Assignment 3 CCJS 321
.docx
keyboard_arrow_up
School
University of Maryland, College Park *
*We aren’t endorsed by this school
Course
321
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
8
Uploaded by BrigadierIceStarling13
1
Assignment 3
Jae Woo
CCJS 321 Section 6382
Professor Daniel Grove
03/03/2023
2
The first ethical dilemma for a digital forensic practitioner is the use of publication. The
potential impact of results from digital forensic research not becoming publicly available can be
a major risk or issue. Users of the software that contains evidence could attempt to hide the
evidence in an unlawful manner and then switch to a more effective product that is capable of
erasing the data in question. The developers may decide to take the published research and
develop updates that can fix the problem. Now that the software can erase the locations, this
will deny the use of important evidence for the digital forensic practitioners. The best way to
ensure that the integrity of this ethical dilemma isn’t questioned upon is through the practice of
publishing results of research to set limitations and help with protect the victim’s personal
privacy (Hargreaves, 2020).
The second ethical dilemma for a digital forensic practitioner is the mislabeling of professional
credentials. Misrepresentations which include educational degrees, licensures, or certifications
can be a huge ethical issue of dishonesty to the workplace. This is usually the case to impress
clients, judge, or jury to avoid challenges. One way to avoid this type of ethical dishonesty is to
do a thorough background check of the professional before admitting them into the company as
a new hire (Yadav, 2017).
The Google Home Voice Controller is an IoT device created for users to enjoy certain
features and entertainment like media, alarms, and lights with just by the sound of their voice.
This device is made for the comfort of the user and adds extra help for the disabled by allowing
such a simple command of their own voice to accomplish tasks. The Amazon Dash Button is a
device that ensures that the user doesn’t lack specific household items like soft drinks,
3
groceries, and personal care items. This device allows the user to order products quickly for the
convenience of the user. The August Doorbell Cam is a very effective IoT device. This allows the
user to answer the door from anywhere while also constantly checking the doors as well as
capturing motion changes at the doorstep. This device is created to allow the user to let their
guests inside very easily while also recording through a camera for added safety.
The Google Home Voice Controller could contain valuable data for an investigation if the
suspects or victim uses this device. The little bits of information stored on this device which
includes the specific temperature the user likes, what time the users wake up every morning,
and the specific media that the user is connected to are small but detailed bits of evidence that
could be included in this device. All the data stored on this IoT device is encrypted and practices
keeping personal data within the application or the device itself to help protect privacy,
however, installing third-party apps may allow for risk of malicious apps that is being installed
that can steal sensitive and personal information (Kelly, 2019). The Amazon Dash Button device
can be useful evidence with the stored data in the device which includes the specific shopping
carts made by the user. This will give the investigators an idea on what the user could be
purchasing and why. All the data in this device is only stored within this device but can be
acquired if the user have access to the personal login information (Newman, 2016). The August
Doorbell Cam is valuable during an investigation due to the surprising amount of data that is
stored in this device. Just like most IoT devices, the doorbell cam contains a lot of personal
information including phone number, email address, postal address, and IP address. These are
good enough evidence for the investigator to gather (Security.org, 2022).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Title: Ransomware Attack and Prevention Strategies
Objective: The objective of this assignment is to research and propose prevention strategies for ransomware attacks, which have become a growing threat to individuals, organizations, and even governments.
Task:
Provide an overview of what ransomware attack are, including how they work and the motivation behind them. Present real-life examples of notable ransomware attacks and their impact on various entities. Explain the common vectors through which ransomware is delivered, such as phishing emails, malicious downloads, and vulnerabilities in software.
Present a range of preventive measures that individuals and organizations can take to minimize the risk of ransomware attacks. This could include regular software updates, employee training, and endpoint security solutions.
arrow_forward
What is Digital Fingerprinting and for what purposes is it used?
How does the fingerprinting algorithm work? Describe its principle of operation.
Certain steps are followed to reach the desired result- either block, delete or authorize usage of content.
Some cybersecurity experts say that fingerprinting is abusive and exposes the privacy issues of users. Certain solutions were done by some browsers for blocking browser fingerprinting. Describe the measures taken by any of the browsers as a fingerprint defense mechanism.
List two common Fingerprinting Algorithms.
arrow_forward
When operating systems and most other types of software are first released, they are not completely bug-free.There are applications available that contain tens of thousands of bugs.Known flaws in published software are routinely addressed by software companies through the distribution of patches (also known as patches).Hackers and other criminals frequently launch zero-day attacks the day after a new vulnerability is publicly disclosed. No one can deny that these criminals' actions are unethical, but what duty does a software company have if their negligence or haste to market causes harm to customers? What are computer users' responsibilities in terms of staying up to date on security patches?
arrow_forward
Computer Security is one of the fastest-moving fields in the world today. There are generally several incidents each week, including data breaches, large scale attacks, or some advancement in security research (i.e. new tools, techniques, vulnerabilities, or exploits). Select a recent event from your favorite security news source and summarize it. Include your source and an analysis of the event, including a summary of what happened, any new information from the event that changes current security practice, and any larger scale implications from the event. Relate the event to the topics in Chapter 1 of the book, namely the CIA triad, U.S. Compliance Laws (if any), IT domains, security policy, and/or data classification. In addition, relate the event to a biblical example.
arrow_forward
Computer hacking is the act of identifying and exploiting system and network vulnerabilities in order to obtain unauthorized access to those systems. Hacking costs companies and consumers trillions of dollars every year. But not all hacking is malicious. White hat hackers may work in cyber security or as software engineers and testers seeking out vulnerabilities inorder to fix them.
Based on the description given above, ELABORATE you answer from the questions below:As a computer user, what sorts of anomalies would you look for to identify a compromised system?
As a computer user, what should you do once you identify that your computer device has been compromised?
As a computer user, how would you strengthen user authentication?
- ELABORATE THE ANSWERS.
arrow_forward
Computer hacking is the act of identifying and exploiting system and network vulnerabilities in order to obtain unauthorized access to those systems. Hacking costs companies and consumers trillions of dollars every year. But not all hacking is malicious. White hat hackers may work in cyber security or as software engineers and testers seeking out vulnerabilities inorder to fix them.
Based on the description given above, ELABORATE you answer from the questions below:As a computer user, what sorts of anomalies would you look for to identify a compromised system?
As a computer user, what should you do once you identify that your computer device has been compromised?
As a computer user, how would you strengthen user authentication?
arrow_forward
It might be difficult to appreciate the value of privacy in the context of data protection.
arrow_forward
Operating systems and most other types of software aren't completely bug-free when they're initially launched. There are applications out there that have tens of thousands of issues, which are referred to as bugs. Known problems with published software are routinely corrected by software firms via the provision of fixes (also known as patches). The day after a new vulnerability is publicly disclosed, hackers and other criminals often launch zero-day assaults to exploit it. No one can deny that these criminals' actions are unethical, but in the event that their negligence or haste to market causes harm to customers, what duty does a software firm have? What responsibilities do computer users have in terms of staying up to date on security patches?
arrow_forward
In the field of digital forensics, you have access to a wide variety of different types of instruments. What are some of the benefits and drawbacks of the different kinds?
arrow_forward
According to several cybersecurity specialists, fingerprinting is abusive and exposes users' privacy concerns. Some browsers have developed methods to prevent fingerprinting. Multiple attempts have been made by browsers to defend themselves from biometric recognition.
arrow_forward
Hacktivists often use DDoS attacks against organizations that they perceive as being opposed to them. This includes not only government but also journalists, publications, and human rights groups. Google's parent Alphabet has stepped up to help with thwarting DDoS against these groups. Since 2016 Project Shield has thwarted DDoS attacks against hundreds of websites in over 80 countries. These attacks were directed at websites in order to silence important information. Project Shield was offered for free to journalists, small publications, human rights groups, and others. But Google is doing that from its own initiative at a relatively high cost. Should there instead be a tax on computer hardware and/or software that goes towards a fund that is then used for organizations like this to have permanent DDOS mitigation?
arrow_forward
Expert data hackers are exploiting vulnerabilities in the banking industry. The efforts of The Cybersecurity and Infrastructure Security Agency of the United States (CISA) increased the conviction rate due to coordinated efforts of exchanging information about data intrusion events across the United States Banking Industry.
Instructions
The purpose and intent to detect irregular patterns is a priority with CISA more than in the past, as highly classified information is being lost and passwords and logins are being stolen (such as those belonging to the Pentagon).
Research the (CISA) topic list for three frauds perpetrated by hackers show on the Department of Homeland Security's TopicsLinks to an external site. page.
Describe how each fraud is perpetrated and devise a cyber-detection risk plan according the direction of the CISA rules. Support your rationale and provide examples.
arrow_forward
Discussion Forum - Unit 7
Activity 1
TASK A:
Discuss the following questions, identifying possible reasons and motives for the users at both sides of the spectrum:
Discuss why users try to break into other user's computers and information systems
Discuss why users create viruses.
Discuss who owns electronic mail systems, and why they do
TASK B:
Answer the question posed in the Panama Papers Vignette - Was it wrong to hack and leak the Panama Papers?
What technology issues led to the security breach in the Panama Papers case. What is the possible business impact of this security breach for the law firm and its customers? What should the law firm do in the future to avoid similar incidents?
TASK C:
What is the difference between a business continuity plan and a disaster recovery plan?
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Related Questions
- Title: Ransomware Attack and Prevention Strategies Objective: The objective of this assignment is to research and propose prevention strategies for ransomware attacks, which have become a growing threat to individuals, organizations, and even governments. Task: Provide an overview of what ransomware attack are, including how they work and the motivation behind them. Present real-life examples of notable ransomware attacks and their impact on various entities. Explain the common vectors through which ransomware is delivered, such as phishing emails, malicious downloads, and vulnerabilities in software. Present a range of preventive measures that individuals and organizations can take to minimize the risk of ransomware attacks. This could include regular software updates, employee training, and endpoint security solutions.arrow_forwardWhat is Digital Fingerprinting and for what purposes is it used? How does the fingerprinting algorithm work? Describe its principle of operation. Certain steps are followed to reach the desired result- either block, delete or authorize usage of content. Some cybersecurity experts say that fingerprinting is abusive and exposes the privacy issues of users. Certain solutions were done by some browsers for blocking browser fingerprinting. Describe the measures taken by any of the browsers as a fingerprint defense mechanism. List two common Fingerprinting Algorithms.arrow_forwardWhen operating systems and most other types of software are first released, they are not completely bug-free.There are applications available that contain tens of thousands of bugs.Known flaws in published software are routinely addressed by software companies through the distribution of patches (also known as patches).Hackers and other criminals frequently launch zero-day attacks the day after a new vulnerability is publicly disclosed. No one can deny that these criminals' actions are unethical, but what duty does a software company have if their negligence or haste to market causes harm to customers? What are computer users' responsibilities in terms of staying up to date on security patches?arrow_forward
- Computer Security is one of the fastest-moving fields in the world today. There are generally several incidents each week, including data breaches, large scale attacks, or some advancement in security research (i.e. new tools, techniques, vulnerabilities, or exploits). Select a recent event from your favorite security news source and summarize it. Include your source and an analysis of the event, including a summary of what happened, any new information from the event that changes current security practice, and any larger scale implications from the event. Relate the event to the topics in Chapter 1 of the book, namely the CIA triad, U.S. Compliance Laws (if any), IT domains, security policy, and/or data classification. In addition, relate the event to a biblical example.arrow_forwardComputer hacking is the act of identifying and exploiting system and network vulnerabilities in order to obtain unauthorized access to those systems. Hacking costs companies and consumers trillions of dollars every year. But not all hacking is malicious. White hat hackers may work in cyber security or as software engineers and testers seeking out vulnerabilities inorder to fix them. Based on the description given above, ELABORATE you answer from the questions below:As a computer user, what sorts of anomalies would you look for to identify a compromised system? As a computer user, what should you do once you identify that your computer device has been compromised? As a computer user, how would you strengthen user authentication? - ELABORATE THE ANSWERS.arrow_forwardComputer hacking is the act of identifying and exploiting system and network vulnerabilities in order to obtain unauthorized access to those systems. Hacking costs companies and consumers trillions of dollars every year. But not all hacking is malicious. White hat hackers may work in cyber security or as software engineers and testers seeking out vulnerabilities inorder to fix them. Based on the description given above, ELABORATE you answer from the questions below:As a computer user, what sorts of anomalies would you look for to identify a compromised system? As a computer user, what should you do once you identify that your computer device has been compromised? As a computer user, how would you strengthen user authentication?arrow_forward
- It might be difficult to appreciate the value of privacy in the context of data protection.arrow_forwardOperating systems and most other types of software aren't completely bug-free when they're initially launched. There are applications out there that have tens of thousands of issues, which are referred to as bugs. Known problems with published software are routinely corrected by software firms via the provision of fixes (also known as patches). The day after a new vulnerability is publicly disclosed, hackers and other criminals often launch zero-day assaults to exploit it. No one can deny that these criminals' actions are unethical, but in the event that their negligence or haste to market causes harm to customers, what duty does a software firm have? What responsibilities do computer users have in terms of staying up to date on security patches?arrow_forwardIn the field of digital forensics, you have access to a wide variety of different types of instruments. What are some of the benefits and drawbacks of the different kinds?arrow_forward
- According to several cybersecurity specialists, fingerprinting is abusive and exposes users' privacy concerns. Some browsers have developed methods to prevent fingerprinting. Multiple attempts have been made by browsers to defend themselves from biometric recognition.arrow_forwardHacktivists often use DDoS attacks against organizations that they perceive as being opposed to them. This includes not only government but also journalists, publications, and human rights groups. Google's parent Alphabet has stepped up to help with thwarting DDoS against these groups. Since 2016 Project Shield has thwarted DDoS attacks against hundreds of websites in over 80 countries. These attacks were directed at websites in order to silence important information. Project Shield was offered for free to journalists, small publications, human rights groups, and others. But Google is doing that from its own initiative at a relatively high cost. Should there instead be a tax on computer hardware and/or software that goes towards a fund that is then used for organizations like this to have permanent DDOS mitigation?arrow_forwardExpert data hackers are exploiting vulnerabilities in the banking industry. The efforts of The Cybersecurity and Infrastructure Security Agency of the United States (CISA) increased the conviction rate due to coordinated efforts of exchanging information about data intrusion events across the United States Banking Industry. Instructions The purpose and intent to detect irregular patterns is a priority with CISA more than in the past, as highly classified information is being lost and passwords and logins are being stolen (such as those belonging to the Pentagon). Research the (CISA) topic list for three frauds perpetrated by hackers show on the Department of Homeland Security's TopicsLinks to an external site. page. Describe how each fraud is perpetrated and devise a cyber-detection risk plan according the direction of the CISA rules. Support your rationale and provide examples.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningManagement Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning