Monday, February 17, 2020

Forensics with UNIX. Prepaid Cell Phones Essay Example | Topics and Well Written Essays - 750 words

Forensics with UNIX. Prepaid Cell Phones - Essay Example One of the most common differences between the UNIX system and Microsoft Windows is the security characteristics in the system design. In most cases, organizations can be drawn into computer investigations even without their will. However, most digital investigations that involve the computer are not successful because of the mistakes that are made in an early stage. One of the most common predicaments is the destruction, compromising and ignoring of digital evidence. This can create a serious crisis within the victim organization (Perrin 2010). Therefore, this crisis is supposed to be managed appropriately in order to ensure a successful digital investigation. The executive individuals in a corporation are supposed to have the capability of devising a corporate plan in the organization. This corporate plan should cover various risks including management structures, resourcing, core procedures, risk analysis and management aims. According to this information, UNIX is a user-friendly system in digital investigation as compared to Microsoft Windows (Sommer 2012). The main difference in the design and the security level of Microsoft Windows and UNIX illustrates one of the crucial and distinct. As stated above, this difference is based on the philosophy of the security level in the design of the operating systems. ... Lastly, the evidence must also satisfy the conditions that are set up by the legal tests of acceptability performed on the systems. UNIX has become one of the well known system targets that have attracted digital investigation. References Perrin, C 2010, UNIX vs. Microsoft Windows: How system designs reflect security philosophy, viewed 4 Oct 2012, http://www.techrepublic.com/blog/security/unix-vs-microsoft-windows-how-system-designs-reflect-security-philosophy/4627 Sommer, P 2012, Digital evidence, digital investigations and E-disclosure: A guide to forensic readiness for organizations, security advisers and lawyers, viewed 4 Oct 2012, http://www.iaac.org.uk/_media/DigitalInvestigations2012.pdf Week 5 DQ2: prepaid cell phones Recent research proves that the cellular phones have become exceedingly valuable for the human beings. This device can be used by all age groups to assist them with their life styles. The mobile phones have also topped the chart in social interaction. A prepaid cell phone is defined as a mobile phone which uses credit that has already been purchased in advance for the use of the mobile services (Virgin Mobile 2012). In this case, the purchased credit caters for all the mobile phone services that are accessed by the handler of the phone. The users usually top up their credit through several techniques depending of the payment mechanisms. In the contemporary world, the prepaid cell phones are slowly evolving to a social event. This is because the device can be used for several purposes (Barit 2012). It is quite clear that the prepaid phones have a lower cost since; it is easier to control spending. However, the prepaid customers sometimes pay more for the mobile services depending on what they do with their phones.

Monday, February 3, 2020

Devising Safety Plans Assignment Example | Topics and Well Written Essays - 1000 words

Devising Safety Plans - Assignment Example Last week, he punched her in the ribs a couple of times, resulting in bruising, which she revealed to you.She fears for her safety, though she is not yet ready to move out or leave him. The situation presented in the case is slightly complex and tricky to any counselor. Refusal or unwillingness by Jeannine to leave Robert despite series of abuse creates a serious uphill in the designing of an effective safety plan. However, it is still the responsibility of a counselor to design a workable safety plan to protect the abused client (APA). In that line, safety plan for Jeannine can begin with assessment of the situation and concerns of the client, that have to covering the extent and magnitude of the past abuses and resolutions. The next step is to persuade Jeannine to leave home with counselor providing the alternative home while assuring the client about returning to Robert after some times of treatment (Joiner et al., 2009). The reason for devising the above safety plan relates to the fact that the client’s life is in danger and must be away from the abuser. Assuring the client about returning home is to create a give-take situation to address the unwillingness to leave Robert and still achieve safety. An alternative safety plan would involve reporting to police to initiate arrest and lead to incarceration of the abuser (Jaffe & Diamond, 2011). This cannot work well in the situation considering the seemingly close attachment of the abused to the abuser that can escalate or worsen crisis experienced by the client. Scenario 2: Maria states she met Justin at a party a couple months ago. They have gone out a few times. Justin has never been to Marias house but she has been to his apartment; client states she usually meets him at a restaurant or club. Their relationship had advanced somewhat physically, but never to a sexual culmination. Imagine