Thursday, October 31, 2019

Systems Analyst Essay Example | Topics and Well Written Essays - 250 words

Systems Analyst - Essay Example He is the person in charge of and responsible for designing the novel system and applications to be used in meeting the objectives of the business (Shelly 2012, 43). In several organizations, the system analyst does the actual coding of proposed applications for the enterprise. He implements the designs proposed and supervises their operations towards achieving the business goals. In order to perform the demanding tasks effectively, a system analyst is required to possess various skills. Foremost, the analyst needs a wide knowledge of the enterprise he works for. He should have a profound familiarity of how the business operates. In addition, it is fundamental to have a superior comprehension of how businesses in the field operate; particularly competitors. He should have good interpersonal skills in order to enable him get information he requires for viable systems. All the information an analyst requires are fished from colleagues and other stakeholders. In order to get reliable information, he must be able to create a good rapport and correlate with others. Finally, a system analyst must have a reputable ability to solve problems (Shelly 2012, 32). He should be able to think quickly to solve challenging situations and find alternatives to dilemmas. Most important, an analyst must have a deep understanding of changes in the ICT world. He should be able to a dapt easily to the dynamics of the technological field and remain

Tuesday, October 29, 2019

Singapore Airline Essay Example for Free

Singapore Airline Essay Singapore Airline has been widely acknowledged as well known brand name in the aviation industry since it was established in 1947, particularly in term of safety, innovation and excellent services. Due to the route network spans over 93 cities in more than 38 countries (singaporeair.com) with the most modern fleet in the industry, in addition to Star Alliance member airlines to co-operate with more than 20 international airlines over the world, Singapore Airline has provided the best services to its customer and built the strong brand in their mind. For over 38 years independent existence since it was separated form alliance Malayan Airway Limited in 1972, Singapore Airlines has continuously developed and rapidly become one of the great airlines of the World based on the superior values and the specific culture that it dedicates to customer. Besides, through the provided services, SIA has impressed in customer’s mind by its creativity, diversity and continuous improvement; throughout it could satisfy better the customer’s demand as well gaining the certain competitive advantages in the target market. However, during the history, SIA sometime had to face certain problems that came from itself and negative effects from external environment (inflation, crisis economy, etc.) as well. Especially, during and after the difficult economic situation when Sars outbreak in 2003 and economic crisis in Middle East in the same year, the relationship between the group management and the labor unions in internal organisation began to sour, particularly after the wage-cuts and lay-offs of over 400 employees. In fact, this was regarded as the highest number of lay-offs in the history of Singapore Airline. In order to archive its goals today as one of the world’s leading carries, Singapore Airline underwent the long history with the point of time as follow: The history of SIA started in April 1947, when the first flight of SIA took off from Singapore to Kuala Lumpur – Malaysia. At that time, SIA was known under the name Malayan Airways. In 1963, when Federation of Malaysia was formed, SIA was renamed Malaysian Airways. Three years later, 1966, when Singapore was separated from the federation, SIA became Malaysia-Singapore Airlines (MSA). In 1972, it was split up from Malaysian Airways and keep operating under the brand name Singapore Airline till now. In 1986, â€Å"Singapore Girl† with the uniform of sarong kebaya was  born. This figure has become the famous icon of SIA that is a figure of a beautiful girl in the oriental scent, elegant and friendly, warm and full of empathy like the culture that SIA always tries to dedicate into customers. In 1990s, 2000s, SIA had expanded its route networks with more aircrafts: 22 B747-400s and 30 A340-300s in 1994, 77 B777s in 1995, and 10 A340-500 in 1998, 19 A380s 20 more B777-200s in 2001 (Singapore Airlines). In 2004, SIA opened the worlds longest non-stop commercial flight: Singapore to New York and Singapore to Los Angeles. In 2007, SIA made another record with the world’s largest commercial plane – A380. Nowadays, because of the route network spans 93 destinations in more than 38 countries with the most modern fleet in the industry, SIA has a strong presence in the South East Asian region, which together with its subsidiary SilkAir, connects Singapore with more international destinations in the region than any other South East Asian airline (singaporeair.com).

Sunday, October 27, 2019

Researching The Computer Forensics Investigation Plan

Researching The Computer Forensics Investigation Plan The purpose of this paper is to review the basic methodologies and the appropriate processes that a computer forensic investigator goes through in conducting an investigation. It will give an idea to the reader about the planning and organization of an investigator who is involved in a computer related crime, the ways in which he will conduct the investigation such as basic preparation, use of the required tools and techniques, acquisition and analysis of the data, role in giving testimony, use of forensic laboratories or the guidance of all the staff working under the main investigator and even planning network forensics all of which are related to his work. The Computer Forensics Investigation Plan A computer forensic investigates data that can be retrieved form storage media of a computer such as a hard disk, it is also considered that to be a successful computer forensic the knowledge of many different platforms to perform computing is a must, for our case we will consider you as the chief forensic investigator in the state of Virginia, as a part of private enterprise you are assigned the role of planning the computer investigation of a suspected criminal activity, we will see from your perspective how you should conduct all the necessary procedures. We dont just need science; we need good science (Evans, 2004) Always analyze major issues in preparing for an investigation. The crime scene is considered to be a very sensitive place in terms of collecting proofs and evidences which are in many cases very vulnerable and can be very easily be manipulated so special attention is needed in every aspect of recovery methods in order to gain as much as possible. Before arriving at the scene of crime, it is mandatory that you should always take a systematic approach in problem solving like making an initial assessment about the case then determining a preliminary approach to the case, after that, create a detailed checklist of the objectivity of the case, analyze the resources needed, identify all the risks and try the very best to minimize them, also outline all the details known about the case until then in a systematic manner such as the situation in which you will be arriving, the nature and specifics of the case, the type of computer forensic tools which will be needed at the case and to check on the specific operating systems in disposal which assist in the forensics investigation process. Once at the crime scene, try to gather evidence to prove that the suspect violated the company policy or committed a crime, since this is a private sector investigation it includes corporate businesses, other agencies of government are not involved such as law enforcement. The law enforcement agencies act according to the federal freedom of information act or laws of similar descent according to their territory in all process. Investigating and taking control of the computer incident scene in the corporate environment is considered to be much easier than in the criminal environment because the incident scene is often the workplace, these workplaces have databases of computer hardware and software which can also be analyzed, proper tools can be adopted to analyze a policy violation if any. Many companies either state their policy right away or show some warning, some apply both whose purpose is to tell that they hold the complete right to inspect the computing assets of their respective subjects at will, in addition to that every company must describe when an investigation can be initiated and allow the corporate investigators to know that under what circumstances they can examine the computer of an employee, if the investigator finds about the wrongdoing of the employee then the company can file a criminal complaint against him. If any evidence is discovered of a crime during the investigation then the management must be informed of the incident, checking the incident itself that it meets the elements of criminal law, work with the corporate attorney and also to see that you dont violate any other constitutional law in all the procedure. Preparing for a computer seizure for search operation is one of the most important point in conducting computing investigation. In order to do this, some answers from the victim and an informant may be needed, informant can be a detective for the case, a witness, a manager or any coworker to the specific person of interest. If you can identify the computing system, then estimate things such as how many computer systems to process and size of drive on the computer of the suspect, also determine which operating systems and hardware are involved. Determining location of the evidence and the cases type is very crucial, it allows to determine if computers can be removed. If the removal of the computers will cause harm to the company then it should not be done in the interest of the company, problems in investigation may arise if the files are most probably hidden, encrypted or stored in some offsite, if the computers are not allowed to be taken for investigation then the investigator must determine the resources to acquire digital evidence and the proper tools which will be needed to make data acquisition faster. Also determine who is in charge of the respective systems (in corporate environment, usually one persons assistance from the company is required in this regard). Always keep some specialists who work on many different types of operating systems, servers or databases and properly educate those specialists in investigative techniques. Once arrived, securing the crime scene or the specific computer is the foremost priority of the investigation team, the purpose is to preserve the evidence and keep the acquired information confidential. The investigative team should define a secure perimeter using a special type of yellow barrier tape, it should also have the legal authority to keep the unnecessary people out but do not fail to comply the other law enforcers or obstruct justice in any manner possible. Only professional task force should handle the crime scene for evidence as any non professional law enforcer can manipulate or even destroy the vital piece of evidence which may be very crucial in the overall scenario. Remember that corporate investigators does not seize evidence very often, more brief guidelines for processing an incident or crime scene goes as follows, keeping a journal to document the activities, securing the scene in the sense of being professional and courteous with onlookers, removing all those personnel who are not associated with investigation, taking all the proper and necessary recordings in video of the area surrounding the computer, at the same time paying attention to all the major and minor details. Sketching the incident of the crime scene and checking the computers as soon as possible. While at the crime scene, dont ever cut the electrical power to a running system by pulling the plug unless it is an older Windows or DOS system (which in these days are very rarely found anywhere), instead apply a live acquisition by the proper acquisition methods if possible, when shutting down computers with Operating Systems such as Windows XP or later version of it or Linux/Unix then always remember to perform a normal shutdown of the system, this helps to prevent log files. Try the very best to save the data from the current applications as much safe as possible, properly record all active windows or other shell sessions, and photograph the scene. Also make notes of everything that is done even when copying the data from a live computer of a suspect, save open files to external storage medium such as a hard drive or on a network share (if somehow the saving mentioned is causing problems then save with some new titles), then close applications and shut down the computer. Further guidelines include on bagging and tagging the evidence which is done as follows, first assign a person to collect (and log) the evidence, then tag all the evidence which is collected with the present date/time, serial number or other features. Always keep two separate and different logs of evidence collected an keep control of the evidence at the crime scene. Always look for information related to the investigation such as passwords, PINs, passphrases, bank accounts and so on. Look at papers in places such as the drawers or even try to search the garbage can. Collect all the related documents and media which is associated with investigation such as manuals or software/hardware. Using a technical advisor of high degree experience and knowledge is a must, technical advisor can help to list the tools which are required to make progress at the crime scene, it is the person which can guide the investigation team about where to locate data and help the team in extracting the log records or other evidence form large servers. The advisor can also create or help to make a search warrant by finding what is needed by the investigators for the warrant. More brief responsibilities of the technical advisor includes to know the aspects of the seized systems, to direct the main investigator on handling sensitive material, helping in securing the crime scene, helping to plan the strategy for search and seizure (documenting it), document all the activities and helping in conducting the search and seizure. Documenting all the evidence in the lab is also a necessary process, which involves in recording the activities and findings as the investigators work; this can be done by maintaining a journal to record the steps taken as the investigator process evidence. The main objective is to produce the same results when the main investigator or any other repeat the steps that were taken to collect evidence, a journal serves as reference that documents all the methods that have been used to process evidence. For proper documenting the evidence, always create and use an evidence custody form, which serves the following functions such as identify who has handled the evidence and identify the evidence itself, properly listing all time and date of the handling of the evidence. Other information can also be added to the form such as specific section listing and hash values, try to include any other detailed information that might need for reference. Evidence forms or labels are present in the evidence bags that can be used to document the evidence. Forensic Tools Always prepare the tools using information from incidents and crime scenes, the initial response field kit should be light in weight and easy to transport form one place to another. An addition to the initial kit is the extensive response field kit which must include all the necessary tools. The items in an initial response field kit may include one digital camera or 35mm camera with film and flash, one flashlight, one laptop computer, one large capacity drive, one IDE ribbon cable (ATA-33 or ATA-100), one SATA cable, one forensic boot media containing the preferred utility, one FireWire or USB dual wire protect external bay, ten evidence log forms, one notebook or dictation recorder, ten computer evidence bags (antistatic bags), twenty evidence labels, twenty tape and tags, one permanent ink marker, ten external USB devices such as a thumb drive or a larger portable hard drive.(cited in Nelson, Phillips Stewart , 2004) Tools in an extensive response field kit may include varieties of technical manuals ranging from operating systems references to forensic analysis guides, one initial response field kit, one portable PC with SCSI card for DLT tape drive or suspects SCSI drive, two electrical power strips, one additional hand tools including bolt cutters, pry bar and hacksaw, one pair of leather gloves and disposable latex gloves (assorted sizes), one hand truck and luggage cart, ten large garbage bags and large cardboard boxes with packaging tape, one rubber bands of assorted sizes, one magnifying glass, one ream of print paper, one small brush of cleaning dust fro suspects interior CPU cabinet, ten USB thumb drives of varying sizes, two external hard drives (200 GB or larger) with power cables, assorted converter cables and five additional assorted hard drives for data acquisition. When choosing an appropriate tool, the investigator must be sure that the tool is properly functioning, and that the right person handles it during the investigation. In order to prepare the investigators team, investigator must review all the facts, plans and objectives with the entire team assembled, the main objectives of the scene processing should be to collect evidence and secure it. The speed of the response from the team is very crucial as it can cause evidence such as digital evidence to be lost. Laboratory A computer forensics lab is a place where computer forensics conduct investigation, store evidence and house the necessary equipment, hardware and software. A typical lab manager duties involve many tasks such as proper management for case study, helping to provide reasonable consensus for effective decisions, keep everyone up to date with proper ethics and any modifications if made, keeping a financial account and proper check and balance of the entire facility, keeping it updated according to latest trends in technology and promoting the required quality assurance, appoint a schedule that suits everyone, estimating the potential of investigators and assessing their requirements, proper estimation of results ( preliminary or final) or when they are expected, strictly manage all lab policies and keep an overall look on the safety and security of the entire facility. The staff members have duties which include knowledge and training of equipments relating to computer systems such as O perating systems and their file types, software and hardware. Other staff duties include knowledge and training of technical skills, investigative skills, deductive reasoning. Planning lab budget involves making proper divisions in costs on all bases from daily to annual expenses, gathering the available data of the past expenses and use it to predict or prepare for any future costs. The main expense for a lab comes from the trained personnel or the equipment they use such as hardware or software devices in their disposal. Always estimate the number of computer cases the lab expects to cover, always being notified about the advancements in technology in the respective field, try to make assessment about the computer related crimes ( their kinds), and use this information to plan ahead lab requirements and costs. While making good computer technology available is important, the costs and benefits of upgrading all computers to state of the art must be weighed. (cited in schwabe, 2001) Check statistics from the Uniform Crime Report, identify the specific software used to commit crimes. If youre setting a lab for any private corporation, remember to check the inventory of computing such as software or hardware, previous reported problems and the ongoing and future advancements in related computer technology. Managing time is also a major concern when choosing on the computing equipment for the purchase. Most of the investigation is conducted in the lab, so it should be secure as evidence may is very crucial and cannot afforded to be lost, manipulated, damaged, destroyed or corrupted. Always put emphasis in providing a secure and safe environment, keep proper inventory control of the assets (inform in advance if more supplies are needed). A safe and secure facility should always preserve the evidence data and keep it as it is, the minimum requirements for a secure facility are a medium or small sized room with true walls form the floor to ceiling, proper locking mech anism provided with the door access, secure container and log for visitors. Almost all of the workers in the facility should be given the same level of access. Always brief the staff about the security policy, it is a must. The evidence lockers used in the lab must be kept secure enough such that any unauthorized person may not access it at all, some recommendations for securing storage containers include locating the containers in a properly defined restricted area, limiting people who will have the access to the storage containers, keeping a record on the authority of everyone who has access to the containers and keeping the containers locked when not in use. If a combination of locking system is used, then provide equal measure of security for both the contents of the container and the combination, always destroy the combinations that were previously held when setting up new combinations, only those persons who have the proper authority should be allowed to change the lock combinations, try to change the combination every three or six months or whenever required. When using a key padlock, authorize a personnel as the main key custodian, keep duplicate keys and print sequential numbers on all of them, keep a registry which has a record of keys that are assigned to the authorized personnel, conduct audits on weekly or monthly basis, try to place keys in a secure container after taking an inventory of keys, keep the level of security the same for all the keys and evidence containers, replace the old locks and keys on an annual basis and dont use a master key for several locks. Containers should be strong, safe and as much indestructible as possible with external padlock system and a cabinet inside, try to get a media safe if possible (to protect evidence form damage), keep an evidence storage room (if possible) in lab and keep a well organized evidence log which is used to keep update on all the occasions when the container of the evidence is opened or closed. Always maintain a security policy and enforce it (log signing in for visitors in a way that those personnel are considered to be visitors who are not assigned to lab, these visitors should always be escorted in all times), using indicators (visible and/or audible) is also a necessity inside lab premises, install an intrusion alarm system and hire a guard force for your lab. In civil litigation, investigator may return the evidence after using it (when issued a discovery order),if the investigator cannot retain the evidence then make sure it make the correct type of copy( copy in cases of data from disks or other hard drives, logical or bit stream), ask the supervisor or your client attorney on the requirements, you should usually only have one chance, create a duplicate copy of the evidence file, make minimum two images of evidence(digital) using separate methods, try to copy the host protected part of a disk, size is the biggest concern ( such as in raid redundant array of independent disks) systems which have terabytes of data), Some investigation needs to be conducted in the laboratory because of the proper tools and technicians available there who know how to deal with the evidence correctly without tampering it, Investigator might need to have the proper permission of the authority in charge if it wants the system moved to the laboratory, when permission provided, the investigator have a given time frame in which it must perform its task and then deliver the system back to where it came from. Log files Log files are those which lists all the actions that have happened, such as in Web servers which maintain log files to list every request made to the main Web server, using the log file analysis tools, the user can gave a very good assessment of where the visitors came from or how often they return or even how they go through a site, in addition to log files there are cookies, when used, they enable the Webmasters to log far more detailed information about the user on how it is accessing a site. Logs are also considered to be an independent, machine-generated record of what happened within a network for both system and user activity. When set up properly, and with the appropriate due care, logs can provide an immutable fingerprint of system and user activity. In many cases, the logs tell a story as to what really happened in an incident. They can tell you what systems were involved; how the systems and people behaved; what information was accessed; who accessed it; and precisely when these activities took place. (Cited in Musthaler, 2010) Given the overview of logs on what they can provide, the regulations such as the PCI DSS (payment card industry DSS), the FRCP (civil procedures federal rules), the HIPAA (which is an act regarding the health insurance) and many other regulations, all consider logs and log management to be the very basic and essential necessity for proper and efficient data management. Logs can be used to capture many vital sources of information which beside protecting the core data can also help in supporting forensic analysis and incident response if a data breach has occurred or other forms of electronic crime, such as fraud. The overall log monitoring can be hurdled because of the extremely large amount of fair data capture and the unwillingness, lack of will or errors in properly managing, analyze and correlating that data. The overall conclusion (in mismanagement) can cost hugely as if some suspicious activity or breach really happens, then a lot of time ( possibly many months ) may require to detect the fault, there is even no guarantee if the fault will be detected. In order to have logs admissible in court as evidence of a crime, an organization must prepare and execute due care with the log data. Log data must be viewed and treated like a primary evidence source. Here are some best practices that can help ensure log data and log management practices properly support forensic investigations. Have a clear corporate policy for managing logs across the entire organization. Document what is being logged and why, as well as how the log data is captured, stored and analyzed. Ensure that 100% of log-able devices and applications are captured and the data is unfiltered. Have centralized storage and retention of all logs, with everything in one place and in one format. Ensure the time synchronization of logs to facilitate correlating the data and retrieving data over specific timeframes. Ensure the separation of duties over logs and log management systems to protect from potential internal threats such as a super user or administrator turning off or modifying logs to conceal illicit activity. Always maintain backup copies of logs. Have a defined retention policy that specifies the rete ntion period across the organization for all log data. Organizations should work with legal counsel to determine the best time frames and have log data incorporated into an overall data retention policy. Have a defined procedure to follow after an incident. Test the incident response plan, including the retrieval of backup log data from offsite storage. (Musthaler, 2010) Further quotes form Brian Musthaler include, If an incident or data breach is suspected, there are several steps to take right away: Increase the logging capability to the maximum and consider adding a network sniffer to capture additional detail from network traffic. In an incident, its better to have more data rather than less. Freeze the rotation or destruction of existing logs to prevent the loss of potential evidence. Get backup copies of the logs and make sure they are secure. Deploy a qualified investigations team to determine the situation. (Musthaler, 2010) With the appropriate care, logs can provide solid forensic evidence when and if it is needed, as far as the job of a computer forensic investigator is concerned, his log begins when he starts an investigation, logs can be made of many things such as events, system security, firewall, audit, access and so on. (cited in PFI, 2010) Equipment can be recorded in the log by many ways, audio logs can be made which can store audio files, picture logs can be made which can store digital pictures taken during an investigation. Equipments are recorded according to the type of its contents with the appropriate tools. The final log is stored at the very end after possibly remodifying or revising previous logs. Data acquisition For the process of acquiring data in an investigation, we will consider following techniques, There are two types of data acquisition, static acquisition and live acquisition which basically involves the following four type of acquisition techniques, bit-stream disk-to-disk, bit-stream disk-to-image file, sparse and Logical. Bit-stream disk-to-image file is the most common method, it makes many copies and all of the copies made are replications of the original drive bit-by bit, similar type of process is happening in everyday scenario concerning a common personal computer, when we copy and paste files from one place to another or when we make multiple copies of a data file then the exact copy of the original data file is made available in many places. It is very simple, easy and with very nominal training can be performed on the target system therefore it is the most preferred method as well. The tools used in it are EnCase, ProDiscoer, FTK, SMART. Disk-to-disk method (bit-stream) is applied in the case of disk-to-image copy being impossible mainly due to hardware or software errors or incompatibilities, this problem comes when at most of the time dealing with very old drives. It adjusts target disks geometry to match the drive of the suspect (geometry of track configuration), tools used in this form are SafeBack, EnCase, , and Snap Copy. Logical acquisition and Sparse acquisition are used when the total time of the investigator is very short and the target disk is very large. This type of acquisition only searches and retrieves the selected file which is of particular interest, comparing this to Sparse acquisition which deals with data collection but again the data collected is very nominal. Data analysis Data analysis(for a computer forensic investigator) includes mostly examining digital evidence which depends on the following main factors, the nature of the case, the amount of data to process, the search warrants and court orders and the company policies. Scope creep happens when investigation expands beyond the original description which should be avoided in all cases. Few basic principles apply to about the entire computer forensics cases such as the approach taken depends largely on the specific type of case being investigated. Basic steps for all computer forensics investigations for analysis include the following points such as for target drives, using only recently wiped media that have been reformatted and inspected for computer viruses, noting the condition of the computer when seized, removing the original drive from the computer to check date and time values in the systems CMOS, record how to acquire data from the suspects drive, process the data methodically and logically, listing all folders and files on the image or drive Also try to examine the contents of all data files in all folders starting at the root directory of the volume partition, try to recover all the file contents that are password-protected and can be related to the investigation, identifying the function of every executable file that does not match known hash values and maintain control of all evidence and findings and also document everything as being progressed through the examination. Refining and modifying the investigation plan includes determining the scope of the investigation and what the case requires, determining if all the information should be collected and what to do in case of scope creep. The main aim should be to start with a plan but remain flexible in the face of new evidence. Data can be analyzed using many tools from the forensic toolkit such as supported file systems (FAT12/16/32, NTFS, Ext2fs, and Ext3fs). FTK can a very powerful tool that can analyze data from several sources including image files from other vendors, it produces a case long file. FTK also analyzes compressed files, reports can also be generated in it using bookmarks. Other analyze tools include searching for keywords (indexed search, live search or using advanced searching techniques such as stemming). In order to identify different types of data such as images, email and so on, the investigator should examine the data format and then according to that format, it should deal with the file with the appropriate tool. Working with law enforcement The status of individuals under law is no longer in doubt: individuals are subjects of law and as such are accorded rights. Yet rights are illusory without the procedural capability to enforce them. They are no more than high-minded principles if individuals whose rights have been violated have no avenue for complaint and relief. (Cited in Pasqualucci, 2003) There are basically two types of computer investigations, public and private(corporate), the public investigations involve government agencies responsible for criminal investigation and prosecution, the organizations involved must observe legal guidelines provided to them by the authority, other legal rights such as law of search and seizure helps in protecting rights of all people including suspects. Of the everyday problems of the criminal justice system itself, certainly the most delicate and probably the most difficult concern the proper ways of dealing individually with individuals.(Cited in Winslow, 1968) Investigator working with the law enforcement must always abide by the federal and constitutional laws in conducting and performing entire process of investigation. Criminal cases at law enforcement goes through three main steps, first the victim (any individual or company) will contact the law enforcement agency by making a complaint, then acting on behalf of that complaint, the investigator will be assigned by the government authority to conduct a balanced and proper investigation and will be asked to present all the findings directly to the law agency, the investigator will interview the complaint and will write a report about the crime, police blotter may provide a record of clues to crimes that have been committed previously (related to the ongoing investigation). The investigator collect, delegate and process the information related to the complaint. As the investigator build a case, the information is turned over to the prosecutor. An affidavit is a sworn statement of support of facts about evidence of a crime which is submitted to a judge to request a search warrant; the judge must approve and sign a search warrant before it can be used to collect evidence. The chain of custody is the route the evidence takes from the time investigator finds it until the case is closed or goes to court, throughout the case, the evidence is confiscated by the investigator who has the proper right under the law to maintain and keep the evidence immutable. Other concerns which need to be addressed when bringing law enforcement to the scene is that the officers should follow proper procedure when acquiring the evidence such as in digital evidence which can be easily altered by an overeager investigator, special concerns should be given to the information on storage media such as hard disks which are password protected. Network forensics Network forensics is the job of finding the information about how a perpetrator or an attacker gained access to a network, it involves systematic tracking of incoming and outgoing traffic to find out how an attack was carried out or how an event occurred on a network, the forensic expert should be very well experienced and be familiar with many previously related cases of network because the intruders which the network forensic searches for always leave some sort of trail behind, this trail

Friday, October 25, 2019

Treatment of Patients with Acute Myocardial Infarction Essay -- Medic

This paper will critique a quantitative research study (Lesnecki, 2010) that examined influences of individuals that delayed seeking treatment during an acute myocardial infarction (AMI). The article examined psychosocial and environmental influences that may have played a role for the period of AMI symptom onset to actually obtaining medical treatment. The research study will be reviewed looking at background, study purpose, design and methodology, data analysis, results, discussion, limitations, and applications for nursing practice. Background Lesnecki (2010) gave a brief literature review and described the magnitude of the problem with treatment delay in patients with AMI. She touched on the prevalence of treatment delay in the United States, â€Å"310,000 people a year die of coronary heart disease in an emergency department or before reaching a hospital† (p. 185). Other research was highlighted that linked the variables of age, gender, and race to a delay in seeking treatment when having an AMI. The author discussed the importance for this type of research and emphasized â€Å"to preserve heart muscle, time is crucial† (p. 185). The author hoped to discover additional variables that could help nurses educate the public to seek prompt medical treatment when having AMI symptoms. Purpose The researcher (Lesnecki, 2010) clearly stated the purpose of the study to â€Å"identify cognitive, social, and emotional influences of individuals delaying treatment when having symptoms of an AMI† (p. 186). Variables proposed to be related to delay in seeking treatment were closely examined and the amount of influence the variables had in relation to that decision, made by the patient, were considered. Method Design ... ...d practice (4th ed.). St. Louis, MO: Elsevier Saunders. Burns, N. & Groves, S. K. (2009). The practice of nursing research: Appraisal, synthesis, and generation of evidence (6th ed.). St. Louis: Saunders Elsevier. Dracup, K. & Moser, D. K. (1997). Beyond sociodemographics: Factors influencing the decision to seek treatment for symptoms of acute myocardial infarction. Heart & Lung, 26(4), 253-262. du Prel, J. B., Hommel, G., Rohrig, B., & Blettner, M. (2009). Confidence interval or p-value? Deutsches Arzteblatt International, 106(19), 335-339. doi: 10.3238/arztebl.2009.0335 Knapp, T. R. (1998). Quantitative nursing research. Thousand Oaks, CA: SAGE Publications. Lesnecki, L. (2010, November). Factors influencing treatment delay for patients with acute myocardial infarction. Applied Nursing Research, 23(4), 185-190. doi: 10.1016/j.apnr.2008.09.004

Thursday, October 24, 2019

Introduction Fasam System

Requirements Document Purpose Introduction The primary goal of this document is to provide a complete and accurate list of requirements for a Fire and Security Alarm Monitoring System. Upon completion, the document will act as a binding contract between developers and users and will provide a common point of reference for system Document Conventions Although this document is intended as a set of Requirements, not a design, some technical information has been included with the requirements description. Intended AudienceThe primary audience of this document includes, but is not limited to, project leaders, the designers and developers of the system and the end user. (Reference 1) Background Team International is primarily a software developing company specialising in fire and security alarm monitoring system (‘FASAM’). Team International has been awarded the contract to supply and implement a FASAM for Everett & Co. The building in question is a new building, so there is n o previous FASAM system installed. The building in question consists of 2 floors, each floor consisting of 12 ffices. The building will be grouped in ZONES. Zones will consist of x-amount of offices. Below is an example of this. Keep in mind that this is not the actual zone layout representation but just an example to illustrate how the zones will work. [pic] Each zone shall be equipped with various sensors which will monitor for and detect certain threats. Each zone shall have security / fire doors installed which the FASAM will have control over in regards to locking and unlocking depending on the threat.Team International has decided, after gathering the requirements, that an automated system with a manual over-ride option, which will be connected to a central control room, will best suit the needs of Everett & Co. Product Scope Processes involved in the project scope The development of this system will include the gathering of the requirements, outline the architecture design us ing CORE modelling, creating a prototype based upon the proposed user interface and the requirements validation which will all help to contribute to the initial development of a FASAM for Everett & Co.Gathering of the requirements: The input for this shall come from interviews with the client. The knowledge gained from the input will help create the Requirements document. Outline the architecture: The input for this shall come from the requirements document. The knowledge gained from the document will contribute to help producing systems architecture and a systems model. Creating a prototype: The input for this shall come from the requirements document.The outcome of this will be a working prototype of the system. Requirements validation: The input for this section comes from the three previously mentioned stages. The outcome will be a produced validation document highlighting the pros and cons of each stage. Limits and constraints of the project scope Obviously with Team Internatio nal being primarily a software producing company, there is a lack of knowledge in regards to certain hardware elements.That is why this project will not cover the configuration of sensors due to the fact that when Team International purchases the sensors from the supplier, the suppliers implement the required configuration settings for the sensors. In regards to the sensors, all Team International does is install the sensors and connect them to the main user interface system. This process shall only cover the developing of a fire and security threat system.

Wednesday, October 23, 2019

Fearless

â€Å"Fearless† and â€Å"courageous†; two common words that have been used to describe soldiers for centuries. There is, however, a big difference between being courageous and being fearless. Courage is one of the best terms used to describe a soldier: that no matter how hard the circumstances are and how scared he/she is, they keep pressing on. It is truly amazing how courageous these men and women are. Humans were made to fear, it is humanly impossible to be without fear, there is no soldier that is truly â€Å"fearless†.Soldiers at war often put up a front that they are unafraid, the reason they put up this front is to be trusted by fellow soldiers, to fit into society's view of a soldier and to maintain their sanity. The world often perceives fear as a sign of weakness. The word fear is defined as a â€Å"feeling of anxiety or agitation caused by the presence or nearness of danger, evil, or pain. Extreme fear is terror which applies to an overwhelming often paralyzing fear† (Fear†). In the heat of battle, a soldier's senses are heightened to the danger that surrounds him.Any civilian in these circumstances would choose to run and hide or escape, but the soldier has been trained not to selfishly retreat, but to heed orders and advance. He/she may know his/her life is in grave danger, yet for the sake of courage and duty to his/her country he continues on. The courage that a soldier surrounds themself with is the quality of spirit which enables one to face danger or pain without showing fear. If a soldier falters he or she may be dismissed but will certainly not be trusted by his/her fellow soldiers.Each soldier desires trust, loyalty, and respect and each of their lives depend on it. The soldier makes a choice to lay his or her individual fears and emotions aside to be courageous. In the short story, â€Å"The Things They Carried†, by Tim O'Brien, not only were the physical items that they carried described but also the emotional burdens they carried. â€Å"They carried shameful memories. They carried the common secret of cowardice barely restrained, the instinct to run or freeze or hide. They carried their reputations.They carried the soldier's greatest fear, which was the fear of blushing† (O'Brien). Soldiers care about what fellow soldiers think of them. They need to be trusted. The face of fearlessness is formed to avoid being made a coward or being put to shame, and to keep a good reputation. Their fellow soldiers are all they have at war. In general, there is a disconnect between society’s view on war and a soldier’s view on war. Citizens are easily influenced and swayed by different means of communication in society.Society often portrays war and soldiers to be something that they are not: fearless. According to platoon leader, Paul Stanley, â€Å"soldiers realize the cost and effort required to be willing to fight and what it means to be in life or death situations , society thinks they understand but they don't† (Paul Stanley). He said his view is totally different than that of an everyday citizen. Lieutenant Stanley also commented on society’s negative view of soldiers; â€Å"Society believes soldiers are more like weapons instead of people. Sometimes society depicts soldiers in a negative light, as being merciless fighting machines, which is not the case either. Lieutenant Stanley said that his view of his country was better after war; he appreciates life more and is a better person. How society depicts soldiers is what we believe a soldier to be, which often means supernatural beings or war machines. In â€Å"The Things They Carried†, first Lieutenant Jimmy Cross, had gotten sidetracked during battle and because of it one of his men was killed.From then on Jimmy chose to put all thoughts outside of war aside in hopes that it would never occur again. He wouldn't show his emotion towards anything; in other words, he woul d act fearless (O'Brien 232-239). The feelings and emotions are still there, they are just hidden behind a wall, making it easier to keep him and others safe. Soldiers often need to block out any emotion and images to maintain their sanity. A first lieutenant in the Desert Storm War, Paul Stanley said â€Å"especially as an officer, you can't act scared.Everyone looks to you, so you have to be strong for them. † Soldiers have to have confidence in themselves and the team around them and also trust that they received the proper training. They learn to subdue their fear and cope with emotion. A common disorder that soldiers are diagnosed with after war because of their suppression of any emotional burdens is called Post Traumatic Stress Disorder or PTSD. Post-Traumatic Stress Disorder occurs when a person experiences a severe trauma or life threatening event.If soldiers were fearless, they wouldn't be affected by this disorder. Soldiers are heroes, courageous, noble, self-sacri ficing, and brave and so much more, but they are still human, they are not fearless. The aspect of being fearless plays a large role in keeping a soldier alive and sane. Their fearless attitude is the way soldiers are able to fit into society’s view of a soldier, be trusted by their team, and maintain their sanity.