examine an HKCU hive for evidence of unauthorized access. Read the scenario care

examine an HKCU hive for evidence of unauthorized access. Read the scenario carefully, as you may consider it interview notes with your client. This is often one of the first real examination tasks you’re likely to encounter and will be a test of your ability to make inferences, be thorough in your search, and document your examination.
Instructions
You’ll need to use the following resources to complete the assignment:
Investigation 01 Sample Evidence located in the Virtual Lab
A registry analysis tool, such as Registry Explorer by Eric Zimmerman located in the Virtual Lab
(Optional) Download and use the report template (See the Investigation and Forensics Challenge module for the templates)
After reading the Investigation 01 scenario, open your forensic tool and import the sample evidence into the tool. Begin a forensic report and begin your search. As you do, be sure to take special note of these answers to these questions. These questions represent those that need to be answered to arrive at a logical conclusion to this scenario. They are provided here, but in the future, you will be required to decide these questions on your own.
Scenario: 
This scenario takes place circa 2012. You were recently contacted by Nick Fury of S.H.I.E.L.D. to investigate a suspected corporate espionage incident. They have reason to believe that S.H.I.E.L.D. was infiltrated by an enemy spy who used the generic vibranium account to access and exfiltrated sensitive information from an endpoint connected to the SHIELD network with the hostname of nromanoff. Nick Fury believes that the culprit may be a recently terminated employee named Jim Tandy. Jim was recently fired under suspicion of leaking confidential information to Hydra. Your job will be to examine the NTUSER.DAT file containing the HKCU registry hive for the vibranium user to determine the answers to the following questions.

  Choose one of the Business Scenario Options to establish the audience and bu

 
Choose one of the Business Scenario Options to establish the audience and business perspective for your Emerging Technology Analysis Report.

Picked NASCAR

Consider the Topic Options presented under each of the Emerging Technology Categories and choose one topic option

Picked   Blockchain for Data Security

You may use the same topic option previously chosen.
 
Instructions
In your role as a consultant in your chosen business scenario, put together a slide presentation for an industry conference that includes:
A technical description of the purpose (what it does) and function (how it works) of the topic option
How the use of this emerging technology can raise legal concerns
How the use of this emerging technology can raise ethical concerns
How this emerging technology can be misused
How this emerging technology can be protected
Assessment Requirements/Submission Requirement:
10 slides minimum, not including title and reference slides
Enough text narrative in the Notes for each slide that would produce a 10-minute presentation
Submit in PowerPoint format (download from Google Slides or export from Keynote)
3 scholarly references

examine an HKCU hive for evidence of unauthorized access. Read the scenario care

examine an HKCU hive for evidence of unauthorized access. Read the scenario carefully, as you may consider it interview notes with your client. This is often one of the first real examination tasks you’re likely to encounter and will be a test of your ability to make inferences, be thorough in your search, and document your examination.
Instructions
You’ll need to use the following resources to complete the assignment:
Investigation 01 Sample Evidence located in the Virtual Lab
A registry analysis tool, such as Registry Explorer by Eric Zimmerman located in the Virtual Lab
(Optional) Download and use the report template (See the Investigation and Forensics Challenge module for the templates)
After reading the Investigation 01 scenario, open your forensic tool and import the sample evidence into the tool. Begin a forensic report and begin your search. As you do, be sure to take special note of these answers to these questions. These questions represent those that need to be answered to arrive at a logical conclusion to this scenario. They are provided here, but in the future, you will be required to decide these questions on your own.
Scenario: 
This scenario takes place circa 2012. You were recently contacted by Nick Fury of S.H.I.E.L.D. to investigate a suspected corporate espionage incident. They have reason to believe that S.H.I.E.L.D. was infiltrated by an enemy spy who used the generic vibranium account to access and exfiltrated sensitive information from an endpoint connected to the SHIELD network with the hostname of nromanoff. Nick Fury believes that the culprit may be a recently terminated employee named Jim Tandy. Jim was recently fired under suspicion of leaking confidential information to Hydra. Your job will be to examine the NTUSER.DAT file containing the HKCU registry hive for the vibranium user to determine the answers to the following questions.

  Choose one of the Business Scenario Options to establish the audience and bu

 
Choose one of the Business Scenario Options to establish the audience and business perspective for your Emerging Technology Analysis Report.
Picked NASCAR
Consider the Topic Options presented under each of the Emerging Technology Categories and choose one topic option
Picked   Blockchain for Data Security
You may use the same topic option previously chosen.
 
Instructions
In your role as a consultant in your chosen business scenario, put together a slide presentation for an industry conference that includes:
A technical description of the purpose (what it does) and function (how it works) of the topic option
How the use of this emerging technology can raise legal concerns
How the use of this emerging technology can raise ethical concerns
How this emerging technology can be misused
How this emerging technology can be protected
Assessment Requirements/Submission Requirement:
10 slides minimum, not including title and reference slides
Enough text narrative in the Notes for each slide that would produce a 10-minute presentation
Submit in PowerPoint format (download from Google Slides or export from Keynote)
3 scholarly references

  Describe how the dd command is used in the lab and why dd is a dangerous Lin

 
Describe how the dd command is used in the lab and why dd is a dangerous Linux command. In addition list and describe two other dangerous linux commands.
List and discuss two common SSH security risks. Describe how you would avoid and mitigate each of these risks.
What do the events information, audit success, audit failure, warning, and error mean in the context of windows logs. List and describe any two event codes that you would monitor for Windows security logs and why?
Research iptables firewall rules and write and describe a rule that would drop all SSH connections from a specific IP address.
Write an iptables firewall rule that will allow established and related incoming traffic. Describe what this rule does and why it is not considered a security risk.
why is only port 80 open on 192.168.1.30. What iptables rule would open 192.168.1.30 for http, https, and ssh connections?

  Describe how the dd command is used in the lab and why dd is a dangerous Lin

 
Describe how the dd command is used in the lab and why dd is a dangerous Linux command. In addition list and describe two other dangerous linux commands.
List and discuss two common SSH security risks. Describe how you would avoid and mitigate each of these risks.
What do the events information, audit success, audit failure, warning, and error mean in the context of windows logs. List and describe any two event codes that you would monitor for Windows security logs and why?
Research iptables firewall rules and write and describe a rule that would drop all SSH connections from a specific IP address.
Write an iptables firewall rule that will allow established and related incoming traffic. Describe what this rule does and why it is not considered a security risk.
why is only port 80 open on 192.168.1.30. What iptables rule would open 192.168.1.30 for http, https, and ssh connections?

In class, we learned that the Literature Review includes: Introduction (6 sen

In class, we learned that the Literature Review includes:
Introduction (6 sentences taught in this week’s lesson)
Review of Literature 
Analysis of Literature (use your EXCEL worksheet to compare and contrast what is the same and what is different among: WHY, HOW, and WHAT)
For this submission: You will submit your completed Literature Review (all three sections) in a PDF document.
YOU MUST CHECK YOUR SIMILARITY prior to submission. 

 Instructions You must use the template I provided for this assignment since it

 Instructions
You must use the template I provided for this assignment since it will make it a lot easier for you. Failure to do so will result in a return of your paper for you to redo, a reduction in points, or both.
The first assignment has three parts. 
The first part involves picking something you found interesting from weeks one and two, exploring it beyond the readings, and expanding on it in a paper. This section of your paper needs to be at least three pages long and cannot be about something you wrote directly about in a forum.
The second part involves picking one of the critical infrastructures you learned in week three and writing about it using the six guidelines below. You cannot write about the critical infrastructure you wrote about in the forum.
The third part involves picking one of the critical infrastructures that you learned about in week four and writing about it using the six guidelines below. You cannot write about the critical infrastructure you wrote about in the forum.
It is up to you to decide what will be the most interesting for you! 
You need to use the following outline for each of the two critical infrastructures:
Provide a Hypothetical Threat (cyber, natural disaster, or physical)
Brief background on the Critical Infrastructure as it relates to National Security
Elaborate on the known Risks/Threats/Hazards/Vulnerabilities from the Hypothetical Threat
Explain how damage from the Hypothetical Threat could impact the Dependencies/Interdependencies between critical infrastructure sectors
Existing Resiliency related to the Continuity of Operations
Consider how to Minimize Disruption that improves First Responder Safety. 
Technical Requirements
Write at least seven pages, per the guidance above, and include the title page, an abstract, and a reference page (these last three items are not part of the total page count).
Scholarly and credible references should be used. A good rule of thumb is at least two sources per content page.
Type in Times New Roman, 12 point, and double-spaced.
Students will follow the current APA Style (7th Edition) as the sole citation and reference style used in written work submitted as part of coursework. 
Points will be deducted for the use of Wikipedia or encyclopedic-type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.
All submissions will be graded using the assignment rubric.