Cloud Computing : All Q’s Question1: D2 : Consider, in 500 words, how business processes as services can improve efficiency. This discussion is about

Cloud Computing : All Q’s
Question1:
D2 :
Consider, in 500 words, how business processes as services can improve efficiency. This discussion is about business process as a service and security
Use at least three sources. Use the Research Databases available from the DanforthLibrary not Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Question 2 :
D3:
In 500 words , consider this statement: For cloud computing to become multi-jurisdictional, it must be separated from politics.
Use at least three sources. Use theResearch Databasesavailable from theDanforthLibrarynot Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes

Don't use plagiarized sources. Get Your Custom Assignment on
Cloud Computing : All Q’s Question1: D2 : Consider, in 500 words, how business processes as services can improve efficiency. This discussion is about
From as Little as $13/Page

Question 3:
D4:
Discuss, in your own words using 500 words or more, how virtualizationmay create it’s own security vulnerabilities.
Use at least three sources. Use theResearch Databasesavailable from theDanforthLibrarynot Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Question 4:
D5:
Discuss in 500 words or more the differences between and advantages of MAC, DAC, and RBAC.
Use at least three sources. Use theResearch Databasesavailable from theDanforthLibrarynot Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Question 5:
D6:
Compare and evaluate in 500 words or more qualitative v quantitative risk assessment.
Use at least three sources. Use theResearch Databasesavailable from theDanforthLibrarynot Google. Include at least 3 quotes from your sources enclosed in quotation marks and cited in-line by reference to your reference list. Example: “words you copied” (citation) These quotes should be one full sentence not altered or paraphrased. Cite your sources using APA format. Use the quotes in your paragaphs. Stand alone quotes will not count toward the 3 required quotes.

Question 6:
D2: Digital Foreniscs
Do a bit of research on-line. Find a criminal case that involved Digital Forensics.

Using WORD, write an ORIGINAL brief essay of 600 words or more describing the case and the how digital forensics were used in the investigation.

Chapter 1
The Anatomy of a Digital Investigation

1

Types of Investigation
Criminal
Government agency is the plaintiff
Accused is the defendant
Civil
A dispute between two entities (public or private)
Either side can be the plaintiff or defendant

More Investigation Types
Internal
An inquiry held within the confines of an organization (civil or federal) that is not meant for public review
May or may not be civil or criminal, but assume it could

The Basic Model
(Kruse and Heiser)
Assess
Acquire
Analyze
Report

The Casey Model
Revision of the basic model by Eoghan Casey
Identification/Assessment
Collection/Acquisition
Preservation
Examination
Analysis
Reporting

Thurston, Michael (TM) – Some of this text is very small for a slide. Can you replace some of the smaller fonts?

Identification/Assessment
Define the scope of the examination
Collect all legal documentation needed
Get any permissions required for resources not covered by warrants
Identify the tools required
Identify the personnel needed
Identify the stakeholders

Collection/Acquisition
Collection methods must assure:
Data is authentic
Sources of data are reliable
Nothing was modified throughout the process
All tools used are valid
Personnel are qualified to do their jobs
Enough evidence exists to prove a point
Conclusions are valid

Preservation
NEVER work on original data sources
Forensically sound copies must be identical to originals
Media used to store copies must be uncontaminated
A chain of custody must be maintained

Examination
All possible sources of data must be examined
File system
Slack space
Unallocated space
Hidden partitions
All tools used must be tested and verified

Analysis
People other than the investigator may be called upon to examine data
Technique is as critical as the tools used
Exculpatory evidence is as critical as incriminating evidence

Reporting
Actually begins when the assignment is accepted
First response documentation
Case documentation
Process documentation
Analysis and conclusion

Understanding Scope
Defines precisely what can be searched and what is being looked for
Can vary with the type of investigation
Must never be exceeded

The Stakeholders
Principles (accused and accuser)
Decision makers
Mediator
Regulators
Management
Process owners

Documentation
General case documentation
Procedural documentation
Process documentation
Timelines
Case timeline
Process timeline
Chain of custody

Case Documentation
Contact information for everyone involved
First response documentation
Notes
Photographs
Videos
All legal authorizations

Procedural Documentation
Every task that was performed related to the investigation (not process)
Summary of events
List of equipment seized
What steps were taken and what tools were used
Detailed analysis of the data

Process Documentation
User manuals
Installation manuals
README files
Update history logs
Results of testing

Timeline
Case timeline
Systematic analysis of what transpired
Times and dates of related events
MAC data of files involved
Procedural timeline
Detailed list of steps taken
Times and dates each step began and ended

Chain of Custody
Begins when evidentiary materials are first seized
Time and date taken
From whom and where
Complete description of each item
Every time an item changes hands, time, date and people involved
There can be no gaps in history