Task 1: Please answer the following questions in detail:
1. Describe the 3 basic types of operating system hibernation. How can hibernation files provide usable forensic evidence?
2. What is print spooling and how can it be used for gathering forensic evidence?
3. How can metadata be used as forensic evidence? What is its value?
4. What are restore points and shadow copy?
5. Describe in detail how you could hide data from a forensic investigation.
6. Describe the 3 main password attacks.
7. What is steganography and how is it used to hide data?
8. How can defragmentation be used as an anti-forensic technique?
9. If you were trying to hide data, how would you do it to prevent a forensic investigator from finding it?
10. If you were a forensic investigator, what things would you look at first if you suspected anti-forensic techniques being used to hide data?
Task2: Read the course content and case study materials, then respond to the questions using the course materials and outside, cited, research. You must have a reference section at the end of your assignment.
Answer the questions in a report format, with a heading representing the question (not the full question) and a complete reference section.
Include a brief introduction and conclusion section (about 25 – 50 words each). Include a title page. The word counts listed are a minimum.
1. Watch the video on attack vectors for satellites. Write 10 bullet points in full sentences covering the 10 points that you feel are the most important points of the video.
2. In 100 words, describe the software vulnerabilities of a satellite.
3. In 100 words, describe the various threats to a satellite’s software. Hint: look up radiation hardening, temperature issues as well as malicious threats.
4. In 100 words, describe how various DoS attacks or DoS variants can be launched against a satellite
5. The article notes that there have been at least 6 attacks on satellites. Research one of the attacks and prepare a 200 word description of the attack and the results of the attack.
Ensure that your report is spell and grammar checked and free of plagiarism.
Research Paper Rubric
Research Paper Rubric
Criteria Ratings Pts
This criterion is linked to a Learning OutcomeResponsiveness and Relevance
Completely responsive and relevant to assignment, instructions, stated requirements. Includes all required sections.
This criterion is linked to a Learning OutcomeThesis/Purpose
Identifies a relevant research topic and a clear thesis that provides direction for the paper. Thesis clearly and concisely states the position, premise, or hypothesis and is consistently the focal point throughout the paper. Concepts and terminology are clearly understood and used appropriately.
This criterion is linked to a Learning OutcomeAnalysis
Demonstrates clear understanding and careful analysis of the research topic, thesis, and content of the research. Displays critical thinking by comparing and contrasting perspectives, considering counter arguments or opposing positions, and drawing original and thoughtful conclusions. Reasoning and logic are sound.
This criterion is linked to a Learning OutcomeResearch
Provides compelling, accurate, and substantive evidence to support in-depth the central position beyond assignment requirements. Depth and breadth of research is strong. Research sources are highly relevant, accurate, and reliable and add to the strength of the paper. Appropriately and correctly cites sources.
This criterion is linked to a Learning OutcomeClear and Well-organized Writing
Each paragraph has a central idea; ideas are connected and paragraphs are developed with details; paper is easy to read and flows naturally in an organized way. Ideas are clearly connected and make sense.
This criterion is linked to a Learning OutcomeGrammar/Syntax/Formatting Mechanics
Well constructed using standard English, characterized by elements of strong mechanics and basically free from grammar, syntax, punctuation, usage, and spelling errors.
Total Points: 100
Readings & Media
The materials for Module 3 are listed below. Please pay special attention to the Case Study materials.
Text Reading: Chapter 5 Windows System Artifacts
This chapter goes into the details of the Windows Operating System and how to find things such as deleted data, print spooling evidence, image evidence, and metadata. Please read this chapter very carefully, as the crux of many cyber operations revolves around getting data from the operating system.
Text Reading: Chapter 6 Anti-Forensics
This chapter covers the mechanisms to hide data, such as encryption; data attacks; password attacks, and steganography. Anti-forensic tools help to uncover data when these mechanisms are used, and can be a very complex endeavor.
Case Study: Cyber Attacks on Satellites
For this week’s case study, we will study cyber attacks on satellites. Please review the following material related to the case study. These materials are also referenced in the case study thread.
a. Article on NSA Cyber Study on Satellites:
b. Video: Attack Vectors in Orbit:
c. NASA JPL Cyber Security Audit Report:
Order an Essay Now & Get These Features For Free: