With organizations moving their systems and applications to a cloud enviroment a

With organizations moving their
systems and applications to a cloud enviroment a

With organizations moving their
systems and applications to a cloud enviroment and adapting IoT devices
to complete their work, inofrmation security(IS) teams are in need to be
up to date with latest security challenges of those type of set ups.
Search in the web what are the most current pressing challenges on these fields for IS staff in organizations.
Submit a brief summary of your findings.
Choose one challenge per topic (One
for Cloud Security and one for ioT Security) that interest you. Explain
how you would handle that challenge if presented to you.

With organizations moving their systems and applications to a cloud enviroment a

With organizations moving their
systems and applications to a cloud enviroment a

With organizations moving their
systems and applications to a cloud enviroment and adapting IoT devices
to complete their work, inofrmation security(IS) teams are in need to be
up to date with latest security challenges of those type of set ups.
Search in the web what are the most current pressing challenges on these fields for IS staff in organizations.
Submit a brief summary of your findings.
Choose one challenge per topic (One
for Cloud Security and one for ioT Security) that interest you. Explain
how you would handle that challenge if presented to you.

Narcos-1 C:/ Image Analysis Using Autopsy Forensic Toolkit Introduction: This is

Narcos-1 C:/ Image Analysis Using Autopsy Forensic Toolkit
Introduction:
This is

Narcos-1 C:/ Image Analysis Using Autopsy Forensic Toolkit
Introduction:
This is a basic introduction to using Autopsy to examine the contents of a criminal suspect’s
computer. While this is not a real criminal case, but a training tool, there are examples of
paraphernalia and other nefarious dealings throughout the disk image. The situation is that there is
a gang smuggling crystal methamphetamine between Australia and New Zealand. As the new intern
at a computer forensics lab, you have been tasked with finding out some basic information about the
suspect, and the data on their computer’s C: drive.
Assignment:
Before beginning you must download (3) items from here:
https://1drv.ms/u/s!AhucZmhY8LVWgrtSJrsadgbSDK9u-A…
• Narcos_1.aut
• autopsy.db
• Narcos-1.zip
o Unzip this file (30GB)
o Open the “Image” folder within this file
o Drag both Narcos_1.aut and autopsy.db into the “Image” folder
Load the Narcos-1 image into Autopsy and examine the contents. Do this by running Autopsy and
clicking on “Open Case”. If you point the Autopsy software at the “Image” folder in the Narcos-1 folder
that you just unzipped, you should now see the Narcos_1.aut file. Double click on it and the case will
load.
After reviewing the case files, you will answer the questions below. There is a multiple choice test
that has been posted in this lesson where you will answer the questions (1-15) below.
1. What operating system is running on the disk?
Question 1 options:
A)
Unix
B)
macOS
C)
Ubuntu
D)
Windows
2. What was the encryption software used on the encrypted files?
A)
PGP
B)
TrueCrypt
C)
Credent
D)
XTS-AES
3. What method of obfuscation was used to hide files?
A)
ROT13
B)
Base64
C)
XOR
D)
Steganography
4. When was the obfuscation software downloaded?
A)
2019-01-20 19:32:16 EST
B)
2019-01-19 19:16:32 PST
C)
2020-01-19 19:16:32 EST
D)
2019-01-19 19:16:32 EST
5. What is the name of the gang that you discovered for Narcos-1?
A)
Hells Angels MC
B)
Sons of Anarchy
C)
Mongrel Mob fatherland
D)
Head Hunters
6. What application was used to delete files?
A)
BitRaser
B)
File Shredder
C)
iObit Unlocker
D)
CCleaner
7. Where can you find the flight information for the owner of the computer?
A)
Vol_vol7/Users/Steve/Desktop/Secrets/
B)
Vol_vol7/Users/Steve/Pictures/Week04/
C)
Vol_vol7/Users/Steve/Documents/Misc/
D)
Vol_vol7/Users/Steve/Downloads
8. Where would you find the most information about the owner’s personal interests?
A)
Cache
B)
Web history
C)
Desktop
D)
Downloads folder
9. How do you find deleted content in Autopsy?
A)
Deleted files under Views
B)
Recycling bin
C)
You cannot find deleted content with Autopsy
D)
Web history
10. What is the difference between Recycling bin files and deleted files?
A)
Recycling bin files are not deleted files
B)
You require special software to view deleted files
C)
There is no difference
D)
Deleted files cannot be recovered
11. How do you verify the integrity of a file on the machine image compared to the original file on
a suspect’s computer?
A)
Verify using the MD5 hash
B)
Verify if it was encrypted or not
C)
You cannot verify the integrity of a file
D)
Verify the file name
12. What email service was used?
A)
Gmail
B)
Proton Mail
C)
Hotmail
D)
Yahoo!
13. What is the name of the user on the computer?
A)
Brandon
B)
Owen
C)
Mark
D)
Steve
14. What kind of storage file maintains a history of Web searches?
A)
Tmp
B)
.db
C)
Web browser link file
D)
Web cache files
15. How many image/picture files can be found in the computer?
A)
44,467
B)
258
C)
1314
D)
313,000

Narcos-1 C:/ Image Analysis Using Autopsy Forensic Toolkit Introduction: This is

Narcos-1 C:/ Image Analysis Using Autopsy Forensic Toolkit
Introduction:
This is

Narcos-1 C:/ Image Analysis Using Autopsy Forensic Toolkit
Introduction:
This is a basic introduction to using Autopsy to examine the contents of a criminal suspect’s
computer. While this is not a real criminal case, but a training tool, there are examples of
paraphernalia and other nefarious dealings throughout the disk image. The situation is that there is
a gang smuggling crystal methamphetamine between Australia and New Zealand. As the new intern
at a computer forensics lab, you have been tasked with finding out some basic information about the
suspect, and the data on their computer’s C: drive.
Assignment:
Before beginning you must download (3) items from here:
https://1drv.ms/u/s!AhucZmhY8LVWgrtSJrsadgbSDK9u-A…
• Narcos_1.aut
• autopsy.db
• Narcos-1.zip
o Unzip this file (30GB)
o Open the “Image” folder within this file
o Drag both Narcos_1.aut and autopsy.db into the “Image” folder
Load the Narcos-1 image into Autopsy and examine the contents. Do this by running Autopsy and
clicking on “Open Case”. If you point the Autopsy software at the “Image” folder in the Narcos-1 folder
that you just unzipped, you should now see the Narcos_1.aut file. Double click on it and the case will
load.
After reviewing the case files, you will answer the questions below. There is a multiple choice test
that has been posted in this lesson where you will answer the questions (1-15) below.
1. What operating system is running on the disk?
Question 1 options:
A)
Unix
B)
macOS
C)
Ubuntu
D)
Windows
2. What was the encryption software used on the encrypted files?
A)
PGP
B)
TrueCrypt
C)
Credent
D)
XTS-AES
3. What method of obfuscation was used to hide files?
A)
ROT13
B)
Base64
C)
XOR
D)
Steganography
4. When was the obfuscation software downloaded?
A)
2019-01-20 19:32:16 EST
B)
2019-01-19 19:16:32 PST
C)
2020-01-19 19:16:32 EST
D)
2019-01-19 19:16:32 EST
5. What is the name of the gang that you discovered for Narcos-1?
A)
Hells Angels MC
B)
Sons of Anarchy
C)
Mongrel Mob fatherland
D)
Head Hunters
6. What application was used to delete files?
A)
BitRaser
B)
File Shredder
C)
iObit Unlocker
D)
CCleaner
7. Where can you find the flight information for the owner of the computer?
A)
Vol_vol7/Users/Steve/Desktop/Secrets/
B)
Vol_vol7/Users/Steve/Pictures/Week04/
C)
Vol_vol7/Users/Steve/Documents/Misc/
D)
Vol_vol7/Users/Steve/Downloads
8. Where would you find the most information about the owner’s personal interests?
A)
Cache
B)
Web history
C)
Desktop
D)
Downloads folder
9. How do you find deleted content in Autopsy?
A)
Deleted files under Views
B)
Recycling bin
C)
You cannot find deleted content with Autopsy
D)
Web history
10. What is the difference between Recycling bin files and deleted files?
A)
Recycling bin files are not deleted files
B)
You require special software to view deleted files
C)
There is no difference
D)
Deleted files cannot be recovered
11. How do you verify the integrity of a file on the machine image compared to the original file on
a suspect’s computer?
A)
Verify using the MD5 hash
B)
Verify if it was encrypted or not
C)
You cannot verify the integrity of a file
D)
Verify the file name
12. What email service was used?
A)
Gmail
B)
Proton Mail
C)
Hotmail
D)
Yahoo!
13. What is the name of the user on the computer?
A)
Brandon
B)
Owen
C)
Mark
D)
Steve
14. What kind of storage file maintains a history of Web searches?
A)
Tmp
B)
.db
C)
Web browser link file
D)
Web cache files
15. How many image/picture files can be found in the computer?
A)
44,467
B)
258
C)
1314
D)
313,000

Learning Goal: I’m working on a cyber security exercise and need support to help

Learning Goal: I’m working on a cyber security exercise and need support to help

Learning Goal: I’m working on a cyber security exercise and need support to help me learn.
Using your Kali machine:
1. Get the password files from bones using firefox (with proxy). The URL is
bones-pub.ece.iastate.edu/passwords.tar.
2. Store the file on the disk (it will be put in the Downloads directory)
3. Move the file into your home directory
4. Untar the file (tar –xvf passwords.tar )
5. You should end up with two unix password files (passwd1, passwd2) and one encrypted SAM (config
directory).
PART 1 (Crack UNIX passwords)
1. Use john or any other unix password cracking software to find the passwords in the two password files:
passwd1, passwd2
PART 2 (crack Windows XP passwords)
.
1. You need to download a table to use ophcrack. From the web browser on your kali box go to:
http://sourceforge.net/projects/ophcrack/files/tab…
2. Uncompress the zip file and then delete the .zip file
3. Run ophcrack (you will need to load the table the first time you run it) Note: you select the directory the
table was stored and click install.
4. Load the encrypted SAM file from the directory “config”.
For both part 1 and part 2 turn in a list of which passwords you found and what the passwords are.

You have to write 2 page paper (double-spaced, 12-point font, one-inch margin al

You have to write 2 page paper
(double-spaced, 12-point font, one-inch margin al

You have to write 2 page paper
(double-spaced, 12-point font, one-inch margin all around
you have to use APA Style 7th
you have to citation from research paper between 2019 until 2023
homework: you have to write 2 pages
You do not have to use ChatGtp or the same AI.
You have to use the research paper between 2019 and 2023
You have to use a review research paper.
No plagiarism
You have to check here in this link https://gptzero.me/

Identify at least five major computing trends that are already under way and ar

Identify at least five major computing trends that are already under way and ar

Identify at least five major computing trends that are already under way and are likely to continue. For each trend, pick a company and discuss how the trend could disrupt the company’s strategy.

Using your Kali machine: 1. Get the password files from bones using firefox (wit

Using your Kali machine:
1. Get the password files from bones using firefox (wit

Using your Kali machine:
1. Get the password files from bones using firefox (with proxy). The URL is
bones-pub.ece.iastate.edu/passwords.tar.
2. Store the file on the disk (it will be put in the Downloads directory)
3. Move the file into your home directory
4. Untar the file (tar –xvf passwords.tar )
5. You should end up with two unix password files (passwd1, passwd2) and one encrypted SAM (config
directory).
PART 1 (Crack UNIX passwords)
1. Use john or any other unix password cracking software to find the passwords in the two password files:
passwd1, passwd2
PART 2 (crack Windows XP passwords)
.
1. You need to download a table to use ophcrack. From the web browser on your kali box go to:
http://sourceforge.net/projects/ophcrack/files/tab…
2. Uncompress the zip file and then delete the .zip file
3. Run ophcrack (you will need to load the table the first time you run it) Note: you select the directory the
table was stored and click install.
4. Load the encrypted SAM file from the directory “config”.
For both part 1 and part 2 turn in a list of which passwords you found and what the passwords are.

There are many chipsets out there inside our phones. One of them is the Mediatek

There are many chipsets out there inside our phones. One of them is the Mediatek

There are many chipsets out there inside our phones. One of them is the Mediatek chipset. Use the following for github (you may have to install github):
https://github.com/bkerler/mtkclient
Download and create a bootable usb drive (using rufus)
Live DVD V4 User: user, Password:user (based on Ubuntu 22.04 LTS)
Follow the directions of the github link (don’t need the Linux or windows instructions) start at the USAGE part.
Go through the all the commands take screen shots
Even though you may not have a phone to use this against, the purpose is to expose you to cutting edge (experimental) tools that COULD work.
What did you like / dislike about this process? Did it make you learn a new skill set? Did it take you out of your “comfort zone”?’
Document your experience and write your opinions in a report about using this process.