Monday, May 6, 2019

Answer Questions Part 2 Essay Example | Topics and Well Written Essays - 3750 words

Answer Questions Part 2 - rise ExampleEach much(prenominal) attack, irrespective of the location from where it is initiated, would also take on the server to server IP address access details and these should have been highlighted in the audit of log data.Morever the staring point of this investigating should have been the proof underlying the tip. Chat softwares normally keep record of the chat data and it is usable time and date wise. Hacker chat site, where the alleged overdraw was done by jak Hasenpfeffer, should have been approached to obtain more substance to the claim of the theft of the marketing plan. This would have rightly set the investigating on the right course. As the investigations stand Trigraph side has proven that the recipient email address was that of Jack Hasenpfeffer however until unless it is proven that the hack son of a bitch author was Jack Hasenpfeffer and that he alone had intruded the Trigraph systems using such a tool and that such a tool had se nt the data file to Jack Hasenpfeffer it cannot be concluded easily that Jack Hasenpfeffer was responsible for the theft of the marketing plan. ... ack Hasenpfeffers personal system but the tip over question here is if these addresses were the only ones available to Jack Hasenpfeffer and if there were no possibilities of using the hacking tool from two other address. In fact, Megagargantuans investigations have left out the vital fact that they had examined all case of firewall intrusions in the under consideration time interval. However, one fact of Megagargantuans investigation is a grave point that stands against their accept case they have conceded that a copy of the disputed information was found on Megagargantuans servers. This still leaves us at the above conclusion that the marketing software was accessed and received at Megagargantuans servers however, the act cannot be pronto attributed to Jack Hasenpfeffer. Question 2 (1/3 page answer) Assuming that both you and T. Wi lliam Stoat testify in the ladder of the case presented in Fact Set 1, is the expert testimony based on sufficient facts or dataIs the testimony the product of reliable principles and methods Have the principles and methods been applied reliably to the facts of the case The testimony of both the experts cannot be considered to be based on reliable principles and methods. In fact in Trigraph investigations-which have habituated rise to testimony facts- it is already pointed out that they picked the thread from one step ahead of the step undeniable to be taken up. They totally bypassed the collecting information and data on the chat room boasting by Jack Hasenpfeffer. This would have provided circumstantial evidence to Jack Hasenpfeffers involvement even if the use of hacking tool could not be attributed to him. Moreover, the tools used to obtain system images are labeled as popular usual software in Trigraph investigations.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.