Data Analysis Chapter on "Computer Forensics Computers"
Data Analysis Chapter 4 pages (1280 words) Sources: 2 Style: APA
[EXCERPT] . . . .
Indeed, many people have active disdain for laws regarding national security and state secrets. Some go so far as to say that there should be nothing withheld from the public while others insist it is necessary to ensure that other nation state government and/or terrorists do nto use the information to exploit the country it comes from and/or pertains to and/or to hurt the people impacted by the information. For example, the location of ICBM missile launchers may seem like fair game to people that are against the manufacturing and use of those missiles but this could absolutely be hurtful to the United States, just as one example, if a country like Russia, North Korea or Iran were to come across the information.In the case of John Deutch, the idea that a director of one of the, if not the most, premier intelligence agencies in all of the world and over the history of all mankind to have state secrets on an unsecured computer that is not widely used (not even today) like Windows computers and Microsoft Windows is woefully negligent. In addition, to have people with no security clearance or other permission to have unfettered access to those computers is equally insane. Any computer connected to the internet can be exploited at any time given the right technology and such. In addition, it was no secret that Deutch held the position he did so it makes him an easy target and it makes it easy for people to get the information if they know where to find his computers online. Often times, it is as simple as knowing where he is physically located and what network(s) he uses to communicate online. It is right up there with the seemingly non-existent security at the Los Alamos nuclear facility over the last
download full paper ⤓
The implications and potential problems with the Deutch case are equally vesting. It's extremely hard for a hacker, especially now, to cover their tracks when hacking a computer but in the day in which this happened and given that the computers were not secured with proper protocols makes it impossible to know who exploited the data, how many times it happened or even if the family themselves knowingly or unknowingly released or saw things that can be insanely damaging to the United States or allies like those in NATO and otherwise.
While it may seem like overkill, especially to much less sensitive situations like those in the private sector and personal computer security, anyone and anything can be exploited if there is any information related to credit cards, social security numbers, home and business address information, phone numbers and so forth. Business, government and personal users alike need to be vigilant and careful about how they act online, how secure their computers are and what they choose to store on computers or things like flash drives that can be easily stolen or lost. Top-shelf firms like Target and TJX Corporation have found out the hard way what happens when they get lazy or lackadaisical about their IT security and none of those two firms protections were in place on Deutch's computers.
References
Drogin, B. (2000, June 17). Lost Los Alamos Hard Drives Found Behind Lab Copier. Los Angeles Times. Retrieved February 1, 2014, from http://articles.latimes.com/2000/jun/17/news/mn-41946
Mann, C. (2011, June 15). Casey Anthony Trial Update: Anthony got "Bella Vita" tattoo while Caylee was missing. CBSNews. Retrieved February 1, 2014, from http://www.cbsnews.com/news/casey-anthony-trial-update-anthony-got-bella-vita-tattoo-while-caylee-was-missing/ READ MORE
Quoted Instructions for "Computer Forensics Computers" Assignment:
Case Analysis. Computer Forensics.
Identify two reported cases that have impacted the evidentiary process or analysis in digital forensic cases; student will cite the case and summarize the issue before the court; the majority of the analysis should be dedicated to the impact the cases had on the application of digital evidence in the criminal justice system or the manner in which the digital forensic analyst performs his/her function
Students may use an unreported case with the instructor*****s approval; instructors may pre-identify the cases, and the project will begin with the summarizations
Project Requirements:
4 full pages minimum (approximately 2 pages per case)
Paper should be initiated with an introductory paragraph and ended with a conclusion
Cover page (not included in page count): course number, course title, title of paper, student*****s name, date of submission
Format: 12 point font, double-space, one-inch margin
Bibliography/reference page (not included in page count): APA citation style, textbook included as a reference
Case #1 Casey Anthony.
Case#2 John Deutch: One high-profile case is that of ex-CIA director John Deutch. He stored over
17,000 pages of classified documents on unsecured Macintosh computers
in two of his homes. National security secrets were stored where almost anyone
could access them. His computers, designated for unclassified use only,
were connected to modems and regularly used to access the Internet and the
Department of Defense (DoD). Family members were also allowed to use those
same PCs.
*****
How to Reference "Computer Forensics Computers" Data Analysis Chapter in a Bibliography
“Computer Forensics Computers.” A1-TermPaper.com, 2014, https://www.a1-termpaper.com/topics/essay/cases-john-deutch-casey-anthony-case/7797213. Accessed 6 Jul 2024.
Related Data Analysis Chapters:
Incident Response and Computer Forensic Investigation Research Paper
Computer Forensic investigation
Making an initial assessment about the case.
Identifying the risks.
Mitigating or minimizing the risks.
Determining a preliminary design or approach to the case.
Creating a detailed… read more
Research Paper 12 pages (3228 words) Sources: 7 Topic: Computers / IT / Internet
Computer Forensics: Donning Your Detective Hat (Biggs Term Paper
Computer forensics: Donning your detective hat (Biggs, 2005) describes computer forensic activity as a four-phase process that involves evidence collection, evidence preservation, analysis and reporting. While a high-level synopsis, the… read more
Term Paper 1 pages (403 words) Sources: 1 Style: APA Topic: Computers / IT / Internet
Computer Surveillance Term Paper
Computer Surveillance: Qualitative Attempt to Conceptualize Crime in the 21st Century
Purpose/Objectives/Theoretical Framework
Summary of Remaining Chapters
Computer Crime in a Digital Age
The Impact of the Net on Computer… read more
Term Paper 19 pages (4976 words) Sources: 1 Topic: Computers / IT / Internet
Digital Forensics Research Paper
Cloud Computing Digital Forensics
The pace at which technology develops in today's world makes inventions and discoveries very temporary and short-lived. Digital forensics is an area of technological development that… read more
Research Paper 4 pages (1273 words) Sources: 4 Topic: Computers / IT / Internet
Techniques of Computer Forensics for Preventing Email Phishing Capstone Project
Computer Forensics for Preventing Email Phishing
It is no secret that white-collar crime has experienced rapid growth since the advent of the Internet. Reports state that white-collar crime costs average… read more
Capstone Project 17 pages (4655 words) Sources: 10 Topic: Computers / IT / Internet
Sat, Jul 6, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!