CSE 300 Cybersecurity Engineering Program Assignment

Assignment Help Computer Engineering
Reference no: EM133122728

CSE 300 Cybersecurity Engineering Program - Abu Dhabi University

Learning Outcome 1: Develop an in depth understanding of the digital forensics process

Learning Outcome 2: Develop an understanding of the tradeoffs and differences between various forensics tools

Learning Outcome 3: Identify and document potential security breaches of computer data that suggest violations of legal, ethical, moral, policy, and/or societal standards.

Assignment Description

This assignment consists of two tasks (Maximum 10 to 12 pages including references page).

Task 1: The purpose of this part of the assignment is to enable the students to study different breaches of computer data done in the past in the literature or in real world. The students will analyze the selected study in terms of legal, ethical, moral, policy and social standards.

Task 2: In this part, students will search and analyze the functionality of different tools used in the digital forensics process. A comparison of the selected tools will be done in terms of similarities and differences between them. The study will also find out different tradeoffs of using different tools in different situations.

Details of the Tasks

Task 1:
1. Each student is required to select any cyber crime happened in the history from the internet (some interesting cyber crimes are listed below) and discuss that breach for following points:
• Brief overview of the cyber crime (summary)
• Discuss the cyber crime:
o Legal aspects
o Ethical/Moral aspects
o Policy and social standards violations and impact
o Forensics summary to explain about how cyber crime was identified
2. Please write all the refences for the information and cite properly in the text.
3. Please write maximum 2 to 3 pages to address all the points in a comprehensive way and to the point.

Background information for Part 1
With the increase in digital technology advancements, we live in a digitized world, sopeople are more dependent on their smartphones or laptops/tablets for their day-todaywork and social media. Technologies like Internet of Things (IoT) and smart homesmake life easier for humans. But due to vulnerabilities in these devices, an attackercan exploit these vulnerabilities and gain control over these systems. Here are a fewcybercrimes that are faced by individuals or organizations:

Some Notable Cyber Crimes from the Past from 2018
Aadhaar
Aadhaar is a 12-digit unique identifier that is assigned to every Indian citizen. Aadhaar
records of all 1.1 billion India citizens were compromised.

Facebook
Hackers exploited Facebook's vulnerability, which allowed them to steal Facebook
access tokens.
• In the month of March, 50 million records were breached.
• In the month of September, 90 million records were breached.
• And in December, 7 million records were breached.

Quora
Quora is a platform where its users can ask and answer questions. A malicious third
party attacked it. Account information of 100 million Quora users including their name,
email address, and encrypted password were compromised.

Marriott Hotels
Marriott Hotels suffered a data breach in which personal information of 500 million
hotel guests were stolen. This included names, emails, addresses, dates of birth, credit
card information, and passport numbers of the guests.

TicketFly
Ticketfly, an event ticketing company, was the target of a malicious cyberattack.
Information of approximately 27 million Ticketfly users, including their names,
addresses, email addresses, and phone numbers, were compromised. Any financial
information such as credit and debit cards were not compromised during this attack.

MyHeritage
MyHeritage Company is an online genealogy platform, which tests its users' DNA to find
their ancestors and build their family trees. Ninety-two million records of users who
signed up before October 26, 2017, were breached. But DNA information and family
trees were stored on separate systems, which were not breached.

Exactis
Exactis's database was on a publicly accessible server. Exactis exposed approximately
340 million records in which information was comprised of an email address, phone
number, physical address, etc.

British Airways
British Airways faced a serious attack on its website and application. Approximately
380,000 card payments made to British Airways between August 21st and September 5
were compromised. The hackers in this attack used the credit card skimming technique.

Cathay Pacific
Cathay Pacific is an airline company from Hong Kong. The company's data breach
exposed personal information of 9.4 million passengers.

Under Armour
The company's food and nutrition app were hacked, and 150 million records were
breached. But the company processes payments through a separate channel, and
therefore any payment information was not leaked.

Task 2:
1. Each student should select one tool from each of the below given categories form the internet and discuss for given points
List of categories (Each student will select 8 tools, one for each of given categories)
1) Disk Forensic Tools
2) Network Forensic Tools
3) Wireless Forensic Tools
4) Database Forensic Tools
5) Malware Forensic Tools
6) Email Forensic Tools
7) Memory Forensic Tools
8) Mobile Phone Forensic Tools
After selection of tools for above categories, please discuss each tool for following points:
• Security
• Support for multiple platforms
• User-friendly interface
• Features and functionalities offered
• Support for multiple devices
• Support for multiple file formats
• Analytics features
• Integrations and Plugins support
• In which scenario/situation will you use this tool?
• What are the positive and negative aspects of using the tool (what will go right and what can go wrong).

Attachment:- Cybersecurity Engineering Program.rar

Reference no: EM133122728

Questions Cloud

What the total sales revenue reported : If the sale referred to above was a downstream sale, what the total sales revenue reported in the consolidated income statement for 20X4
What are these two fundamental characteristics : Joy Ltd believes that it will use the building for another six years. After that time, building will be disposed. What are these two fundamental characteristics
Build an income statement for the company : You are working as the finance manager for Inghams Ltd. The following data is available for the company as of 31 June 2021:
Record the journal entries for the revaluation of the plant : As at 30 June 2021, the fair value of the plant was estimated to be $101 000. Ignoring tax, record the journal entries for the revaluation of the plant
CSE 300 Cybersecurity Engineering Program Assignment : CSE 300 Cybersecurity Engineering Program Assignment Help and Solution, Abu Dhabi University - Assessment Writing Service
Compute the expected return on company stock : Compute the Expected Return on your Company's Stock (Google search "ticker symbol" for your company to get your company's ticker symbol):
What is the equipment after-tax net salvage value : The used equipment can be sold today for $4.4 million, and its tax rate is 25%. What is the equipment's after-tax net salvage value
Total market capitalization of the firm : Agilex Bio-Imports will pay an annual dividend of $2.5 per share and an extra dividend of $0.35 per share at the end of this month. The company's stock is curre
What was the goods available for sale : Super Discounter Inc. is a merchandizer who had inventory at the beginning of the year of $750,000. What was the goods available for sale

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd