1 / 5

COS 413

COS 413. Day 21. Agenda. Assignment 6 Corrected 2 D’s, 6 F’s and 1 non-submit Discussion on assignment Lab 7 Corrected 1 A, 2 B’s, 1 C, 3 D’s and 2 non-submits Assignment 7 Due Second Capstone Progress report Due Lab 8 Write up due Nov 19 Current events

alban
Télécharger la présentation

COS 413

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. COS 413 Day 21

  2. Agenda • Assignment 6 Corrected • 2 D’s, 6 F’s and 1 non-submit • Discussion on assignment • Lab 7 Corrected • 1 A, 2 B’s, 1 C, 3 D’s and 2 non-submits • Assignment 7 Due • Second Capstone Progress report Due • Lab 8 Write up due Nov 19 • Current events • http://www.bangordailynews.com/detail/93238.html • Quiz 3 Today • Chaps 11, 12, & 13 • Open book, Open notes • 20 M/C and 5 essays • 70 Minutes • Password “Phreaking”

  3. Lectures Nov 14 Quiz 3 Chap 11, 12 & 13 Assignment 7 Due Nov 18 Chap 14 Nov 21 Chap 14 Assignment 8 Due Nov 25 Chap 15 Dec 2 Chap 15 Assignment 9 Due Dec 5 Chap 16 Dec 9 Chap 16 Assignment 10 Due Dec 12 Quiz 4 Chap 13, 14 & 15 Labs Nov 19 – Final lab part 1 – Kidnapping case N105 Nov 28 – thanksgiving break Dec 3 – Final lab part 2 – Kidnapping case Dec 10 – Final lab part 3 – Kidnapping case Final lab will count as two labs (lab 9 &10) Write-up will be due Dec 12 Capstone presentations Dec 19 @ 1 PM Rest of Semester

  4. Assignment 6 • Case 11-1 • 3 facets to DiD • People • Training >> Ethics and security • Background checks prior to hiring • Technology • One firewall if connected to Internet • Verify connection and installation • Virus protect • no floppy or USB ports • No wireless • Operations • Make sure everyone know proper data handling procedures • Control who sees what (authentications and access controls) • Updates and patches • Also regulated by HIPAA • NOT good answer • Hiring of new people • Applying a $1000 solution to a $10 problem Guide to Computer Forensics and Investigations

  5. Assignment 6 • Case 12-4 • Facts of the case • Billy (city employee) complains that he has been sexual harassed using the city’s e-mail system • Suspect unknown • Could lead to termination (civil case and possible criminal persecution) • Investigations • Billy interview • Had affair with Mary Jane (suspect and city employee ), Affair ended badly against Mary Jane’s wishes • Billy provides e-mail evidence to support his claim • Mary Jane interview • Denies accusation claims set-up • Performed investigation of evidence and determined that Billy's e-mail were falsified and Mary Jane WAS set-up • Write report of how investigation proved that Mary Jane was innocent • Billy’s inbox emails did not correspond to e-mails in Mary Jane's outbox. • Checking server logs and backups for estmp ID listed on Billy's emails proved that Mary Jane's e-mails were the originals and Billy’s e-mails were tampered with. • Terminate Billy (false accuataions) and refer to case to police. • Precedent: Superior Court of Massachusetts..Suni Munsani vs. Signal Lake Ventures Funds II, LP et al. http://www.signallake.com/litigation/ Guide to Computer Forensics and Investigations

More Related