Wednesday, October 30, 2019

Assignment 2 Example | Topics and Well Written Essays - 1250 words

2 - Assignment Example In this regard, the moral dilemma makes many businesses stagnate when it comes to development and intended expansion (Render et al., 2011). However, for Fran’s Fries the challenge posed is the need to hire additional pair of hands or not having to hire any. This is because the business has not yet established its customer capacity hence creating the problem. In this regard, this report will zone in on the steps that Fran’s Fries should take in ascertaining whether to hire the two nieces considering that it is a new eatery. This shall be through the use of the quality control theory and the statistical control process. Total quality management In a business setting, quality service is the lasting gesture that clients experience within the execution of service in a business. It is the trait that attracts and sustains a business’ client base that makes it stand out from its competitors. In essence, quality is the degree to which customer satisfaction becomes the mot ivating factor rather the profits that a business may achieve. Subsequently, total quality management becomes an integral part of business operations that entail details the entire chain from the supplier right to the consumer. Ideally, the management of quality focuses entirely on the business’ commitment in ensuring that the products and the services rolled out exceed consumer perception (603). This commitment runs across the whole business or company hence not specified to one department of the organization. Therefore, it is essential for any business set up to ascertain ways in which it may offer quality services and products to its customers. For Fran’s case, it would be beneficial to hire the nieces in order to minimize the loss of customers because of having to stand in a queue for long before accessing her products. This means that her products are of quality because of the high demand associated to the product. However, establishing that she has low clientele would mean that she would not have to hire her nieces despite the fact that she would want to help them out by employing them. On the other hand, having a low number of customers would also mean that she would have to improve on the quality of her products so as to attract more customers. Statistical process control Ideally, the achievement of quality attributes to the standard set either by the organization offering products or services or an externally related overall governing organization. In this regard, the statistical process helps in the establishing of standards in order to measure, change, and monitor challenges facing a business. The effective achievement of this process would be during the initial stages of production. For instance, this process may apply for Fran’s Fries when preparing the food for sale to its display. This helps in making correct changes to the products on offer to ensure that they provide quality. It involves the taking of samples produced and ascertaining whether they meet to up to the required set standards. Further, the process invokes the use of control charts that are in the form of graphs that portray the highest and the lowest levels intended for the control process. Their application involves the application of prior data that portray initial performance. In Fran’s case, the older niece past work performance may be useful in establishing whether she is a suitable

Sunday, October 27, 2019

Proactive and Reactive Cyber Forensics Investigation Process

Proactive and Reactive Cyber Forensics Investigation Process PROACTIVE CYBER FORENSIC ANALYSIS Proactive And reactive cyber forensics investigation processes: A Systematic Literature Review(SLR) A multi-component framework of cyber forensics investigation Abstract—Digital Forensics can be defined as the ensemble of methods, tools and techniques used to collect, preserve and analyze digital data originating from any type of digital media involved in an incident with the purpose of extracting valid evidence for a court of law. In it investigations are usually performed as a response to a digital crime and, as such, they are termed Reactive Digital Forensic (RDF). This involves identifying, preserving, collecting, analyzing, and generating the final report. Although RDF investigations are effective, they are faced with many challenges, especially when dealing with anti-forensic incidents, volatile data and event reconstruction. To tackle these challenges, Proactive Digital Forensic (PDF) is required. By being proactive, DF is prepared for incidents. In fact, the PDF investigation has the ability to proactively collect data, preserve it, detect suspicious events, analyze evidence and report an incident as it occurs. Index Terms—Digital forensics, Digital Proactive Forensics, Digital reactive forensics, Digital device storage, digital crime, Anti forensics, multi component framework Introduction Computer crimes have increased tremendously and their degree of sophistication has also advanced, the volatility and dynamicity of the information that flows between devices require some proactive investigation. The reactive investigation is now becoming less practical since the increased sizes of the data that is being investigated and underlying technology of the devices that change tremendously make the tools made for digital reactive forensics useless In order to investigate anti-forensic attacks and to promote automation of the live investigation, a proactive and reactive functional process has been proposed.. The phases of the proposed proactive and reactive digital forensics investigation process have been mapped to existing investigation processes. The proactive component in the proposed process has been compared to the active component in the multi- component framework. All phases in the proactive component of the new process are meant to be automated. To this end, a theory for the proactive digital forensics is necessary to lay down a strong foundation for the implementation of a reliable proactive system. I. Anti-Forensics The term anti-forensics refers to methods that prevent forensic tools, investigations, and investigators from achieve- ing their goals. Two examples of anti-forensic methods are data overwriting and data hiding. From a digital investigation perspective, anti-forensics can do the following: Prevent evidence collection. Increase the investigation time. Provide misleading evidence that can jeopardize the whole investigation. Prevent detection of digital crime. To investigate crimes that rely on anti-forensic methods, more digital forensic investigation techniques and tools need to be developed, tested, and automated. Such techniques and tools are called proactive forensic processes. Proactive forensics has been suggested in. To date, however, the definition and the process of proactive forensics have not been explicated. II. Proactive digital forensics Proactive Digital Forensic Component has the ability to proactively collect data, preserve it, detect suspicious events, gather evidence, carry out the analysis and build a case against any questionable activities. In addition, an automated report is generated for later use in the reactive component. The evidence gathered in this component is the proactive evidence that relates to a specific event or incident as it occurs. As opposed to the reactive component, the collection phase in this component comes before preservation since no incident has been identified yet. Phases under the proactive component are defined as follows: Proactive Collection: automated live collection of predefined data in the order of volatility and priority, and related to a specific requirement of an organization or incident. Proactive Preservation: automated preservation, via hashing, of the evidence and the proactively collected data related to the suspicious event. Proactive Event Detection: detection of suspicious event via an intrusion detection system or a crime-prevention alert. Proactive Analysis: automated live analysis of the evidence, which might use forensics techniques such as data mining and outlier detection to sup- port and construct the initial hypothesis of the incident. Report: automated report generated from the proactive component analysis. This report is also important for the reactive component and can serve as the starting point of the reactive investigation.[1] III Reactive Digital Forensics It the traditional or post-mortem approach of investigating a digital crime after an incident has occurred. This involves identifying, preserving, collecting, analyzing, and generating the final report. Two types of evidence are gathered under this component: Active: Active evidence refers to collecting all live (dynamic) evidence that exists after an incident. An example of such evidence is processes running in memory. Reactive : refers to collecting all the static evidence remaining, such as an image of a hard drive. Previous Work Proactive Vs Reactive Forensics Investigation framework Complexity of Digital Forensics investigation Digital attacks are so complex that it is hard to investigate them forensically. The elements involved in a digital crime are located in a large multidimensional space and cannot be easily identified. With the increase of storage size and memory sizes, and the use of parallelism, virtualization and cloud, the parameters to take into account during an investigation can even become unmanageable. Five fundamental principles The five fundamental principles are stated below: Principle 1 Consider the entire system. This includes the user space as well as the entire kernel space, file system, network stack, and other related subsystems. Principle 2 Assumptions about expected failures, attacks, and attackers should not control what is logged. Trust no user and trust no policy, as we may not know what we want in advance. Principle 3 Consider the effects of events, not just the actions that caused them, and how those effects may be altered by context and environment. Principle 4 Context assists in interpreting and understanding the meaning of an event. Principle 5 Every action and every result must be processed and presented in a way that can be analyzed and understood by a human forensic analyst. These five are for reactive analysis , for proactive there must be some new principles. Soltan Abed Albari proposed the following two : Principle 6 Preserve the entire history of the system. Principle 7 Perform the analysis and report the results in real time. By preserving the entire history of the system, we can go back in time and reconstruct what has happened and answer reliably all the necessary questions about an event or incident. The reconstructed timeline is based on the actual states of the system before and after the event or incident. In addition and due to the large amount of data, events and actions involved, performing a proactive analysis and reporting require real time techniques that use high-performance computing. The analysis phase should be automated and have the necessary intelligence to investigate the suspicious events in real time and across multiple platforms. Figure 1 Relation between action ,target events[1] In addition to the actions and events that the seven principles listed above emphasize, we introduce the notion of targets. A target is any resource or object related to the system under investigation e.g., a file, memory, register, etc. We will use an element of DF investigation to refer to a target, an action or an event. At a time t and as shown in Figure 3.1, the system is in the process of executing an action that reacts to some targets and events, and produces new targets and events or modifies the existing ones. A model for Proactive digital forensics The model below has two major parts Forward system Feedback system Forward system is the one upon which investigation is performed. Both systems the forward and the feedback can be modelled as a tuple (T,E,A), where T is a set of targets, E is a set of events, and A is a set of possible actions each of which is viewed as a transfer function of targets and events. To clarify this, each target f ∈ T is associated with a set S(f) representing the possible states in which it can be. The Cartesian product of S(f) for all targets f defines the state space of the system’s targets and we denote it by T . We do the same for every event e but we consider S(e) to contain two and only two elements, namely ↑ (triggered event) and ↓ (not triggered event). The Cartesian product of all the system’s events (S(e) for every event e) is denoted by E (status space). An action a is therefore a function from Γ Ãâ€" T Ãâ€" E to T Ãâ€" E, where Γ represents the time dimension. The evolution function ψ is defined from Γ Æ" (T Ãâ€" E) Ãâ€" A to T Ãâ€" E by ψ(t,(~r,~e),a) = a(t,~r,~e)3. At a time t ∈ Γ, an event e is triggered if its status at time t is ↑, and not triggered ↓ otherwise. The notation ↑t e will be used to denote that the event e is triggered at time t Figure 2 proactive model[1] The forward system has three things that are linked. Target, event and action A. Target A target is any resource or object related to the system under investigation (e.g., a file, memory, register, etc.. We will use an element of DF investigation to refer to a target, an action or an event. At a time t system is in the process of executing an action that reacts to some targets and events, and produces new targets and events or modifies the existing ones. Therefore to describe the dynamics of the system at a single instant t, one needs to know at least the states of the targets, the events generated and the actions executed at t. For a full description of the dynamics, these elements of investigation need to be specified at every instant of time; and the complete analysis of the dynamics of the system requires a large multidimensional space Equations B. Events and Actions Keeping track of all events and targets is expensive. To reduce them, a few classifications using preorder and equivalence relations. To illustrate the idea behind these classifications, imagine a botnet writing into a file. This event will trigger other events including checking the permission on the file, updating the access time of the file, and writing the data to the actual disk. The idea behind our formalization is to be able to know which events are important (maximal) and which ones can be ignored. The same thing holds for the targets .This will optimize the cost and time . Short Theory on Events Let e1 and e2 be two events in E. We defined the relation ≠¤E on E as follows: e1 ≠¤E e2 if and only if ( ⇠Ã¢â€¡â€™ ) whenever the event e1 happens at a time t, the event e2 must also happen at a time t0 greater than or equal to t. Formally, this can be expressed as: e1 ≠¤E e2 ⇠Ã¢â€¡â€™ (∀t ↑t e1 ⇒ âˆÆ't0 ≠¥ t ↑t0 e2) Subsequent events are those which are less than e . Short theory on targets Let ÃŽ ¨ be the mapping from T to E (Figure 3.10) that associates each target with its change of status event. The mapping ÃŽ ¨ and ≠¤E induces a preorder relation ≠¤T defined by T1 ≠¤T T2 ⇠Ã¢â€¡â€™ ÃŽ ¨(T1) ≠¤E ÃŽ ¨(T2) Informally, this means that whenever target T1 changes at time t the target T2 must change at t0 ≠¥ t. Short Theory on Actions The set of actions A is extended to  ¯ A using the following operators: An associative binary operator called sequential operator and denoted by ;. Given two actions a1 and a2, the action a1;a2 is semantically equivalent to carrying out a1 and then a2 (the two transfer functions are in series). Note that ∅A is a neutral element of A with respect to ; (i.e., a;∅A = ∅A;a = a for every action a). A commutative binary operator called parallel operator and denoted by ||. In this case a1||a2 is equivalent to carrying a1 and a2 simultaneously (the two transfer functions are in parallel). The action ∅A is also a neutral element of A with respect to ||. A conditional operator defined as follows. Given two conditions ci and ce in C, and an action a, the operator ciace represents the action of iteratively carrying out a only when ci is true and stopping when ce is false. That is denoted by a ce. Note that if both are true, then ci a ce is a. Zone Base Classification of Investigation Space To address the limitation of the classification described previously and address the undesirability issue , classify the event and target state into a set of priority zones. These zones can be represented with different colors: green, yellow, and red; starting from a lower priority to a higher one. When important events/targets with high-priority levels are triggered, a more thorough analysis is expected. Moreover, the zones can be used as a quantifying matrix that provides numbers reà ¯Ã‚ ¬Ã¢â‚¬Å¡ecting the certainty level for the occurrence of an incident. In our case, this number is an important piece of information in the final report. The high-priority events can involve one of the following: IDS, Antivirus, Firewall off and changing the windows system32 folder. On the other hand, the high-priority targets are the system32 folder, registry, network traà ¯Ã‚ ¬Ã†â€™c and memory dump. Given that the number of targets and events are large, this classification is not enough, especially during the analysis phase. As such, we need to reduce the forensic space. Similar to the principal component analysis technique [59], we suggest restrict- ing the analysis to â€Å"important† targets and events based on a specific organization policy. This can be seen as projecting the full forensic space F onto a sub-space F0 in which the evidence is most probably located. Figure 3 Zone base classification [1] Conclusion In this paper we proposed a new approach to resolve cybercrime using Proactive forensics with focusing on the Investigation space for proactive investigation. This paper reviews literature on Proactive forensic approaches and their processes. It has a method for proactive investigation to be carried out significantly. In order to investigate anti-forensics methods and to promote automation of the live investigation, a proactive functional process has been proposed. The proposed process came as result of SLR of all the processes that exist in literature. The phases of the proposed proactive digital forensics investigation process have been mapped to existing investigation processes. For future work , the investigation space profiling is to be done on events and targets in the space. References Proactive System for Digital Forensic Investigation, Soltan Abed Alharbi, 2014 University of Victoria Mapping Process of Digital Forensic Investigation Framework A new approach for resolving cybercrime in network forensics based on generic process model. Mohammad Rasmi1, Aman Jantan2, Hani Al-MimiY. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, A System for the Proactive, Continuous, and Eà ¯Ã‚ ¬Ã†â€™cient Collection of Digital Forensic Evidence Towards Proactive Computer-System Forensics Requirements-Driven Adaptive Digital Forensics Multi-Perspective Cybercrime Investigation Process Modeling A Forensic Traceability Index in Digital Forensic Investigation Network/Cyber Forensics Smartphone Forensics: A Proactive Investigation Scheme for Evidence Acquisition

Friday, October 25, 2019

Tips for Succcessful Essay Writing :: Education

Tips for Succcessful Essay Writing Being able to write a good essay does not come easy to the majority of current English students. The ability to excel in writing is not always something we can easily learn. Talented writers have the capability to reach into their soul and write from the heart. However, everyone does not possess this remarkable gift. Most of us struggle to achieve a level of adequate writing. Writing takes intense time and much thought to develop a well-planned essay. Bringing together all aspects of writing, such as: good descriptions, a proper structure, a good introduction and a clever title will give the audience a clear picture of what makes an essay good. Believe it or not, titles play an important role in the writing process. How many times have you flipped through a magazine and stopped only because you saw a title of an article that interested you. The title announces the topic clearly and as briefly as possible, as in the essay "Unlikely Learning". This essay deals with unlikely situations that you are placed in, because of your high school courses. The title of this essay would be considered a descriptive title. The other type of title is a suggestive title. This type of title is primarily used in an informal writing. The title, "The Value of Honesty", in our eyes, would be an example of a suggestive title. It describes the attitude of the author but not the exact topic. Yes, the essay is about honesty, but it is also about truthfulness. The title of an essay should not be the assignment given, or to restate the thesis, but it should attract the reader and make them want to read on. An introduction, in simple words, glves a background to the topic. It is one of the most important parts of the essay because it keeps the reader's interest of what they are about to read. The introduction will make the readers feel that what the essay is about will be of importance and interest to them. The thesis sentence is stated in the introduction. It is the one sentence that will tell the readers what the whole essay is about. The introduction is not very long but it is clear, precise, and to the point. A good introduction can either begin with a quote or ask questions. It can also contaln opinion words to either agree or dispute the topic of the writing.

Thursday, October 24, 2019

Lord Of The Flies- How Does Jack Become Leader? Essay

From the beginning of the novel â€Å"Lord of the Flies†, it is immediately obvious that Jack does not like the idea of Ralph being the chief of the boys.By the end of the book he successfully acquires the position he works towards. The idea of Jack being a leader is first portrayed by Jack ordering his choir in â€Å"army† type maneuvers to the first meeting . Jack bellows at his choir , â€Å"Choir!’ stand still!† his choir wearily responds obediently. Jacks first priority to secure his position as chief is to shut down Piggy , who is the man with the ideas in Ralph’s democratic rule. From the beginning Jack cunningly uses the fact that piggy is the â€Å"scapegoat† to constantly break down Piggy’s ideas with the view that once Piggy’s gone, then Ralph has little intelligence to support his views. He is helped greatly in this field as most of the tribe use piggy to make fun of but not in the same extremity as that of Jack. Psychologically is the way that Jack begins his torment towards piggy and as the book progresses so did his level of control. His demeaning words turn towards violence and his violence eventually leads to Piggy’s death. Jack understands that in order to persuade the children to side with him he would need some sort of a bait. Due to the condition on the island the most appropriate inducement is the lure of hunting. However any other form of pleasure could have been used so long as it appeared to be free from tyranny (Ralph’s orders to be rescued). The hunting starts off for enjoyment and food then quickly grows to be a tribal ritual of bloodlust , dancing and violence. Jack knows in order to become chief he not only can rely on the lure of hunting.He uses cunning and manipulative strategies to illustrate a false image of himself praying on the innocence of the â€Å"littluns’. Perhaps the greatest instance in which this occurs is when jack gives a manipulative apology after not following orders to keep the fire lit resulting in not being rescued by a passing ship.†All right, all right!’ he looked at Piggy , at the hunters, at Ralph. â€Å"I’m sorry. About the fire, I  mean. There. I-† He drew himself up. â€Å"-I apologize.† Once again his sinister apology targeted at the innocence of the younger members, concluded in the naà ¯ve â€Å"littluns† believing that Ralph was somehow in the wrong and not jack. â€Å"Clearly they were of the opinion that jack had done the decent thing, had put himself in the right by his generous apology and Ralph, obscurely in the wrong.† Possibly the most powerful campaign Jack used to become chief, was to use force and fear together to drive the intimidated children to side with him. Most of the time Jack displays his force on Piggy which in turn puts fear into the minds of the others. As the break up of rules and regulations in the society grow larger so to does the force and fear eventually leading to the death of children. By this stage in the novel it seems inedible that anyone not with jack would be either forced to join his tribe of savages or face death. Reflecting on the novel it is clear to see how Jack becomes a leader and sure enough the power hungry dictator-leader of the choir we are introduced to at the start, only grows more violent and more manipulative to become the Chief of the island.

Wednesday, October 23, 2019

Legal and Illegal Immigration in the U.S. Essay

Immigration Immigration in the United States has grown to an all time high. Now when someone hears the word immigration they automatically think of â€Å"illegal† immigrants from Mexico. But it’s people from all countries, legal and illegal. I will give my reasons why the United States should place more restrictions on immigrants. When the two World Trade Center towers where destroyed everyone immediately thought of terrorist’s. Later United States intelligence linked it to Osama Bin Laden. Bin Laden had his people from his army come to the United States and get information on how to carry out his plan. The terrorist’s even trained on U.S. soil to get more knowledge on how U.S. machinery, security, and aviation works. Now those terrorists came to America legally. Most of the immigrants come here illegally. I think that the U.S. should place troops on the Mexican boarder and the Canadian boarder to minimize the number of illegal immigrants entering the country. Now someone may argue that immigrants contribute to the strong U.S. economy by filling jobs, and even paying taxes. And that tighter restriction would compound the economic harm from the terrorist attacks. But the truth is the nation can’t afford to have immigrants in the county when INS cannot track them. Furthermore more the immigrants have taken job opportunities from the native-born Americans, and lowered wages. I’m sure that if the United States doesn’t fix this problem the unemployment rate will grow much higher in our country. I feel that the United States should place much more restrictions on the people coming into the U.S. Legal and illegally. I have already said that many immigrants have taken many job opportunities away form the native born Americans and that the U.S. can’t afford to track them. Now I’m not saying that we should ban people from our country, but our nation needs to screen people much better then the way they are now.