Current Events – Cloud Storage Security (KRAUS)

Description

Investigations now involve tangible evidence that can be collected in a suspect or victim’s residence or workplace, as well as evidence that may be located within digital devices, on cloud storage platforms, and with ISPs or other sites (requiring appropriate legal documentation for access).

Don't use plagiarized sources. Get Your Custom Assignment on
Current Events – Cloud Storage Security (KRAUS)
From as Little as $13/Page

Instructions

For this assignment, you will continue to explore the role of the investigator in cybercrime investigations as you examine storage sites or digital devices used in crimes. Imagine you are an investigator tasked to brief members of the business community on a cloud storage security case. Examples of cloud storage companies are IDrive, pCloud, Mega, OneDrive, iCloud, Google Drive, Box, NextCloud, SpiderOak, DropBox, and MediaFire. You may select any case that did not occur in your state of residence.

Research a recent news article or peer reviewed article (within the last year) on the case.
Write a 1-2 paragraph summary of the article and describe the following:
Summary of the case (cloud storage security case).
Features of the device or technique used in the crime.
Identify and describe at least three vulnerabilities you believe may have impacted why the victim(s) was targeted by the offender.
Provide at least two mitigation strategies that could prevent similar victimizations in the business community.

Response Format

Include reference information using APA guidelines.
Use correct spelling, punctuation, and grammar. Be detailed in your description, using complete sentences. Sections must be a minimum of one paragraph in length. Bulleted items and lists will not be acceptable.
Do not just cut and paste the information you have found from the sources reviewed. Doing so is considered plagiarism. Instead, paraphrase the information you found in the sources reviewed and then write in your own words the information that you found to be relevant to this assignment. Include in-text citations in APA format as to where you obtained this information.
Responses will be written in short essay paragraphs from the perspective of a law enforcement professional.
Your response should demonstrate critical thinking. Cloud Storage Security Assignment 2
Cloud Storage Security Assignment 2
Criteria Ratings Pts
This criterion is linked to a Learning OutcomeContento Summary of the case (cloud storage security case).
o Features of the device or technique used in the crime.
o Identify and describe at least three vulnerabilities you believe may have impacted why the victim(s) was targeted by the offender.
o Provide at least two mitigation strategies that could prevent similar victimizations in the business community.
70 to >0.0 ptsFull Marks 0 ptsNo Marks
70 pts

This criterion is linked to a Learning OutcomeVerbal
20 to >0.0 ptsFull Marks 0 ptsNo Marks
20 pts

This criterion is linked to a Learning OutcomeMechanics
10 to >0.0 ptsFull Marks 0 ptsNo Marks
10 pts

Total Points: 100