journal

Instructions Authentication and authorization are two distinct services that go hand in hand. Each plays a major role in the CIA triad. In your journal, write about authentication and authorization and the role each plays in protecting or compromising data. Your...

Device collection paper

  Go online and find one (or two if you prefer) court cases where mobile or computer forensic evidence was used. Detail as much as you can about why the evidence was important, what went wrong in the collection process(if anything) or what went right. Focus not...

SIM forensics paper

 The landscape is changing on the mobile front, just in September, Apple announced the iPhone 14 would only use the eSIM instead of a traditional SIM card. eSIMs are not new, but this is the first announcement that they are eliminating the SIM card to use eSIMs....

IOS forensic paper

  Download the following files for the lab: iOS Raw FileLinks to an external site. or iOS DatasetLinks to an external site. & Autopsy Case FileLinks to an external site.. You will also need to download AutopsyLinks to an external site. from the internet....

individual project 2

  We have seen an exponential increase in the number of cybercrimes and litigations involving large organizations and individuals. Cybercrime remains the greatest threat to every company globally and one of the biggest problems with humankind.  You are...

individual project 3

  Project Descriptions We have seen an exponential increase in the number of cybercrimes and litigations involving large organizations and individuals. Cybercrime remains the greatest threat to every company globally and one of the biggest problems with...