8 HOURS DELIVERY: PLAGIARISM FREE AND QUALITY WORK GUARANTEED.

Learning Goal: I’m working on a cyber security project and need an explanation a

Learning Goal: I’m working on a cyber security project and need an explanation and answer to help me learn.Investigation Considerations [Forensic investigator, thinking out loud] What is it with these detectives? They think they can just dump stuff on our desks and expect us to make heads or tails of it. I’ll need a lot more information than this before I can process these computers. [pulling up list of meeting invitees] Let’s see, is that everybody? I need to get this meeting on folks’ calendars ASAP so I can start my investigation. [typing out a meeting agenda] While I’m waiting, I’ll draw up an agenda and a list of questions that need to be answered. OK. That’s a good start. I’m sure other topics will come up during the meeting. That meeting was a big help. [Clicking through resources on computer] Now, I can create a list of resources that I’ll need for the investigation. Let’s see. The team is also going to want to know what to expect as far as timeline, budget, responsibilities, and other things. A project management diagram should help. I’ll sketch it out now and get it to them ASAP so we can get started. A digital forensic investigation process can involve many steps and procedures. The objective is to obtain unbiased information in a verifiable manner using accepted forensic practices. In this project, you will perform some of the steps necessary for setting up an investigation. These steps include designing interview questions that establish the needs of the case and provide focus for your investigative efforts. You will also determine what resources may be needed to conduct the investigation. Once you have this information, you will be able to develop an investigation plan that properly sequences activities and processes, allowing you to develop time estimates and contingency plans should you encounter challenges in the investigation. This situation involves two computers and a thumb drive. After clear authorization to proceed has been obtained, one of the first investigative decision points is whether to process the items of evidence individually or together. Processing computers individually makes sense when they are not likely tied to the same case. However, if the computers are linked to the same case, there can be advantages in processing them together. There are four steps in this project. In Step 1, you will develop interview protocols and identify documentation needs for a forensic investigation. In Step 2, you will identify tools and software needed for the investigation. In Step 3, you will develop a plan for conducting the investigation, and in Step 4, you will consolidate your efforts in the form of a single document to be submitted to your supervisor (i.e., your instructor). The final assignment in this project is a planning document with a title page, table of contents, and distinct section for each of the three steps in the project. Consult the relevant sections of Guidelines for Project 1 Investigation Project Plan in every step. In Step 1, get started on the plan by creating an interview form to record questions, key words, and authorization information, and to complete the legal forms needed in this case. However, before you can do that, you need to review your training in criminal investigations. Step 1: Create and Gather Forms Your tasks in Step 1 are to create interview forms to record questions, key words, and authorization information, and to designate other legal forms that will be needed in this case. It is important for you to describe the importance of each form that you create in the body of your final Project Plan assignment and include in-text reference citations for all of your content. The forms that you complete as part of Step 1 will be included in your Investigation Project Plan, the final assignment for this project. As part of the investigation into two computers and a thumb drive, it’s important to do the necessary preliminary work. In criminal investigations, there are laws governing chain of custody, search warrants, subpoenas, jurisdiction, and the plain view doctrine. It’s important to be familiar with these topics. Review forensic laws and regulations that relate to cybercrime, as well as rules of digital forensics in preparation for your digital forensic investigation. The next thing to do is to read the police report and perform a quick inventory of devices that are thought to contain evidence of the crime. You have set up a meeting with the lead detectives and the prosecutor handling the case. You have received an official request for assistance that provides you with authority to conduct the investigation. You realize it will be impossible to produce a detailed investigation project plan prior to your meeting with the detectives and the prosecutor. First, you need to develop a series of questions to establish the key people and activities. These questions should address potential criminal activity, timelines, and people who need to be investigated. It is also important to determine whether different aspects of the case are being pursued by other investigators and to include those investigators on your contact list. In addition, some situations may involve organizations or individuals who need to adhere to various types of industry compliance. This situation may require you to follow special procedures. Step 2: List Required Forensic Equipment, Software, and Labor Expenses In Step 1, you developed forms and templates to collect the legal, criminal, and technical information that lays the groundwork for your investigation. In this step, you will consider the types of equipment and human resources needed to conduct the investigation and create a budget table that includes expenses for software licenses, computers, storage devices, number of digital forensics examiners, digital forensics examiners’ labor hours, examiner hourly pay rate, including time spent for each phase of the investigation process in gathering evidence analysis, reporting, presentation preparation and court appearance(s). It is important to total overall costs of all equipment and expenses in your budget table. By making these preparations, you are establishing forensic readiness. Required resources can include people; tools and technologies such as RAID storage, deployment kits, or imaging programs; and budget and timeline information. Develop a checklist. It will be included in the final Investigation Project Plan. In the next step, you will begin to prepare a plan for managing a digital forensic investigation. Step 3: Plan Your Investigation In the prior step, you determined what resources would be necessary for your investigation. In this step, you will develop a plan for managing the investigation. The requirements for writing case reports reflect the step-by-step rigidity of the criminal investigation process itself. Being able to articulate time, task, money, and personnel requirements is essential. Project management is a skill set that is not often linked to digital forensics and criminal investigations. That is unfortunate because effective project management can have a dramatic impact on the success and accuracy of an investigation. Identifying the tasks that need to be performed, their sequence, and their duration are important considerations, especially in the face of “wild cards” such as delays in obtaining correct search warrants and subpoenas. It is also important to have a clear understanding of the goals for the investigation as you will likely be called upon to present conclusions and opinions of your findings. Your project plan should include a properly sequenced narrative timeline and a separately labeled and sequenced Visual Graphic Timeline chart that reflects the time intervals between each phase of the evidence acquisition and investigation processes (e.g., 30 hours gathering evidence spread across five business days, 60 hours of analysis over 10 business days, 90 days for reporting and court preparation, etc.) including detailed time estimates, and contingency plans. Your plan will serve many purposes, including the assignment of a project budget. As you create your plan, be sure to include in your meeting agenda communications and reporting: who should be involved, how the activities should be carried out, how often, and under what circumstances (i.e., modality, frequency). Once you have developed your project management plan, move on to the next step, where you will submit your final assignment. Step 4: Prepare and Submit Completed Investigation Project Plan For your final assignment, you will combine the results of the previous three steps into a single planning document—an Investigation Project Plan—with a title page, a table of contents, and a distinct section for each of the three steps. The plan should include: Forms documenting key people, meeting agenda, key activities and reporting, key words, investigation timeline narrative, visual graphic timeline chart, authorization confirmation (e.g., ownership, jurisdiction), and related investigations. Designation of the legal forms required for criminal investigations should also be included. (Step 1)
Resource checklist for equipment, human resources and labor expenses (Step 2)
Management plan (Step 3)
Search and seizure form(s)
Chain of custody form
The organization and details of your plan is important. Be sure to refer to the Guidelines for Project 1 Investigation Project Plan to meet the minimum standards needed for this project. All sources of information must be appropriately referenced. Submit your completed Investigation Project Plan to your supervisor (instructor) for evaluation upon completion. Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title. 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
2.2: Locate and access sufficient information to investigate the issue or problem.
4.1: Lead and/or participate in a diverse group to accomplish projects and assignments.
5.1: Demonstrate best practices in organizing a digital forensic investigation.
5.2: Utilize Project Management principles in an investigation
Requirements: short paragragh

Learning Goal: I’m working on a cyber security discussion question and need an e

Learning Goal: I’m working on a cyber security discussion question and need an explanation and answer to help me learn.Their are some small questions in Discussion, write 2 or 3 lines for every questions in Step 2.and write answer below the Step 2 questions, and professor attached some link in Step 1 and verify the answer and write in Below Step 2 Questions. write discussion in own way. Need 0% plagiarism. I am sending total 2 Discussion.
Requirements: 12

Learning Goal: I’m working on a cyber security question and need an explanation

Learning Goal: I’m working on a cyber security question and need an explanation and answer to help me learn.What are the three different types of cross-site scripting (XSS) attacks and what sort of harm can they do? Give specific examples of the harm. How can each of the types of attack be prevented?
Requirements: 300 Words Minimum   |   .doc file

Learning Goal: I’m working on a cyber security question and need an explanation

Learning Goal: I’m working on a cyber security question and need an explanation and answer to help me learn.Option #2: Incident Response PlansYou are the CIO of a multinational corporation that just opened a 100-employee office in the southeastern US. One of the first steps the CEO wants to take is to ensure that all internal policies and procedures reflect operations at the new location. The CEO has tasked you with developing the company incident response plan. Discuss the role of an incident response plan, major incident response steps, and examples of how the plan can be implemented.Your well-written paper should meet the following requirements:Paper length: 2-3 pages
Include an illustrative table, graphic, or other diagram that can be created or included from properly cited external references.
Include two external, scholarly references in addition to the textbook. Do not use blogs, wikis, or other non-scholarly sources.
Format according to the CSU Global Writing Center (Links to an external site.).
Requirements: 2-3 pages

Learning Goal: I’m working on a cyber security discussion question and need supp

Learning Goal: I’m working on a cyber security discussion question and need support to help me learn.Select one of the scenarios below, which involve making ethical decisions in IT.In your initial post for this week, answer the following questions:State which scenario you have selected
Describe the legal and ethical considerations in the scenario
Explain what you would do, given the scenario
Scenario 1: You are a new employee in the role of senior solutions architect. You have over 10 years of experience as a solutions architect in a large company known for its cutting-edge technology. Your new company asks you about the tools and content that were in the information technology infrastructure library (ITIL) at your previous company. Your new company’s leadership is wondering if you can embed some of your previous company’s best practices into the ITIL to ensure that IT practices are up to date. After all, you were hired to help your current employer stand out among its competitors.Scenario 2: You work in the IT department for an institution of higher education. You complete a routine security audit for one of its systems that contains confidential student information. During the audit, you notice several areas of vulnerability, such as a lack of encryption on certain files and no password protections for searching student information. You bring these concerns up to your supervisor, who says that the department’s budget is too tight right now and they don’t have enough personnel to update the system. There are also a lot of staffing switches taking place across departments, and there is a concern that job responsibilities will quickly change among leadership positions.
Requirements: 1-3 paragraph   |   .doc file

Learning Goal: I’m working on a cyber security project and need an explanation a

Learning Goal: I’m working on a cyber security project and need an explanation and answer to help me learn.his project is divided into several parts, each with a deliverable. The first four parts are drafts. These documents should resemble business reports in that they are organized by headings, include source citations (if any), be readable, and be free from typos and grammatical errors. However, they are not final, polished reports.Please see the attached requirements.Project Part 1: Risk Management Plan Outline and ResearchFor the first part of the assigned project, you will create a partial draft of the risk management plan. To do so, follow these steps:Research risk management plans.
Create an outline for a basic risk management plan with anticipated section headings (as indicated in this numbered list). This plan will include a qualitative risk assessment, which is addressed later in the project.
Write an introduction to the plan by explaining its purpose and importance.
Define the scope and boundaries of the plan.
Research and summarize compliance laws and regulations that pertain to the organization. Keep track of sources you use for citation purposes.
Identify the key roles and responsibilities of individuals and departments within the organization as they pertain to risk management.
Develop a proposed schedule for the risk management planning process.
Create a draft risk management plan detailing the information above. Format the plan similar to a professional business report and cite any sources you used.
Submission RequirementsFormat: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation style: Your school’s preferred style guide
Estimated length: 4–6 pagesNOTE: Complete Information is provided in the attachment risk management project part 1.docx
Requirements: 4-6 pages   |   .doc file

Learning Goal: I’m working on a cyber security writing question and need an expl

Learning Goal: I’m working on a cyber security writing question and need an explanation and answer to help me learn.Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?
Requirements: 7 pages

Learning Goal: I’m working on a cyber security project and need an explanation a

Learning Goal: I’m working on a cyber security project and need an explanation and answer to help me learn.Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years. Pick an industry you feel will be most affected by blockchain and how blockchain may be used in that industry. As an IT manager, how would you embrace blockchain? For instance, how would training occur for your team, what strategies might you use, what security methods may you recommend be used?
Requirements: 7 pages

Learning Goal: I’m working on a cyber security project and need an explanation a

Learning Goal: I’m working on a cyber security project and need an explanation and answer to help me learn.*******PLEASE BID IF YOU ARE FAMILIAR WITH GNS3 *ASA firewall and VPN implementation for an IT company in GNS3 and at last perform an attack to show how efficient they are 1) IntroductionFIRST YOU HAVE TO CREAT A TOPOLOGY FOR AN IT COMPANY in GNS3, you have to assume an IT organization named VARSH, where you have to implement ASA firewall and VPN for network security of that organization, so after creating a topology, describe a scenario of that company why the company needed Firewall and VPN in the terms of security (*add the screen short of the topology), at the last (in result and analysis, section 6) we have to perform any attack(EG: DDOS, DNS POISONING, ARP SPOOFING, DHCP STARVATION, SYN flood attacks etc. (select anyone attack and explain about that)) to show how the network of the organization was secured with Firewall and VPN2) Problem statement 3) Technical Specifications (Describe whatever software and hardware devices used(eg: GNS3,wireshark,OS’s) and Add clear screenshot’s while explaining)4) IP Allocation table ( IP allocation for the routers, switches, pc, ASA, VPN tunnel etc, #you can use DHCP to generate IP’s but please mention in table)5) Configuration and verifying the connectivity (After configuration check the connectivity and Add clear screenshot’s while explaining)6)Result and Analysis (we have to perform any attack(EG: DDOS, DNS POISONING, ARP SPOOFING, DHCP STARVATION, SYN flood attacks etc. (select anyone attack and explain about that)) to show how the network of the organization was secured with Firewall and VPN)7)Conclusion and Further Work
Requirements: no word limt