Sofia University What Are Active Latent And Archival Data Discussion Questions
Description
Having Trouble Meeting Your Deadline?
Get your assignment on Sofia University What Are Active Latent And Archival Data Discussion Questions completed on time. avoid delay and – ORDER NOW
In this assignment, please answer the below questions in a detailed, substantive manner, and submit in a MS Word document.
1. Why is forensic science critical in the cyber security arena? In the legal arena? In the criminal justice arena?(Minimum 50 words)
2. What are active, latent, and archival data? (Min 50 words)
3. What is Locard’s Exchange Principle and why is it important in digital forensics? (Min 30 words)
4. Describe in detail how hard drives store data. (Min 100 words)
5. What is data persistence and why is it critical in digital investigations? (Min 30 words)
6. What is the difference between volatile and non-volatile memory? (Min 30 words)
7. What are the key enumerated points of the Dorothy Denning Talk? Why are these areas vital to cyber security professionals? (Min 100 words)
Requirements:
1. Please follow the word counts
2. Cite all sources in APA format (including the text)
3. All writing must be in your own words
4. No plagiarism or cutting and pasting will be permitted.
5. Make sure your assignment is neat and professional, with your name on the document.
Assignment Rubric
Please carefully review the rubric below before you begin so that you are keenly aware of the expectations for this assignment.
Rubric
Research Paper Rubric
Research Paper Rubric
Criteria Ratings Pts
This criterion is linked to a Learning OutcomeResponsiveness and Relevance
Completely responsive and relevant to assignment, instructions, stated requirements. Includes all required sections.
20 pts
This criterion is linked to a Learning OutcomeThesis/Purpose
Identifies a relevant research topic and a clear thesis that provides direction for the paper. Thesis clearly and concisely states the position, premise, or hypothesis and is consistently the focal point throughout the paper. Concepts and terminology are clearly understood and used appropriately.
20 pts
This criterion is linked to a Learning OutcomeAnalysis
Demonstrates clear understanding and careful analysis of the research topic, thesis, and content of the research. Displays critical thinking by comparing and contrasting perspectives, considering counter arguments or opposing positions, and drawing original and thoughtful conclusions. Reasoning and logic are sound.
20 pts
This criterion is linked to a Learning OutcomeResearch
Provides compelling, accurate, and substantive evidence to support in-depth the central position beyond assignment requirements. Depth and breadth of research is strong. Research sources are highly relevant, accurate, and reliable and add to the strength of the paper. Appropriately and correctly cites sources.
20 pts
This criterion is linked to a Learning OutcomeClear and Well-organized Writing
Each paragraph has a central idea; ideas are connected and paragraphs are developed with details; paper is easy to read and flows naturally in an organized way. Ideas are clearly connected and make sense.
10 pts
This criterion is linked to a Learning OutcomeGrammar/Syntax/Formatting Mechanics
Well constructed using standard English, characterized by elements of strong mechanics and basically free from grammar, syntax, punctuation, usage, and spelling errors.
10 pts
Total Points: 100
This Module’s readings will cover the basics of cyber security and will introduce you to cyber crime and digital forensics.
1. Text Reading: Chapter 1 “Introduction”
Chapter 1 introduces you to the basics of digital forensics, what it is, its scientific basis, and its place in the legal system as well as in the cyber crime prevention system. Please read this chapter thoroughly, as we will be covering its principles throughout the class.
2. Text Reading: Chapter 2 “Key Technical Concepts”
In this chapter, a thorough review of key computer science concepts is covered including number systems, bits & bytes, data types, etc. It is a good idea to focus on this chapter if you need a review of these computer science and computer architecture concepts, as they will be utilized in all digital forensics applications.
3. Video: Dorothy Denning TED Talk on Cyber Crime
Open & Back Doors: Why Cyber Crime is a Growing Threat | Dorothy Denning | TEDxSantaCatalinaSchool (Links to an external site.)
Dorothy Denning is considered as one of the founders of the field of cyber security. In this TED Talk, she goes over how cyber crime is on the rise and what we can do about it. Please pay attention to her key points and how they relate to each other.