Identity theft, in which private information is stolen, is a major concern for organizations and individuals alike. Let's say you manage the data for a huge company that has made its massive database available online. How would you avoid identity theft if you were in charge of a company's data storage system?arrow_forwardIntroduction to Computing Group Activity Can Data Predict Your Grade? background As you move through your academic career, you leave an enormous swath of data: which courses you chose to register for; which ones you looked at but didn't pick; and how you did on each homework assignment, test, and project. Could this massive amount of data be analyzed to predict your grade in a course? Could the data suggest which courses you should take next? Should those predictions be public to your instructor, to you, and to financial aid officers? research topics to consider • Course Signals • Degree Compass, Austin Peay State University process 1. Divide the class into teams. Each team will select a webbased tool that allows access to information. 2. Team members should each think of a situation where a person would benefit from the type of results data mining can bring to a campus and a situation where it might be undesirable. 3. Team members should select the most powerful and best-constructed…arrow_forwardListen to the podcast and briefly answer the below questions with Don’t Panic: The Unit 42 Podcast Link to the podcast hxxps://unit42.libsyn.com 1) What you learned about this InfoSec topic?2) What further questions you have about this InfoSec topic?3) If you are interested in delving deeper into this InfoSec topic. Why or why not?4) If you think you'll listen to this podcast (or read this blog) in the future. Why or why not?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning