Running a tox screen for a digital system

Assignment Help Computer Network Security
Reference no: EM132137565 , Length: 4 pages

Part - A

The assignment

Write a critique / review of the following paper:

Mark Pollitt Eoghan Casey David-Olivier Jaquet-Chiffelle Pavel Gladyshev, "A Framework for Harmonizing Forensic Science Practices and Digital/Multimedia

Evidence", OSAC Technical Series 0002, January 2018, Your critique should be as objective as possible: highlight what you consider to be its strongest and weakest aspects. Are themes discernible that would help one to "interpret" the document? What role can or will it play in the digital forensic science community? If you can uncover themes do you expect the effect of the paper to be aligned with its themes? Why (not)?

Part B

The assignment

According to Wikipedia,

Forensic toxicology is the use of toxicology and other disciplines such as analytical chemistry, pharmacology and clinical chemistry to aid medical or legal investigation of death, poisoning, and drug use.

Obviously, the digital domain is very different from the domains of biology, chemistry and medicine, but one may argue that malware is possibly similar to toxins in the sense that they cause behavioural changes in (and sometimes death of) a digital system. The question that arises is whether this analogy is superfi- cial without any merit apart from possibly being a quaint observation, or whether the analogy contains some profound lessons learnt over centuries that may help the digital forensic scientist to help answer the question "Was this system ‘poi- soned'?" Is there anything akin to ‘running a tox screen' for a digital system?

Obviously the usual methods used in toxicology (such as gas chromatography) will be useless in the digital world and will require the analogy to be developed much further than done in the previous paragraph.

The challenge of this assignment is to see how far the analogy can indeed be developed (within the length constraints). This requires one to - to the extent possible - determine whether the idea shows promise that could be developed further. Alternatively, one may start by reflecting on the obstacles that may render the idea to be too far fetched to be of practical significance. Either way you will hopefully be able to present a well argued case for whatever outcome you foresee.

Reference no: EM132137565

Questions Cloud

Summarize all of the research studies used as evidence : Summarize all of the research studies used as evidence. The essential components of each study need to be described so that readers can evaluate its scientific.
Make a list of access points internal and external : Evaluate the perimeter security, make a list of access points internal and external(remote), identify vulnerabilities and make suggestions for improvements
Explain the expected outcomes of the project : Organization Culture: Explain the way(s) in which the proposed solution is consistent with the organization or community culture and resources.
Describe the setting and access to potential subjects : Describe the setting and access to potential subjects. If there is a need for a consent or approval form, then one must be created.
Running a tox screen for a digital system : COS721 - Determine whether the idea shows promise that could be developed further. Alternatively, one may start by reflecting on the obstacles that may render
What paradigm does the nurse leader have : What paradigm does the nurse leader have that the nurse practitioner may not have? Why is the focus of the nurse Practioner so different and is that good.
What is the yield to maturity : FIN 3200 : Marc owns a bond that will pay him $90 each year in interest plus a $1,000 principal payment at maturity. What is the $1,000 called?
Explain the relationship of risk management programs : Assume that the example risk management program you analyzed in Topic 1 was developed by and is now currently implemented by your health care employer.
Discussing the concept of systems thinking : We were discussing the concept of Systems thinking and how it is essentially learning about oneself in interaction with the surrounding world

Reviews

len2137565

10/10/2018 11:45:28 PM

1. This is assignment A. You are expected to submit any two (2) assignments in the series A, B, C and D. 2. The two assignments that you submit will each carry a weight of 15% to- wards your semester mark. 3. These assignments need to be properly supported with references to the scientific literature. 4. Use a 12pt font for the body of your assignment. 5. The assignment many be up to four (4) pages long, including any appendages (or cover pages, etc). 6. The due date will be discussed in class and announced on the course site.

Write a Review

Computer Network Security Questions & Answers

  Will your file system of choice provide security

What type of OS to use along with the file system and why is this architecture is better than others? Will you use the same OS for servers and Desktops? Will your file system of choice provide security?

  Network engineer, you are presented

As the network engineer, you are presented with the following, 172.16.0.0. / 18 IP addressing information and are asked to identify all of the possible subnet ID from the list below, assuming that the /18 subnet is used throughout the network. (Choos..

  Computing decryption function and recovered plaintext

Decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this?

  Design the setup of your it infrastructure

Design the setup of your IT infrastructure and make sure that you can justify how it will " prevent"/detect external as well as internal threads.

  Implement the cipher as a class

Implement the cipher as a class which implements the provided interface.

  Scenario where the md5 or sha-1 algorithms

Outline a scenario where the MD5 or SHA-1 algorithms could be (or have been) put to poor and improper use - Outline a scenario where the MD5 or SHA-1 algorithms are put to good and proper.

  Benefits of having a computer security

In your report, discuss the benefits of having a computer security incident response team within your enterprise. Also discuss the major steps involved in responding to a system security incident. Support your report with real-life examples.

  How is risk defined in the context of information technology

How is risk defined in the context of information technology.

  Describe how nessu is useful to network security specialist

Write a pragraph describe how it is useful to a network security specialist and how it may be used for harmful purposes by a hacker?

  Describe a technique used by hackers to cover their tracks

Describe a technique used by hackers to cover their tracks after a network attack. This may take a little bit of research so please post your source in this discussion

  What could ssb and alice have done to protect

Assuming SSB wishes to continue using only 3DES as its cryptographic system, what could SSB and Alice have done to protect against this controversy arising?

  Describe if a firewall is enabled on your machine

Identify if a firewall is enabled on your machine and if you need Windows firewall running in addition, if that anti-virus software is installed on your machine.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd