Tuesday, May 5, 2020

Computer Forensics and Its Application-Free-Samples for Students

Questions: 1.Discuss about the some technical details of how to approach an employee fraud. Please make task 1 around 500 words including all the required answers and problems and solution. 2.Investigate partition manager utilities. It should look like "task 2 table" image (attached). Answers: 1.The ABC Bank has decided to investigate any presence of employee base frauds. The network infrastructure of the bank is comprised of 15TB servers on the enterprise based LAN network. The administrator of the network is familiar with the storage of data and applications. List of tools to be used For addressing to the needs of the system, many tools and techniques are to be used which will help in solving the associated problems. The first tool is the profile and behavioral analysis. The bank needs to integrate profiling analytics in their general processing which can leverage peer data to provide sophisticated insights on the activities (Cavelty and Mauer 2016). This will reduce the possibility of employee fraud. The next tool that can be used is the integration of a dynamic dashboard for performance monitoring. The performance dashboard is used for monitoring the system and getting the analytics required. This will help in undertaking management decisions for each day. The third tool that can be used is the relationship mapping tool which helps in determining the behavior of an employee on the subject of their use of applications. This helps in alarming the system against any different employee behavior on the system. The last tools or techniques that can be implemented are the rule authorization on real time. In this case, the administrators are allowed to create rules on the system which can be modified based on the changes (Cavelty 2014). These helps in reducing the fraud attempts on the company by the employees associated Acquisition of data The acquisition of data can be processed by visiting the network administrators. As they are responsible for the successful storage of data, it can be acquired for analysis. Moreover, this paper will also be used to collect primary data from the employees for determining the present of any fraud attempts. This will be done by surveys or interviews. Strategies for administration It is required to strategically ask for data and analyze them. For this reason, the administrator will be sent a consent form which will list the various policies to be followed. This will help in gathering of the data without any problems being associated. Privacy issues The privacy issues of a bank are mainly in place for addressing the various security based requirement of the bank. The data that is collected must not be used for third party selling. Moreover, this information must be safeguarded and their use is not to be emphasized after the successful evaluation of the network administration (Ilyas 2015). The credentials collected from the data administrators, like the bank account details or the employee records are to be safeguarded so that it cannot be sold to other companies. The next privacy issue is that the Bank must be able to encrypt their information once their use is over. This will help in protecting their resources. Validation of data Validation of data is involved with cleansing of the associated data which will help in maintaining the quality of the data. The information that will be collected for analysis is to be validated by using software applications. There are various software which can be used for data validation.2. Name of the product OS supported File system supported Max partition size Command Line or GUI or both Cost 1. Paragon Partition Manager 4 (Windows 8. 7, Vista and XP) FAT, NTFS and Linux EXT 7 Both 39.95$ 2. Acronis Disk Director 3 (Windows 7, Vista and XP) FAT and NTFS 7 GUI 49.95$ 3. Spotmau Partition Genius Review 3 (Windows 7, Vista and XP) FAT, FAT32, NTFS 3 GUI 39.95$ Name of the product OS supported File system supported Max partition size Command Line or GUI or both Cost 1. Paragon Partition Manager 4 (Windows 8. 7, Vista and XP) FAT, NTFS and Linux EXT 7 Both 39.95$ 2. Acronis Disk Director 3 (Windows 7, Vista and XP) FAT and NTFS 7 GUI 49.95$ 3. Spotmau Partition Genius Review 3 (Windows 7, Vista and XP) FAT, FAT32, NTFS 3 GUI 39.95$ References Brangetto, P. and Aubyn, M.K.S., 2015. Economic aspects of national cyber security strategies.Brangetto P., Aubyn MK-S. Economic Aspects of National Cyber Security Strategies: project report. Annex,1, pp.9-16. Cavelty, M.D. and Mauer, V., 2016.Power and security in the information age: Investigating the role of the state in cyberspace. Routledge. Cavelty, M.D., 2014. Breaking the cyber-security dilemma: Aligning security needs and removing vulnerabilities.Science and Engineering Ethics,20(3), pp.701-715. Ilyas, M.M., 2015. Cyber security. Lee, J., Bagheri, B. and Jin, C., 2016. Introduction to cyber manufacturing.Manufacturing Letters,8, pp.11-15.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.