Research linux and its role in forensics

part 1
section 1 Research and explain your topic (pick one from below) as it relates to Unix File System:Boot Blocks
Superblock
Cylinder Group
Inode/vnode
Hard Link
Symbolic Link/Symlink
Create a poster to explain to the class. Include diagrams and text as needed.
section 2
Password cracking is used for both criminal acts and to investigate crimes
Password cracking is a challenge in cell phone forensics and computer forensics in generalResearch your topic (pick one from below). Post on the blog to explain to the class how your methodology works. Brute force
Dictionary Attacks
Syllable Attack
Rule-Based Attack
Hybrid Attack
Rainbow Attack
part2
Research Linux and its role in forensics
On the worksheet provided:Identify some of the Linux utilities and versions (hint – we used one in lab) that can be used for forensic purposes (give a brief description)
Develop a Pros and Cons list for using Linux

Document each step!!

How to get started:
Review the assignment and expectations
Make sure FTK and Imager (the versions that are posted ) or Autopsy (https://www.sleuthkit.org/autopsy/) are installed
Download project image and hash values from zip file both attached
Open the image with FTK Imager – verify it to make sure the hash values match what was given
Open the image in FTK/Autopsy to start your analysis
Document each step!!
Hints/reminders for the project:
Your report should document each step in your analysis and explain what you did, what you found, how, where, what the technical aspects mean
Don’t interpret the file content – that is out of the scope of your job!
You can’t say a specific person did something – make sure you differentiate between PEOPLE and USERNAMES
Stick to the facts
Write in first person
Include LOTS of screenshots – but these go in the appendix, not the body of your report!
Don’t forget to include the basics in your report – who are you? Your authority? What case is this? Background?

How to get started:

How to get started:
Review the assignment and expectations
Make sure FTK and Imager (the versions that are posted ) or Autopsy (https://www.sleuthkit.org/autopsy/) are installed
Download project image and hash values from zip file both attached
Open the image with FTK Imager – verify it to make sure the hash values match what was given
Open the image in FTK/Autopsy to start your analysis
Document each step!!
Hints/reminders for the project:
Your report should document each step in your analysis and explain what you did, what you found, how, where, what the technical aspects mean
Don’t interpret the file content – that is out of the scope of your job!
You can’t say a specific person did something – make sure you differentiate between PEOPLE and USERNAMES
Stick to the facts
Write in first person
Include LOTS of screenshots – but these go in the appendix, not the body of your report!
Don’t forget to include the basics in your report – who are you? Your authority? What case is this? Background?

Describe how you will approach the execution of your project :

Research and descriptive/prescriptive projects aren’t acceptable. It has to be real world business problem and solution
Example you can take look at I have attached the example.
ANALYSIS:
Project Topic:
Problem Statement or Project Purpose:
DESIGN and DEVELOPMENT:
Project Scope
1.Project Goal(s) and Supporting Objectives:
2.Project Outcomes and Deliverables:
3.Projected Project End Date:
IMPLEMENTATION and EVALUATION:
Describe how you will approach the execution of your project :

How to get started:

How to get started:
Review the assignment and expectations
Make sure FTK and Imager (the versions that are posted ) or Autopsy (https://www.sleuthkit.org/autopsy/) are installed
Download project image and hash values from zip file both attached
Open the image with FTK Imager – verify it to make sure the hash values match what was given
Open the image in FTK/Autopsy to start your analysis
Document each step!!
Hints/reminders for the project:
Your report should document each step in your analysis and explain what you did, what you found, how, where, what the technical aspects mean
Don’t interpret the file content – that is out of the scope of your job!
You can’t say a specific person did something – make sure you differentiate between PEOPLE and USERNAMES
Stick to the facts
Write in first person
Include LOTS of screenshots – but these go in the appendix, not the body of your report!
Don’t forget to include the basics in your report – who are you? Your authority? What case is this? Background?

The two centos virtual machines are configured to run in “host only” mode.

Lab Description: You are contracted by a company to perform a security assessment of their network. Your first task is to conduct a vulnerability scan of the company’s FTP server as they believe the newly configured server, and more specifically the FTP service, may have a vulnerability. The company has provided you with a CentOS system (Scan Host) with NMAP installed, and the CentOS server (FTP Server) in question. You will need to scan the FTP Server, test, and remediate any vulnerabilities, and document all of your steps and findings.
Lab Environment: The lab environment consists of two virtual machines, which can be imported into most virtualization platforms (e.g., VirtualBox, Workstation Player, and Parallels). The two files are in open virtual appliance (OVA) format, which is widely supported. The two CentOS virtual machines are configured to run in “Host Only” mode. This will allow the VMs to communicate only to each other and not the internet or the host computer in which you are running the virtual software. Both VMs are pre-configured with Admin and User accounts (account details found in Step 1). To complete this lab, you will need to follow the directions in each step, answer any questions, and provide an After-Action Report (AAR) of your findings.

How does the fact that most of uber’s employees are remote contractors influence the culture?

For this week’s activity:
Read the case study below, adapted from the Chapter 3 case study, “Uber’s Use of Technology‐Mediated Control.”
Consider ways in which TMC influences organization structure, culture, and work design.
Respond to the provided discussion questions below.
Prompt
Uber Technologies is a ride‐hailing company that uses the cars and time of millions of drivers who are independent contractors. The company operates in many countries around the world. One recent estimate is that Uber drivers globally spend 8.5 million hours on the road every day. Uber’s mission statement is “Transportation as reliable as running water, everywhere for everyone.” Uber also employs a dual strategy that aims to deliver value to drivers and riders alike by appealing to each group’s different incentives by creating a mutually beneficial relationship between the two.
Uber wants to control how these drivers behave and exerts this control not through human supervisors, but through a system of algorithms that serves as an automated virtual manager. Drivers’ work experiences are entirely mediated through Uber’s mobile app. Hence, Uber has been accused of using TMC to exert “soft control” over its drivers.
This app is constantly collecting data on drivers. It nudges the behavior of the drivers in such a way that in reality they aren’t as much their own boss as they might like to be. For example, while they can work when they want, Uber’s surge fare structure of charging riders more during high‐volume periods motivates drivers to work during times that they might not want to work. The app even sends push notifications based on sophisticated algorithms. For example, “Are you sure you want to go offline? Demand is very high in your area. Make more money, don’t stop now!”
The mobile app also employs interventions to encourage various driver behaviors. For example, the Uber app will let drivers know that they are close to achieving an income target when they attempt to log off and end their work. Uber also sends drivers their next fare opportunity before their current ride is over. New drivers are enticed with signing bonuses when they meet initial ride targets.
To motivate drivers to complete enough rides to earn bonuses, they occasionally receive words of encouragement through the app. The app also watches their rides to ensure that they accept a minimum percentage of ride requests, are available for a minimum period of time in order to qualify to earn profitable hourly rates during specified periods, and complete a minimum number of trips.
How is all this monitoring influencing Uber’s drivers? Uber’s turnover for drivers is high—reportedly closing in on 50% within the first year.
References
Pearlson, K., & Saunders, C. (2020). Managing and using information systems: A strategic approach (7th edition). Wiley.
Rosenblat, A. (2016). The truth about how Uber’s app manages drivers. Harvard Business Review Digital Articles, 2–5. Retrieved from https://search-ebscohost-com.ezproxy.snhu.edu/logi…
Scheiber, N. (2017, April 4). How Uber uses psychological tricks to push its drivers’ buttons. International New York Times. Retrieved from https://bi-gale-com.ezproxy.snhu.edu/global/article/GALE%7CA488444747?u=nhc_main&sid=ebsco/p>
Guidelines for Submission
Respond to the case study questions below related to the Uber case study. Your submission should be 2 to 3 pages, double spaced, and submitted as a Word document. Also, 2 to 3 resources are required and must be appropriately cited using APA style. These resources can include the textbooks and resources from previous modules, as well as original resources you have consulted. Please write out the questions in your document.
-Your responses should be in complete paragraphs and should contain the following:
-Answer all of the questions thoroughly and completely. Write out the questions in your document.
Make direct connections between the issues identified in the case study and the concepts covered in the provided
resources in Modules One and Two.
Support your answers with appropriate examples and facts drawn from the case study.
Use correct grammar, sentence structure, and spelling, and demonstrate an understanding of audience and purpose.
Discussion Questions:
-Considering Uber’s mission statement and business model, in what ways do the mission and business model align with the decision to use TMC?
-Uber is faced with the monumental challenge of managing and motivating millions of drivers who are important to its business, but who aren’t full-time employees. How effective do you think Uber’s “automated manager” is as a managerial control system for Uber drivers? Please explain.
-What are the benefits to Uber of using TMC through its mobile app? What are the downsides?
-What impact, if any, do you think Uber’s use of TMC has on its organizational culture? How does the fact that most of Uber’s employees are remote contractors influence the culture?
-How might differences in national cultures influence the response to TMC? How might Uber change or modify TMC to make it more effective?

Your first task is to conduct a vulnerability scan of the company’s ftp server as they believe the newly configured server, and more specifically the ftp service, may have a vulnerability.

Lab Description: You are contracted by a company to perform a security assessment of their network. Your first task is to conduct a vulnerability scan of the company’s FTP server as they believe the newly configured server, and more specifically the FTP service, may have a vulnerability. The company has provided you with a CentOS system (Scan Host) with NMAP installed, and the CentOS server (FTP Server) in question. You will need to scan the FTP Server, test, and remediate any vulnerabilities, and document all of your steps and findings.

Write in first person

How to get started:
Review the assignment and expectations
Make sure FTK and Imager (the versions that are posted ) or Autopsy (https://www.sleuthkit.org/autopsy/) are installed
Download project image and hash values from zip file both attached
Open the image with FTK Imager – verify it to make sure the hash values match what was given
Open the image in FTK/Autopsy to start your analysis
Document each step!!
Hints/reminders for the project:
Your report should document each step in your analysis and explain what you did, what you found, how, where, what the technical aspects mean
Don’t interpret the file content – that is out of the scope of your job!
You can’t say a specific person did something – make sure you differentiate between PEOPLE and USERNAMES
Stick to the facts
Write in first person
Include LOTS of screenshots – but these go in the appendix, not the body of your report!
Don’t forget to include the basics in your report – who are you? Your authority? What case is this? Background?