skip to Main Content
The smarter way
to do assignments.

Please note that this is just a preview of a school assignment posted on our website by one of our clients. If you need assistance with this question too, please click on the Order button at the bottom of the page to get started.

  
Part 1-APA Format- 1 Full page (Due Thursday)
As a computer investigator for your local sheriff’s department, you have been asked to go with a detective to a local school that received a bomb threat in an anonymous email. The detective already has information from a subpoena sent to the last known ISP where the anonymous email originated, and the message was sent from a residence in the school’s neighborhood. The detective tells you the school principal also stated that the school’s Web server has been defaced by an unknown computer attacker. The detective has just obtained a warrant for the search and seizure of a computer at the residence the ISP identified. Prepare a list of what items should be included in an initial-response field kit to ensure the preservation of computer evidence when the warrant is carried out. 
  
Assignment   Grading Criteria
Maximum   Points
 
Completes   and analyzes relevant lab/activity
60
 
Uses proper   grammar, spelling and mechanics
20
 
Timeliness &   APA Style
20
 
Total   Points:
100
Part 2- APA Format- 250 Words (Tomorrow Wednesday)
Topic: Email Forensics & Windows Operating Systems Forensics
Instructions:
For this assignment, you must post your initial post (250 words), addressing the questions below.
 Make sure you answer all THREE questions as stated in just one initial post – do not spread your answers across multiple posts. You may number your answers to correspond with the questions you are answering, but do not copy my questions into your posts. Your word count will be based only on your own words.
 
Make sure you post your answers in the body of your post and that you do not include any attachments with your post. Only the body of your post will be read and credited towards your grade.
 
Questions:
1. Email is one of the most common methods of communications today. What are some of the ways that email can be investigated and used as evidence? 
2. Discuss the various laws that have been enacted for email investigations.
3. The Windows Operating system is the most common operating system on the planet. Discuss some of the tools and files that are routinely examined and used in a Windows Operating System investigation.
  Forum   Grading Criteria
Maximum Points
 
Appropriate   use of terms, correct spelling and grammar
 16
 
Uses   external resources validating position with applicable knowledge
16
 
Participation in   forum with well-formed answers and conclusions
48
 
Posting to fellow   classmates
20
 
Total   Points:
100
Part 3- APA Format- 250 Words (Due Tomorrow Wednesday)
Instructions: Your initial post should be at least 250 words
1. In your opinion, what kinds of regulations would you consider appropriate or inappropriate for cyberspace?
2. What are the primary ethical issues concerning privacy and information technology?
Part 4- APA Format- 60 Words each Question (Due Thursday)
The purpose of this activity is to reinforce what you have learned so far about privacy and cyberspace. 
1. What is personal privacy, and why is privacy difficult to define? (Minimum word count: 60)
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
2. Is privacy a social value, or is it simply an individual good? (Minimum word count: 60)
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
3. What is RFID technology, and why is it a threat to privacy? (Minimum word count: 60)
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
4. Why are certain aspects and uses of Internet search engines controversial from a privacy perspective? (Minimum word count: 60)
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
5. Why does online access to public records pose problems for personal privacy? (Minimum word count: 60)
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
6. In discussing “cyberspace regulation,” why is it useful to distinguish the question “Can cyberspace be regulated?” from the question “Should cyberspace be regulated?” (Minimum word count: 60)
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
7. What are (HTML) meta-tags, and why can they be controversial? (Minimum word count: 60)
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
8. What is e-mail spam, and why is it controversial from a moral point of view? (Minimum word count: 60)
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
9. What is censorship? Describe the differences between “censorship by suppression” and “censorship by deterrence.” (Minimum word count: 60)
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
10. What is Network Neutrality (or “Net Neutrality”), and what implications does it have for Internet regulation in the future? (Minimum word count: 60)
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________

GET HELP WITH THIS ASSIGNMENT TODAY

Clicking on this button will take you to our custom assignment page. Here you can fill out all the additional details for this particular paper (grading rubric, academic style, number of sources etc), after which your paper will get assigned to a course-specific writer. If you have any issues/concerns, please don’t hesitate to contact our live support team or email us right away.

How It Works        |        About Us       |       Contact Us

© 2018 | Intelli Essays Homework Service®