1 Understand about Cyber safety. know all effects of Cyberbulling.
Category: Cyber Security
-
IT-488: Cyber Forensics
1-Question One
Identify the three foundational processes of digital forensics and briefly describe the primary objective of each as defined in the forensic examination framework.
2-Question Two
Define “Key Disclosure Law” and list two specific “abstract boundaries” that a forensic examiner should never overstep regarding their professional conduct.
3-Question Three
Explain how a forensic examiner is able to recover a deleted file from an NTFS partition on a mechanical hard drive and describe why this process is generally less successful on a Solid-State Drive (SSD).
4-Question Four
Define what a Windows Registry “hive” is and identify which specific hive a forensic examiner should analyze to find information regarding a user’s browser settings and account history.
-
SEEDS Spectre Attack Lab
This lab provides hands-on interactive activities that will allow you to gain practical experience.
- Click the link to access the lab.
- Carefully read through the Overview on the website. It provides detailed instructions for completing the SEEDS labs.
- After completing the assigned activities, take a screenshot showing that each has been completed. Paste these screenshots in a Microsoft Word document and submit as evidence of completion. ps. use the attached pic as a wallpaper for the virtual machine.
-
Cyber Security Question
Your cybersecurity company received a call from a client. Their marketing directors WordPress blog was hacked, 3 new posts were created, and a handful of old posts were deleted. They do not know what to do and asked your company to figure out how the hack occurred and recommend next steps. Unfortunately, no one in your group of forensic investigators has dealt with WordPress blogs.
With the constant changes in computer hardware and software, forensic investigators frequently need to learn about new technology or techniques. Since you and your group of forensic investigators are unfamiliar with WordPress, your boss has asked you to do a practice forensic investigation on a WordPress blog and share what you found with the group prior to investigating the hack into the clients blog.
Write a 2- to 3-page best practice document on tips for forensic investigations into a hack of a WordPress blog using screenshots of your test that does the following:
Step 1: Create a blog and blog posts.
- Create and document your creation of a new WordPress blog using this link:
- Create and document how you created at least 4 blog posts from at least 2 different devices.
- Delete at least 2 blog posts from at least 2 different devices.
Step 2: Investigate the blog.
- Describe how to acquire log files and any other helpful files, including the general query log.
- Create and document how to create a backup of the database.
- Perform a forensic investigation on the blog and its database, focusing on determining how to identify sources of new blogs, recovering deleted blogs, and identifying the source of a hack.
- List best practices for securing and auditing databases of blogs.
Cite any references to support your assignment.
Format your assignment according to APA guidelines.
-
Final Project on Cybersecurity for autonomous vehicles
Write a 7 page paper, NOT DOUBLE SPACED, WITH LITTLE TO NO AI, on cyber security for autonomous vehicles.
I have already started with a 500 word abstract.
Looking into the evolution of cars, it is apparent that technology has improved with them. From looking back to when cars were first introduced, to now, it has been major enhancements that have come with the intelligence of them. Back when cars were first introduced in the early 1900s, no one would have ever thought that they would be able to drive themselves in today’s world. In present day, some cars are capable of operating without any human input, ranging from driver assistance to actual self driven automobiles. It is any area where if not acted upon, can lead too disaster.
Cyber security in autonomous vehicles is becoming more heavy due to the dependence on very advanced technology, connectivity, and also the risk for threats that can overcome safety and functions within the vehicle. Important cyber security liabilities are introduced by the fast development of autonomous vehicles. With many sensors and networked technology, these new cars are basically computers running on wheels, opening them up to several pathways for dangerous cyber attacks. While there is a benefit for autonomous vehicles such as improved safety, mobility, and accessibility, there are also many challenges and risks that come with them. Increase attacking surfaces is one. With over 100 million lines of code, hackers find antivirus programs more appealing. They can also make use of wireless communication protocols like Bluetooth, Wi-Fi, 5g, etc. There are also remote hacking risks. The attacks that can happen on AVs are remote. This means that the attackers dont have to be anywhere near the vehicle to execute the attack. This involves them taking advantage of flaws in new software updates and wireless connections. Sensor manipulation has also been a problem with AVs. Hackers have the ability to trick GPS signals and/or alter signal data, which can lead to incorrect navigation. This is very dangerous as the outcomes could be catastrophic in the most extreme cases. As there are may many more threats and risks for cyber attacks on autonomous cars, those are just a few. Though, there are solutions and countermeasures that exists to try and reduce these attacks.
To reduce these threats, the industry is coming up with different ways to override or stop them before they even happen. Intrusion detection systems (IDS) are network security tools that monitor traffic and devices known for suspicious activity. Using IDSs can help identify a cyber attack on a vehicle before it falls through. Encryption and authentication protocols are also helpful. Making sure that only certain authorized devices can connect with the car and that data that is transferred between the car and outside systems is safe and secure is essential for the protection of cyber attacks. Over the air updates (OTA) are regular updates that help patch vulnerabilities are also essential but they must be secured to prevent exploitation during the process. There are also future directions that cyber security is taking on autonomous vehicles. Artificial intelligence will be used for real time threat detection and can also use blockchains for securing data transactions.
-
Cyber Forensics IT-488
* Use the same form I have attached to you.* No AI at. Please make it clear
-
IT Security and Policies IT476
* Use the same form I have attached to you.* No AI at. Please make it clear
-
FluxArchiv Reverse Engineering Analysis
Assignment Overview
This assignment requires performing static and dynamic reverse engineering on the FluxArchiv application in order to identify how it validates and obfuscates passwords. By analyzing the executable and the archive file, the goal is to extract the hidden key and ultimately recover the real password using a brute-force approach.
Detailed Explanation
In this assignment, the objective is to reverse engineer the
archivexecutable on a Linux system to understand how it processes and validates passwords against theFluxArchiv.arcfile. The process begins by running the program normally (./archiv) to observe its help output and understand the expected command-line arguments.Next, static analysis is performed using Ghidra. By importing the
archivbinary into Ghidra, the programs structure, function flow, and password validation logic can be examined. Special attention is given to functions related to file reading, string comparison, and any obfuscation or shuffle logic applied to the user-provided password.The
FluxArchiv.arcdata file is then analyzed using Linux utilities. Thefilecommand is used to identify the file type, whilehexdump -C -n 50is used to inspect the first 50 bytes of the file in both hexadecimal and ASCII formats. This step helps identify the file header, version information, and potential key data stored within the archive.Dynamic analysis is performed using strace and ltrace.
straceis used to monitor system calls such asopen,read, andlseek, allowing observation of which file offsets and byte lengths are read during password validation.ltraceis used to monitor library function calls such asfopen,fread,memcmp, andstrcmp, revealing how the program compares user input against data read from the archive file.
Using information gathered from the hexdump and tracing tools, Ghidra is revisited to correlate the observed behavior with the underlying code. This makes it possible to identify the exact locations of the archive header and the embedded key, as well as the obfuscation algorithm used to transform the input password before validation.
Once the key is extracted from the archive file, the provided Python 2.7 brute-force script (
FLUXACRCHIV-BruteForce.py) is modified by replacing the placeholder string"STODO-KEY"with the extracted key. The script is then executed with a specified permutation count (e.g.,python FLUXACRCHIV-BruteForce.py 15). When a permuted password matches the shuffled key, the script reveals the real password.By following these steps, the assignment demonstrates practical skills in Linux-based reverse engineering, static and dynamic analysis, and basic cryptographic obfuscation reversal.
-
cyb 410 journal entry module one
see rubric plz
-
cyb 320 module one journal entry
see rubric plz