JohnMiller_Termpaper outline (3)
.docx
keyboard_arrow_up
School
American Military University *
*We aren’t endorsed by this school
Course
351
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
4
Uploaded by MajorField11399
Digital Forensics and its Pivotal Role in investigations and Solving Cases
John Miller (4122216)
ISSC351
Thesis:
The application of digital forensics played a pivotal role in investigating and solving the case of
the fatal shooting of Air Force Captain Marty Thee, providing critical evidence, uncovering digital
trails, and aiding in the prosecution of John Diamond, ultimately contributing to the pursuit of
justice in this tragic incident. On Dec. 17, 2000, John Diamond shot and killed Air Force Capt.
Marty Theer. "There [was] no direct evidence, no eyewitness evidence. There is no physical
evidence. There is no confusion," said Theer's attorney Daniel Pollitt after the conviction.
But what prosecutors did have was 88,000 e-mails and instant messages on Theer's computer,
including personal ads that Theer had written in 1999, web-mail that she had written in response
to those ads, clear evidence of a sexual relationship between Theer and Diamond, and
messages documenting the conspiracy to murder Theer's husband.
Introduction
●
Briefly introduce the topic of computer-related crimes.
●
Provide context for the importance of computer forensics in solving these crimes.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Phishing attack simulation using Packet Tracer is a critical exercise in understanding and defending against cyber threats. In a minimum of two paragraphs, please reflect on your understanding of this topic. Share your insights into what phishing attacks are, how they are simulated using Packet Tracer, and the importance of this exercise in enhancing cybersecurity awareness and skills. Additionally, discuss any challenges or key takeaways you've gained from the simulation, and how this experience contributes to your knowledge of cybersecurity practices.
arrow_forward
Rei computer program was published by distributed by her company without
her consent. This happened a year after Rei resigned from her position. Do
you think a cybercrime was committed? *
No, there wasn't what the company did was in their jurisdiction considering that Rei
was their former employee
Yes there was, Rei is a victim of social engineering since they published the program
without the distribution rights or even consent given by Rei
No, there wasn't since it is a computer program and copyright only applies to
materials that are literary
Yes there was, Rei was a victim of copy right infringement since the creative right of
the program is own by its developer or the programmer and without Rei consent what
the company did was unlawful
arrow_forward
List three questions that should be asked in a computer forensics investigation.
hint: Computer forensics, or digital forensics, is the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody.
arrow_forward
What is Digital Fingerprinting and for what purposes is it used?
How does the fingerprinting algorithm work? Describe its principle of operation.
Certain steps are followed to reach the desired result- either block, delete or authorize usage of content.
Some cybersecurity experts say that fingerprinting is abusive and exposes the privacy issues of users. Certain solutions were done by some browsers for blocking browser fingerprinting. Describe the measures taken by any of the browsers as a fingerprint defense mechanism.
List two common Fingerprinting Algorithms.
arrow_forward
You are assigned as a Cyber Investigator to a Computer Crimes Unit within the Department of Homeland Security. In your role, you are responsible for responding to crime scenes to collect items of digital evidence and conducting subsequent examinations of the things ordered. Legal analysis is inherent in your position, and you are required to document your legal authority for each investigation.
Today, you responded to a College Dormitory to investigate an unidentified individual downloading Child Sexual Abuse Material (CSAM). In the proceeding days, you downloaded 200 Gigabytes of known CSAM from a user over Peer2Peer software. During the download, you were able to identify the Suspect's Internet Protocol Address, as well as a Port Number. You specified the Suspect was using IP Address 71.143.70.239:8451. Subsequently, the Internet Service Provider identified that l leased the IP Address to University Dorm Rooms.
After coordinating with the university Office of Technology…
arrow_forward
________ is a discipline that combines elements of law and computer science toidentify, collect, examine, and preserve data from computer system, networks, andstorage devices in a manner that preserves the integrity of data gathered so that it isadmissible as evidence in a court of law
arrow_forward
g. Illicit Cryptomining Create a presentation to discuss a certain abuse assigned to you. The discussion/presentation must focus on the following: 1. Nature of the abuse (types, operation, tools, etc.) 2. Actual case/news 3. Causes of abuse (reasons for committing the crime) 4. Effect/damages 5. Ways to avoid
arrow_forward
The Equifax Data Breach
In 2017, from mid-May to July, hackers gained unauthorized access to servers used by Equifax, a major credit reporting agency, and accessed the personal information of nearly one-half the U.S. population.9 Equifax executives sold off nearly $2 million of company stock they owned after finding out about the hack in late July, weeks before it was publicly announced on September 7, 2017, in potential violation of insider trading rules. The company’s shares fell nearly 14 percent after the announcement, but few expect Equifax managers to be held liable for their mistakes, face any regulatory discipline, or pay any penalties for profiting from their actions. To make amends to customers and clients in the aftermath of the hack, the company offered free credit monitoring and identity-theft protection. On September 15, 2017, the company’s chief information officer and chief of security retired. On September 26, 2017, the CEO resigned, days before he was to testify…
arrow_forward
legal aspects of cybersecurity
The Supreme Court’s decision in US v. Jones was notable because of its discussion ofprivacy rights in the information technology age. Reading Justice Scalia’s opinion inconjunction with Justice Alito’s opinion, which of the following is not a mistake lawenforcement made in gathering evidence against Jones?A. Allowing the initial warrant’s timeframe to lapse before installing the GPS.B. Using a GPS to track Jones’ whereabouts for an extended period of time.C. Utilizing a product that is generally prohibitively expensive in the consumermarket.D. Committing a trespass by attaching a device to a vehicle.
arrow_forward
Hi I want to make a video presentation on this topic which should be 5 mins atleast, so need help below format:
Discussion: Misadventures of a Nation State Podcast
Discuss Darknet Diaries Episode 10. Why is this a video discussion instead of a written response? It is an important skill to master to be able to present and summarize the key concepts of a complex cybersecurity incident in a short time frame. Remember that unless you are talking to other cybersecurity professionals, probably no one thinks this stuff is as interesting as you do.
Instructions: The main purpose of the video discussion assignments is to get you to dig into the main four cybersecurity frameworks and references we use in the class. Use the context of the specific security incident to explore and explain some aspects of the NIST CSF, the CIS CSCs, ACSC Strategies to Mitigate Cyber Incidents, and the MITRE ATT&CK matrix.
Keep each discussion sub-topic focused and to approximately 1 minute for a TOTAL video…
arrow_forward
Please I need an answer to this question, thank you.
Babu
Question:
Why is computer forensics important and how do we verify our findings? Is one piece of data enough to make a case? What are some procedures that should be followed when conducting a computer forensic investigation?
arrow_forward
How has the Reauthorized USA PATRIOT Act of 2006 changed the legal definitions of terrorism and responded to critiques against the original law?
arrow_forward
Discuss with at least one (1) example the fundamental values and principles of ethical behavior and conduct that are required by digital forensic practitioners
arrow_forward
Have you ever seen an instance of internet bullying or harassment? How did you react when you first heard about it? The person has apparently been the target of bullying previous to your intervention; please explain how you arrived at this judgment.
arrow_forward
Is there a precise explanation of what the noun "privacy" means? Create a list of the top five things you can do to protect the confidentiality of your personal information.
arrow_forward
What is the significance of fingerprint in the modern criminal investigation?
arrow_forward
Discuss the Importance of Maintaining an Evidence Form and Establishing a Chain of Custody During an Investigation
arrow_forward
In your own words, Write a reflection about the importance of studying fingerprint patterns and how important fingerprinting in criminal Investigation and in your future profession as a criminologist and law enforcer. Write in 200 words.
arrow_forward
Can cybercrime truths be deduced creatively?
arrow_forward
Is the objective of forensic software and the tools it provides to investigators logical?
arrow_forward
I'm curious as to the pros and cons of using biometric identification methods.What should privacy advocates be concerned about when it comes to biometrics? To what extent do you agree or disagree with each of the following worries? If you could elaborate, I'd appreciate it.
arrow_forward
Title: Ransomware Attack and Prevention Strategies
Objective: The objective of this assignment is to research and propose prevention strategies for ransomware attacks, which have become a growing threat to individuals, organizations, and even governments.
Task:
Provide an overview of what ransomware attack are, including how they work and the motivation behind them. Present real-life examples of notable ransomware attacks and their impact on various entities. Explain the common vectors through which ransomware is delivered, such as phishing emails, malicious downloads, and vulnerabilities in software.
Present a range of preventive measures that individuals and organizations can take to minimize the risk of ransomware attacks. This could include regular software updates, employee training, and endpoint security solutions.
arrow_forward
Do some research and write a report that covers the following problems related to digital fingerprinting in order to accomplish this task:
You should pay attention to the following:
When and why is Digital Fingerprinting used?What is the fingerprinting algorithm's operation? How does it operate? Explanation of its basic workings.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Related Questions
- Phishing attack simulation using Packet Tracer is a critical exercise in understanding and defending against cyber threats. In a minimum of two paragraphs, please reflect on your understanding of this topic. Share your insights into what phishing attacks are, how they are simulated using Packet Tracer, and the importance of this exercise in enhancing cybersecurity awareness and skills. Additionally, discuss any challenges or key takeaways you've gained from the simulation, and how this experience contributes to your knowledge of cybersecurity practices.arrow_forwardRei computer program was published by distributed by her company without her consent. This happened a year after Rei resigned from her position. Do you think a cybercrime was committed? * No, there wasn't what the company did was in their jurisdiction considering that Rei was their former employee Yes there was, Rei is a victim of social engineering since they published the program without the distribution rights or even consent given by Rei No, there wasn't since it is a computer program and copyright only applies to materials that are literary Yes there was, Rei was a victim of copy right infringement since the creative right of the program is own by its developer or the programmer and without Rei consent what the company did was unlawfularrow_forwardList three questions that should be asked in a computer forensics investigation. hint: Computer forensics, or digital forensics, is the identification, collection, examination, and analysis of data while preserving the integrity of the information and maintaining a strict chain of custody.arrow_forward
- What is Digital Fingerprinting and for what purposes is it used? How does the fingerprinting algorithm work? Describe its principle of operation. Certain steps are followed to reach the desired result- either block, delete or authorize usage of content. Some cybersecurity experts say that fingerprinting is abusive and exposes the privacy issues of users. Certain solutions were done by some browsers for blocking browser fingerprinting. Describe the measures taken by any of the browsers as a fingerprint defense mechanism. List two common Fingerprinting Algorithms.arrow_forwardYou are assigned as a Cyber Investigator to a Computer Crimes Unit within the Department of Homeland Security. In your role, you are responsible for responding to crime scenes to collect items of digital evidence and conducting subsequent examinations of the things ordered. Legal analysis is inherent in your position, and you are required to document your legal authority for each investigation. Today, you responded to a College Dormitory to investigate an unidentified individual downloading Child Sexual Abuse Material (CSAM). In the proceeding days, you downloaded 200 Gigabytes of known CSAM from a user over Peer2Peer software. During the download, you were able to identify the Suspect's Internet Protocol Address, as well as a Port Number. You specified the Suspect was using IP Address 71.143.70.239:8451. Subsequently, the Internet Service Provider identified that l leased the IP Address to University Dorm Rooms. After coordinating with the university Office of Technology…arrow_forward________ is a discipline that combines elements of law and computer science toidentify, collect, examine, and preserve data from computer system, networks, andstorage devices in a manner that preserves the integrity of data gathered so that it isadmissible as evidence in a court of lawarrow_forward
- g. Illicit Cryptomining Create a presentation to discuss a certain abuse assigned to you. The discussion/presentation must focus on the following: 1. Nature of the abuse (types, operation, tools, etc.) 2. Actual case/news 3. Causes of abuse (reasons for committing the crime) 4. Effect/damages 5. Ways to avoidarrow_forwardThe Equifax Data Breach In 2017, from mid-May to July, hackers gained unauthorized access to servers used by Equifax, a major credit reporting agency, and accessed the personal information of nearly one-half the U.S. population.9 Equifax executives sold off nearly $2 million of company stock they owned after finding out about the hack in late July, weeks before it was publicly announced on September 7, 2017, in potential violation of insider trading rules. The company’s shares fell nearly 14 percent after the announcement, but few expect Equifax managers to be held liable for their mistakes, face any regulatory discipline, or pay any penalties for profiting from their actions. To make amends to customers and clients in the aftermath of the hack, the company offered free credit monitoring and identity-theft protection. On September 15, 2017, the company’s chief information officer and chief of security retired. On September 26, 2017, the CEO resigned, days before he was to testify…arrow_forwardlegal aspects of cybersecurity The Supreme Court’s decision in US v. Jones was notable because of its discussion ofprivacy rights in the information technology age. Reading Justice Scalia’s opinion inconjunction with Justice Alito’s opinion, which of the following is not a mistake lawenforcement made in gathering evidence against Jones?A. Allowing the initial warrant’s timeframe to lapse before installing the GPS.B. Using a GPS to track Jones’ whereabouts for an extended period of time.C. Utilizing a product that is generally prohibitively expensive in the consumermarket.D. Committing a trespass by attaching a device to a vehicle.arrow_forward
- Hi I want to make a video presentation on this topic which should be 5 mins atleast, so need help below format: Discussion: Misadventures of a Nation State Podcast Discuss Darknet Diaries Episode 10. Why is this a video discussion instead of a written response? It is an important skill to master to be able to present and summarize the key concepts of a complex cybersecurity incident in a short time frame. Remember that unless you are talking to other cybersecurity professionals, probably no one thinks this stuff is as interesting as you do. Instructions: The main purpose of the video discussion assignments is to get you to dig into the main four cybersecurity frameworks and references we use in the class. Use the context of the specific security incident to explore and explain some aspects of the NIST CSF, the CIS CSCs, ACSC Strategies to Mitigate Cyber Incidents, and the MITRE ATT&CK matrix. Keep each discussion sub-topic focused and to approximately 1 minute for a TOTAL video…arrow_forwardPlease I need an answer to this question, thank you. Babu Question: Why is computer forensics important and how do we verify our findings? Is one piece of data enough to make a case? What are some procedures that should be followed when conducting a computer forensic investigation?arrow_forwardHow has the Reauthorized USA PATRIOT Act of 2006 changed the legal definitions of terrorism and responded to critiques against the original law?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning