Which os and forensics tools could you load on the drive


Discussion Post A: Executive leadership

Some virtual machines can be loaded on a USB drive. Research which type 2 hypervisors fit on a USB drive of less than 16 GB. Which OS and forensics tools could you load on this drive?

Discussion Post B: Computer Forensic

Some virtual machines can be loaded on a USB drive. Research which type 2 hypervisors fit on a USB drive of less than 16 GB. Which OS and forensics tools could you load on this drive?

Discussion Post C: Computer Forensic

Your company wants to send a working VM to customers with a sample of its new software, but you're concerned about the security of the software and data. What precautions can you take?

Homework

Case Study A: Computer Forensics

As part of the duties of a digital forensics examiner, creating an investigation plan is a standard practice. Write a 3 to 4 (not including title or reference page) page paper that describes how you would organize an investigation for a potential fraud case. In addition, list methods you plan to use to validate the data collected from drives and files such as Word and Excel, with hashes. Specify the hash algorithm you plan to use, such as MD5 or SHA1.

Case Study B: Executive Leadership

Address the four questions associated with the chapter seven Opening Case Application: Mark Zuckerberg - Facebook Founder and CEO in a 3 to 5 pages paper (excluding title, abstract, and reference pages). Completely review the company website noted in the case. Include at least three peer reviewed sources found in the Potomac Library properly cited and referenced.

Use this strategy when you analyze a case:

I. Identify and write the main issues found discussed in the case (who, what, how, where and when (the critical facts in a case).

II. List all indicators (including stated "problems") that something is not as expected or as desired.

III. Briefly analyze the issue with theories found in your textbook or other academic materials. Decide which ideas, models, and theories seem useful. Apply these conceptual tools to the situation. As new information is revealed, cycle back to sub steps I and II.

IV. Identify the areas that need improvement (use theories from your textbook)

i. Specify and prioritize the criteria used to choose action alternatives.
ii. Discover or invent feasible action alternatives.
iii. Examine the probable consequences of action alternatives.
iv. Select a course of action.
v. Design and implementation plan/schedule.
vi. Create a plan for assessing the action to be implemented.
V. Conclusion (every paper should end with a strong conclusion or summary)

Case Study C: Computer Forensics

Apple vs. FBI Case Study

i. Was Apple wrong for not complying with the FBI's request? If so, why? If not, why not?

ii. What ethical issues are involved in this case?

iii. Who are the stakeholders in this situation?

iv. Apple's values are listed on the bottom of its home page at apple. Is the company's decision consistent with its values? Is that important?

v. Complete individual paper and presentation on the FBI vs. Apple Case Study

Format your homework according to the following formatting requirements:

i) The answer should be typed, using Times New Roman font (size 12), double spaced, with one-inch margins on all sides.

ii) The response also includes a cover page containing the title of the homework, the student's name, the course title, and the date. The cover page is not included in the required page length.

iii) Also include a reference page. The Citations and references must follow APA format. The reference page is not included in the required page length.

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: Which os and forensics tools could you load on the drive
Reference No:- TGS03114776

Expected delivery within 24 Hours