Describe the term anti-forensics. Provide three examples of anti-forensic techniques and why they would be used by an adversary.
2 PARAGRAPHS
Describe the term anti-forensics. Provide three examples of anti-forensic techniques and why they would be used by an adversary.
2 PARAGRAPHS
SEE RUBRIC PLZ
SEE RUBRIC PLZ
SEE RUBRICPLZ
REPLY TO TWO PEERS AS WELL:
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
direct instructions for what needed:
Please find Lab 4 here:
Certification PDF(s) (if you pass Sigstore course, attach separately.)
A detailed lab report that should
o For Task 2: URL of the GitHub Project you choose, and screenshots of your README.md with Badge showing in the front.
o For Task 3: Describe all your efforts on addressing issues highlighted by the Scorecard. And some screenshots showing you have a score increase!
o Simply attaching screenshots without any explanation will not receive credits.
Effective communication, mature organizational culture, and collaborative threat intelligence sharing are critical because they determine whether cybersecurity capabilities translate into actual risk reduction or remain siloed technical activities disconnected from business reality. Organizations that fail to bridge the divide between technical and non-technical stakeholders risk making uninformed decisions, misallocating resources, and leaving critical risks invisible to leadership. Communication frameworks that translate technical findings into business impact terms ensure executives understand cybersecurity risks sufficiently to make timely, informed decisions rather than treating security as an IT-only concern.
A strong security culture recognizes that technology alone cannot defend against threats. Employees at all levels must understand their role, demonstrate security-conscious behaviors, and contribute to collective defense. Collaborative threat intelligence sharing enables organizations to benefit from collective knowledge, early warnings, and coordinated responses impossible to achieve in isolation. Together, strategic communication, cultural maturity, and industry collaboration create holistic defenses where people, processes, and partnerships amplify technical controls, building resilient security postures grounded in shared responsibility rather than technology acquisition alone.
Over the past weeks, you have analyzed major cybersecurity challenges through the lens of technical controls, breach timelines, and security architecture. This week, you will shift your focus to examine how effective communication, organizational culture, and collaborative threat intelligence sharing influence an organization’s ability to prevent, detect, and respond to cyber threats.
Your task is to build on your analysis of the cybersecurity incident you chose in the assignments from previous weeks and to analyze how breakdowns in stakeholder communication, gaps in security culture, or failures in threat intelligence collaboration contributed to the security failure. You will then propose strategic improvements that address the human, organizational, and collaborative dimensions of cybersecurity, demonstrating that technical solutions alone are insufficient without effective communication frameworks, mature security culture, and industry collaboration.
Follow these guidelines for the structure of your research paper:
Open and review all tabs below, prior to starting your assignment:
Section 1:
Length: 2-3 pages, excluding the title page and references, 12-point standard font (Times New Roman) and in APA format
The paper should be broken down into the following sections (you should have three subsections in your paper with the following subsection titles):
Section 1: Incident Context and Communication/Collaboration Failures (Brief – 20-30% of paper)
Provide a concise overview to establish context for your strategic communication and collaboration analysis:
Incident Response: Briefly describe the organization and industry context, the nature of the security failure and the timeline of key events (1-2 paragraphs)
Key Communication and Collaboration Failures: Identify 2-3 critical failures that enabled or exacerbated the incident (1 paragraph with bullet points), categorized across:
Note: This section should be approximately 250-300 words. Keep it concise and focused on establishing the foundation for your strategic communication and collaboration recommendations.
Section:
Strategic Communication, Culture, and Collaboration Framework (Primary Focus – 70-80% of paper)
This is the core of your assignment. You will analyze how the organization should build effective communication bridges, strengthen cybersecurity culture, and leverage collaborative threat intelligence to address the failures identified in Section 1.
Bridging Technical and Non-Technical Stakeholders (Communication Perspective)
Building and Measuring Cybersecurity Culture (People and Process Perspective)
Leveraging Collaborative Threat Intelligence (Industry Collaboration Perspective)
Conclusion: Summarize the key findings of your research.
References: Cite all references using APA style. You need to use at least three recent, credible references.
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard
via the allocated folder. These files must not be in compressed format.
characters, use different character sets, convert text into image or languages other than English or any kind of
manipulation).
I am looking for someone with strong experience in Digital Forensics and Incident Response (DFIR), specifically using Velociraptor and Splunk, to help complete a cumulative lab assignment.
IMPORTANT:
You do NOT need to complete all questions.
The assignment requires:
You may choose the easiest or most efficient questions, but they must be completed correctly.
The lab is hands-on and requires actual execution (not just written answers).
Tasks include:
VERY IMPORTANT:
The assignment requires:
This is a practical lab assignment, so everything must be properly executed and documented with screenshots as proof.
Requirements:
Please only apply if you have done similar cybersecurity labs before.
Introduction
You will be doing a site assessment and design proposal for a wireless installation at a virtual site. This project will be done as an individual.
Case Study
The Building
A company, MyCo, has rented a two-floor office space in a commercial/industrial area measuring 132’x78′. The facility is located in Lake County, Illinois. The space is broken up into fixed wall offices and cubicles. The internal structure consists of 15′ ceilings, with a suspended ceiling dropping down to 12′ leaving a 3′ plenum above the suspension system. We have Armstrong Cortega Second Look tiles in an Armstrong Prelude XL Fireguard system. The tiles are wet-formed mineral fiber with an insulation R-factor of 1.6 and an energy absorption of 0.28 watts/sqm. The grid uses a 15/16 T-rail suspended from the support structure at 4 increments. It can support 42lbs in its current configuration per 4 segment after taking into consideration the tile and structure weight. The T-rail is recessed 1/4 into the tile.
The cubicles are selected from the Allsteel Concensys system. They are a combination of steel frames, laminate and composite horizontal surfaces and fabric covered vertical surfaces. There are small 2×2 whiteboards in use throughout the cubical areas. These are aluminum backed board with a laminate coating.
The plenum space contains a combination of flexible and non-flexible ductwork as well as a sprinkler system. It is an active plenum so all components installed in this space need to be plenum-rated. Fluorescent tube lighting fixtures are situated in regular patterns throughout the space. Ceiling tiles are replaced with 2×4 fixtures leveraging electronic ballasts fed with 240vac power.
Exterior-facing windows and doors meet energy star requirements for this area. They take advantage of low-e glass, triple pane with argon fills. Interior glass is not filmed but is tempered per local building code. Interior doors are hollow core with no metal reinforcement. The interior walls are constructed using type-C gypsum board. They are fixed to steel studs 16 on-center. Window and door casings interior to the building are painted steel.
Floors are constructed of pre-cast/pre-stressed flexicore concrete panels. The concrete panels are 12 thick.
Functional Requirements
The staff require wireless service throughout the building, but special care must be taken to cover the meeting and break rooms as these are concentrated areas of mobile users. The staff request no less than 802.11ac wave 2 infrastructure be installed. Many users will likely give up their wired connections and leverage the convenience of the new wireless network, so planning for capacity and density over simply coverage would be advantageous. You will have to carefully balance the coverage and AP density dynamics. There are currently 185 users within the space at any given time. We expect this to grow to roughly 250 users within three years. Each user can be assumed to have 2.2 devices, a mix of corporate and BYOD (e.g., company-issued laptop, personal phone and many will have another device).
Deliverables
You will need to provide markups of the provided drawing to show AP placement and coverage, channel designations on a per-AP basis, etc. Furthermore, all equipment used (APs, antennas, cables, controllers etc.) will need to be documented as a total solution to the sites request. All of this information must be included in a single cohesive document. It must be delivered electronically in a format of your choosing via the Sakai assignment tool. All deliverables must be provided no later than 11pm CDT on Thursday, April 9, 2025.
Grading
Grading will be as follows:
50pts – Floor one layout, including channels (2.4GHz, 5GHz, and 6GHz if appropriate)
50pts – Floor two layout, including channels (2.4GHz, 5GHz, and 6GHz if appropriate)
50pts – Hardware selections (APs, antennas, cables, controllers, etc.)
150pts total