Posts

Employer-Owned Phone Privacy Discussion

Image
According to our company policy, my company monitors everything you do with a company device that includes phones, tablets, iPads and computers. At the  login screen, the warning login message display states that:  Your continued use of this protected company system consents to the following , you have no expectation of privacy on this device, communication are routinely monitored, you consent to interception and seizure of all communication or data qualifies for the protection by privilege or is covered by the a duty of confidentiality… etc. long story short – they own it. Therefore, unless company policy specifically states otherwise (and even this is not assured), your employer may monitor most of your workplace activity. From the Employer perspective as stated by the privacy Rights Clearing House (PRC), Employers are motivated by concern over litigation and the increasing role that electronic evidence plays in lawsuits and government agency investigations. Such monitoring is virtua

Privacy issues associated with data mining

Image
  What is Data Mining? Data mining is exploring and analyzing big data in order to uncover concrete patterns and rules layman’s it a process used to extract usable data from a larger set of any raw data.. Data mining techniques are used in the development of machine learning ( ML) models that power modern artificial intelligence ( AI) applications such as search engine algorithms and recommendations.   Examples include; Fraud Detection and Prevention E-mail Spam Detector Database Marketing & Marketing Credit Risk Management & Scoring Healthcare Informatics Describe the privacy issues associated with data mining. One of the data mining challenges is Privacy and security. (Microstrategy, 2020) defines data mining as a powerful tool that provides businesses with compelling insights into their consumers. However, at what point do these insights infringe on an individual’s privacy? Organizations must weigh this relationship with their customers, develop policies to benefit consumers

Legal Issues with Social Networking

Image
  Exploring the privacy legal issues associated with online social networking sites. According to data collected by Hootesuite, 45% of the world 's population is using social networks. That means a whopping 3.48 billion people are linked to any social Network. The Wiki Article states that Privacy issues with social networking sites are a subset of data privacy that includes the right to require personal privacy regarding storage, re-use, third-party provision and display of self-relevant information through the Internet. These social platforms use Apps that allow users to participate are tweets, invites, videos, open platform applications and other applications that are also the platforms for others to access private information about a user. Privacy Issues include cyber-stalking, location disclosure, social profiling, 3rd party personal information disclosure, and government use of social network websites in investigations without the safeguard of a search warrant. The above is al

Has Christine Landed Yet - Justine Sacco fired - Cyber Law

Image
  Using APA format, write a 1-3 page paper discussing Christine’s potential legal claims, if any, against GoGeaux, Beth, William and Twitter. If you think Christine should pursue additional defendants, feel free to discuss those claims as well. Also, discuss Twitter’s potential legal claims, if any, against William and Sarah.  Abstract   Christine Jacko (Justine Sacco) was Chief Public Relations Officer for Poodle, one of the 50 largest companies in the United States. In addition, she regularly gave motivational talks as a side business, so her name has achieved secondary meaning for her speaking services. Christine maintained a personal Twitter account @christinejacko9. Moments before boarding a long (and Internet-less) flight to Cape Town, South Africa, she posted the following tweet to Twitter: Going to Africa. Hope I don’t get AIDS. Just kidding. I’m white! GoGeaux provides Wi-Fi services on airplanes. It purchased a “promoted tweet” from Twitter, which allowed GoGeaux to prominent

hibernation files more prevalent on mobile devices - hiberfil.sys

Image
What is the hibernation file and what purpose does it serve? What type of data can we expect to find in this file? Are hibernation files more prevalent on mobile devices? Please explain. Hibernate mode uses the hiberfil.sys file to store the current state (memory) of the PC on the hard drive and the file is used when Windows is turned back on. In Hibernate mode the PC power is down entirely, so you can even take the battery out, put it back in, and be right back where you were.  when hibernate is enabled it reserves some of your disk for its file -- the hiberfil. sys file -- which is allocated at 75 percent of your computer's installed RAM file to store the current state (memory) of the PC on the hard drive and the file is used when Windows is turned back on and  all the contents, and user work will remain as it is because contents of system’s RAM is stored on a hard disk by system. Since a mechanism was proposed for smartphones based on hibernation called Hibernation Mechanism in

Browser internet History storage - artifact creation

Image
Where is internet history stored by default on a Windows operating system? How do different browsers store internet history? What is the effect of running browsers in "privacy" or "incognito" mode on artifact creation?  By default, windows stores user internet history at C:\Users\<Username>\AppData\Local\Microsoft\Windows\History. C:\Users\<username>\AppData\Local\Microsoft\Windows\WebCache Internet Explore: Internet Explorer internet history records are stored in the 'WebCacheV01. dat' ESE database. C:\Users\<username>\AppData\Local\Microsoft\Internet Explorer\ Google Chrome Google Chrome’s browser cache contains information from Internet sites you have visited. It may store images and videos, or the layouts for entire Web pages. Chrome uses these files to make websites load faster. \AppData\Local\Google\Chrome\User Data\Default\Cache  Google Chrome browser keeps the browsing history for 90 days and then it deletes the history automaticall

Windows vs Linux Artifacts

Image
Windows uses a Registry to store system, software, and user settings. What does Linux use to store this type of information? Does Linux or Windows provide more evidence (artifacts) from a forensic analysis perspective? Please explain. According to (Imam, 2017), Linux holds many file systems of the ext family, including ext2, ext3, and ext4. Linux can provide an empirical evidence if the Linux-embedded machine is recovered from a crime scene. In this case, forensic investigators should analyze the following folders and directories. /etc    [%SystemRoot%/System32/config] This contains system configurations directory that holds separate configuration files for each application. /var/log This directory contains application logs and security logs. They are kept for 4-5 weeks. /home/$USER This directory holds user data and configuration information. /etc/passwd This directory has user account information. Including /etc/shadow, /etc/hosts, /etc/sysconfig, /etc/syslog.conf Windows provided mo