Option #1: Knoppix Knoppix is a Linux distribution that can run entirely from a CD or DVD. Write a short paper discussing the possibility of using Knoppix (or other similar distributions) as a forensic boot disk. Give a real-life scenario demonstrating Knoppix’s (or other similar distribution’s) impact and application.

Credit Hours: 3
Contact Hours: This is a 3-credit course, offered in accelerated format. This means that 16 weeks of material is covered in 8 weeks. The exact number of hours per week that you can expect to spend on each course will vary based upon the weekly coursework, as well as your study style and preferences. You should plan to spend 14-20 hours per week in each course reading material, interacting on the discussion boards, writing papers, completing projects, and doing research.

COURSE DESCRIPTION AND OUTCOMES

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Course Description:

This course provides students with an insight to cyber security professional intrusion detection methods, information security tools, and preventative measures to information security risks. Students will learn how to respond to cyber breaches which includes the recovery, preservation, analysis of digital crime scene evidence, and proper incident response to cyber criminals.

Course Overview:

This course provides students with an insight into cybersecurity, professional intrusion, detection methods, information security tools, and preventative measures to information security risks. Students will learn how to respond to cyberbreaches, which includes the recovery, preservation, analysis of digital crime scene evidence, and proper incident response to cybercriminals.

In addition to the tools of the digital forensics trade, students will become familiar with relevant federal statutes. They will be presented with various scenarios that a digital forensics investigator might face and will be asked how they would react.

Course Learning Outcomes:
1. Demonstrate the ability to secure digital assets using best practices, appropriate laws, and relevant regulations related to digital investigations.
2. Evaluate situations associated with major computer and network forensics cases and provide insights on possible mitigations to future matters.
3. Demonstrate the ability to apply knowledge of the management of digital investigations, which may include but is not limited to collection, storage, cataloging evidence for use in prosecution of a digital crime scene.
4. Evaluate situations and propose innovative solutions to managing digital investigations related to cyber based crime.
5. Demonstrate the ability to identity and respond to cyber security attacks with preservation of the crime scene, and discuss various tools and file systems.

PARTICIPATION & ATTENDANCE

Prompt and consistent attendance in your online courses is essential for your success at CSU-Global Campus. Failure to verify your attendance within the first 7 days of this course may result in your withdrawal. If for some reason you would like to drop a course, please contact your advisor.

Online classes have deadlines, assignments, and participation requirements just like on-campus classes. Budget your time carefully and keep an open line of communication with your instructor. If you are having technical problems, problems with your assignments, or other problems that are impeding your progress, let your instructor know as soon as possible.

COURSE MATERIALS

Textbook Information is located in the CSU-Global Booklist on the Student Portal.

COURSE SCHEDULE

Due Dates
The Academic Week at CSU-Global begins on Monday and ends the following Sunday.
• Discussion Boards: The original post must be completed by Thursday at 11:59 p.m. MT and peer responses posted by Sunday at 11:59 p.m. MT. Late posts may not be awarded points.
• Opening Exercises: Take the Opening Exercise before reading each week’s content to see which areas you will need to focus on. You may take these exercises as many times as you need. The Opening Exercises will not affect your final grade.
• Mastery Exercises: Students may access and retake Mastery Exercises through the last day of class until they achieve the scores they desire.
• Critical Thinking: Assignments are due Sunday at 11:59 p.m. MT.

WEEKLY READING AND ASSIGNMENT DETAILS

Module 1
Readings
· Chapter 1 in Guide to Computer Forensics and Investigations
· Jain, N., Kalbande, D. R., & Sharma, P. (2016). Empirical relationship between victim’s occupation and their knowledge of digital forensic. In D. Kumar Mishra, R. Sheikh, & S. Jain (Eds.), Proceedings of the ACM Symposium on Women in Research 2016 (pp. 61-65). New York, NY: ACM.
· Patil, R. Y., & Devane, S. R. (2017). Unmasking of source identity, a step beyond in cyber forensic.
Proceedings of the 10th International Conference on Security of Information and Networks, 157-164.
Opening Exercise (0 points) Discussion (25 points) Critical Thinking (90 points)
Choose one of the following two assignments to complete this week. Do not do both assignments.
Identify your assignment choice in the title of your submission.

Option #1: Knoppix

Knoppix is a Linux distribution that can run entirely from a CD or DVD. Write a short paper discussing the possibility of using Knoppix (or other similar distributions) as a forensic boot disk. Give a real-life scenario demonstrating Knoppix’s (or other similar distribution’s) impact and application.

Your paper must meet the following requirements:

• 4-5 pages in length, not including the cover page and reference page.
• Formatted according to the CSU-Global Guide to Writing and APA. Include an introduction, a body with fully developed paragraphs, and a conclusion.
• Be clearly and well written using excellent grammar and style techniques. Be concise. Be logical. You are being graded in part on the quality of your writing. If you need assistance with your writing style, visit the Writing Center, which is also accessible from the Library’s homepage.
• Support your paper with at least two peer-reviewed, scholarly references. The CSU-Global Library is a great place to find these resources.

Refer to the Critical Thinking Rubric in Module 1 for more information on expectations for this assignment.

Option #2: Workstation Brands

Investigate several low-emanation workstation brands, and write a short paper about the brands’ advantages and disadvantages. Give a real-life scenario portraying the impact and the current application of the workstation brands.

Your paper must meet the following requirements:

• 4-5 pages in length, not including the cover page and reference page.
• Formatted according to the CSU-Global Guide to Writing and APA. Include an introduction, a body with fully developed paragraphs, and a conclusion.
• Be clearly and well-written using excellent grammar and style techniques. Be concise. Be logical. You are being graded in part on the quality of your writing. If you need assistance with your writing style, visit the Writing Center, which is also accessible from the Library’s homepage.
• Support your paper with at least two peer-reviewed, scholarly references. The CSU-Global Library is a great place to find these resources.

Refer to the Critical Thinking Rubric in Module 1 for more information on expectations for this assignment.
Mastery Exercise (10 points)

Module 2
Readings
· Chapter 4 (135-154) in Guide to Computer Forensics and Investigations
· Deutchman, L. (2015). The case for making cell phone data available at trial. Criminal Justice, 29(4), 21-26.
· Ramanathan, T., Schmit, C., Menon, A., & Fox, C. (2015). The role of law in supporting secondary uses of electronic health information. Journal of Law, Medicine & Ethics, 43(s1), 48-51.

Opening Exercise (0 points) Discussion (25 points) Critical Thinking (90 points)
Choose one of the following two assignments to complete this week. Do not do both assignments.
Identify your assignment choice in the title of your submission.
Option 1: Consolidated Electronics Group Incident Response Plan Scenario
Consolidated Electronics Group, Inc. is a manufacturer and supplier of avionics equipment to various airlines across the continental United States. Recently, the company laid off several employees, resulting in many disgruntled workers.

Now, the information technology (IT) staff has reported a spike in network attacks numbering in the thousands. Reports from the intrusion detection system (IDS) indicate that two of these potential attacks may have compromised highly classified plans for a new prototype avionics switchboard, which is expected to revolutionize the market. The IT staff suspects that the attacks and potential security breach may have something to do with the recently laid-off staff.

Assignment Instructions
The U.S. National Institute of Standards and Technology (NIST) is a recognized authority for providing security standards, guidelines and procedures. NIST provides a large array of other security-related documents, which are of great value to information security professionals.

To complete this assignment, use NIST’s Computer Security Incident Handling Guide, Section 3 starting on page 21. Once on the site, click the link on the right side of the screen to download the PDF.

Using the guidance from guide, craft an incident response plan that includes:

1. A description of the specific measures that will be taken to investigate a security breach
2. An explanation of steps taken to prevent future attacks and to secure the company’s information systems
3. A communication plan to disseminate the results and findings of this event to the organization Your plan must meet the following requirements:
• 4-5 pages in length, not including the cover page and reference page.
• Formatted according to the CSU-Global Guide to Writing and APA. Include an introduction, a body with fully developed paragraphs, and a conclusion.
• Be clearly and well written using excellent grammar and style techniques. Be concise. Be logical. You are being graded in part on the quality of your writing. If you need assistance with your writing style, visit the Writing Center, which is also accessible from the Library’s homepage.

Refer to the Critical Thinking Rubric in Module 2 for more information on expectations for this assignment.

Option 2: Public School District Scenario

A public school district has been facing a district-wide situation. Someone accesses LMS systems and the registrar’s portal, changing grades for many students. They have not been able to identify the suspect yet and the case is under investigation but in the meantime, the superintendent has ordered all users of those resources (teachers and employees) to undergo training on data protection and security. You have been called to run the training sessions.

Assignment Instructions
Create a PowerPoint presentation identifying possible breaches or negligent steps that will lead to intruders having access to school data. List recommendations to improve security and data protection. Address physical security as well.

Your presentation must meet the following requirements:

• Include an introduction slide with the title of the presentation, your name, the submission date, and a reference slide.
• 10 or more slides of easy-to-understand content (text and visuals). Remember, your audience is teachers and employees of the school district who know nothing about data protection and security.
• Speaker’s notes containing 50-100 words per slide to elaborate on the slide. In your notes, support slide content with at least two peer-reviewed, scholarly references. The CSU-Global Library is a great place to find these resources.
• Avoid distracting transition elements and animations.
• Formatted according to the CSU-Global Guide to Writing and APA

The post Option #1: Knoppix Knoppix is a Linux distribution that can run entirely from a CD or DVD. Write a short paper discussing the possibility of using Knoppix (or other similar distributions) as a forensic boot disk. Give a real-life scenario demonstrating Knoppix’s (or other similar distribution’s) impact and application. appeared first on Essaylink.