Select Page

1.Many people consider the iPhone environment to be more secure and better protected against malware than the Android environment. Why is this? In other words, what steps has Apple taken to make its devices more resistant to attack? Do you agree with Apple’s methodology or not? Explain your answer.

Unformatted Attachment Preview

Don't use plagiarized sources. Get Your Custom Essay on
Best Known Forensics Tools For Information Securiy Discussions Help
Just from $10/Page
Order Essay

1. Many people consider the iPhone environment to be more secure and better
protected against malware than the Android environment. Why is this? In
other words, what steps has Apple taken to make its devices more resistant to
attack? Do you agree with Apple’s methodology or not? Explain your answer.
2. The portable nature of cell phones and tablets heightens the risk of data theft
to users. Do you feel that users of these devices are proactive in protecting
their data with technologies such as passwords, encryption, and so forth? Or
do you think most users trust that their data will be protected, even if the
device is lost or stolen? Do you think that there is a growing awareness of the
risk of not protecting data? Explain your answers.
3. As cell phone forensics is relatively new and dynamic, new information comes
out every day regarding this field of work. Find an article or instructional
document or video that applies a process or solution to a problem associated
with cell phone forensics. Provide both the URL and a brief summary of your
4. Consider the question of mini-cameras (Google Glass, for instance) and
security. How do you think these types of devices affect privacy? Do you think
there will come a time where these types of cameras will be so small that
they’ll be impossible to detect?
5. Please read the following paragraph, from a section of a government article entitled, “Is Military
GPS More Accurate than Civilian GPS?”
The accuracy of the GPS signal in space is actually the same for both the civilian GPS service
(SPS) and the military GPS service (PPS). However, SPS broadcasts on one frequency, while PPS
uses two. This means military users can perform ionospheric correction, a technique that
reduces radio degradation caused by the Earth’s atmosphere. With less degradation, PPS
provides better accuracy than the basic SPS (, 2014).
Do you feel that the general public should be able to use the PPS system rather than the SPS
system for GPS navigation in order to take advantage of the system’s accuracy? Why or why
Reference: (2014). GPS accuracy. Retrieved April 3, 2014, from
6. Wireshark is arguably the most popular network-sniffing application, but it is
by no means the only such program available. Conduct a search to find a
program that can be used for sniffing, network analysis, intrusion
detection/prevention, or anything having to do with network monitoring. This
program can be free, open-source, or commercial (involving a fee), and it can
run on any OS. Provide the URL for the site showcasing the software package
and explain why this program would be a useful addition to your forensic
investigation toolkit.
7. CAINE and DEFT are two distributions of Linux that operate as live DVDs and that contain
numerous forensic-related tools. Below is a list of the tools available on the CAINE and/or the
DEFT live DVD. Please pick a tool from the list and describe how it could be used in a forensic
This conference topic requires you to submit two posts: the first letting us know which of the
programs you chose to investigate, and the second containing a description of the program,
including a link to the website of the program, the general functions and benefits of the
program, and whether or not you think you’d ever use the program during an investigation. (It’s
okay to say no, but please let us know why you feel this way. Do you know of another program
that can do a better job?)
Autopsy 2
Bulk extractor 1.3.1/Bulk extractor GUI 1.3
Cyclone 0.2
Digital Forensics Framework (DFF) 1.3
Dumpy 0.2
ExifTool by Phil Harvey
forensic recover of evidence device (FRED)
Google Chrome Open Source Intelligence (OSINT)
Guymager 0.7.1
iPhone Backup Analyzer
log2timeline 0.65
Maltego Radium
MDB Tool
Mobius Forensic Toolkit
Mount EWF
Quick Hash
recoll 1.19.5
Skype Extractor
The Sleuth Kit (TSK)
SQLite Database Browser
Xplico 1.0.1
Zenmap (Nmap)
8. Please read the Washington Post article “Supreme Court to decide case on
police cellphone searches” and express your opinion on the dilemma
described. The article presents two arguments in connection with the Fourth
Amendment and mobile devices. The argument supporting the legality of
searching mobile devices without a search warrant claims that a mobile device
such as cell phone should be considered a piece of property found on the
suspect, such as a wallet or purse, and should therefore be searchable in the
absence of a warrant.
The opposing argument states that, unlike a wallet or purse, a mobile device can
hold hundreds if not thousands of files containing personal information, the likes of
which could only be found in a person’s home until quite recently. For example,
home videos, personal photos, and personal documents are now commonly found
on mobile devices. This argument asserts that a search warrant should be necessary
for a law enforcement officer to be able to legally search a mobile device.
What is your opinion on this argument? Do you feel that a search warrant should be
required for a law enforcement officer to be able to legally review the contents of a
mobile device? Why or why not?
9. Please read the Diversified Risk Management, Inc. article “Self-Incrimination
vs. File-Encryption: Finding a Workaround for the Fifth Amendment” and
answer the following questions. The Fifth Amendment states, in part, that “no
person shall be held to answer for a capital, or otherwise infamous crime,
unless on a presentment or indictment of a grand jury. . . .”
Understanding this, do you feel that a suspect should be required to reveal a
password he or she used to encrypt personal data? Do you feel that the government
has the right to demand the password? To break the encryption when the suspect
does not reveal it? Should the severity of the alleged crime matter? That is, should
the government be allowed to make case-by-case decisions on whether to demand
the password or break the encryption?
Reference: U.S. Const. amend. V.
USB thumb drives are convenient because of their small size and large
storage capacity. These two characteristics, however, can be detrimental to an
organization’s network security. Assume that you are the chief information
officer (CIO) of a large, multi-location organization. You are addressing the
use of thumb drives on company-owned equipment. Briefly describe the steps
you will take to protect your organization’s security in the absence of banning
USB devices altogether. Here are a few questions to get you thinking, but
please address other issues and/or concerns.

Will you allow employees to use personal USB devices on the company’s systems, or
will you mandate that they use only company-issued devices?

Will you disable all USB ports? If so, how?

Will you purchase software that monitors USB ports and that reports their use to a
centralized database? Where will you find such software?

Portable apps and bootable Linux distributions are growing in
popularity. Not only are they highly transportable via thumb drive, but they
also run faster than CDs and DVDs. Conduct a search to find either a portable
app or a Linux distribution that you think would be useful during a
forensic/intrusion investigation. Why would you consider adding this a pp or
distribution to your investigator’s toolbox?

Our essay writing service fulfills every request with the highest level of urgency.

Order your essay today and save 10% with the discount code ESSAYHSELP