You have been asked back for a final interview with the Cyber Crime lab (CCL). The hiring decision is between you and one other candidate. You are required to answer the following questions for the interview as a test of your knowled

Final Project: Interview with Cyber Crime Lab

You have been asked back for a final interview with the Cyber Crime lab (CCL). The hiring decision is between you and one other candidate. You are required to answer the following questions for the interview as a test of your knowledge so CCL can determine the most qualified applicant. Each member of the CCL hiring team has created a short question. Answer each of these questions accurately, knowing that your answers will determine who will be hired.

Create a video presentation in which you discuss:

1. What are the risks of using a public WiFi network? Short of finding a more secure system, what could you do to use this wireless network more securely?

2. Considering your role as a network administrator, describe a situation in which you would want to filter specific ports when capturing data such as FTP traffic. How can catching network traffic help a security analyst?

3. You will be responsible for creating a plan for receiving and re-introducing a remote field team’s potentially infected computers back into the company computer network. Briefly describe your method for ensuring that any infected machines do not impact the corporate system. What should you consider when creating your plan? What lessons learned could be incorporated in the future?

4. Research Sam Spade to discover more information about the tools it includes. Briefly describe the purpose and expected the result for each device found on the Basic and Tools menu of Sam Spade.

5. Explain the specific knowledge you gained from the labs in this class. Explain how this could benefit CCL.

6. Use at least five quality resources in this assignment. At least one must have been published in the last six months. Note: Wikipedia and similar websites do not qualify as quality resources. Submit a separate document with your resources by attaching a report or leaving your answers in the available text box.

The specific course outcomes associated with this assignment are:
• Explain the process of network traffic analysis, sniffing, and their appropriate tools.
• Analyze wireless network vulnerabilities exploited by hackers.
• Examine the proper methods for performing incident handling.
• Use technology and information resources to research issues in cybercrime techniques and response.
• Write clearly and concisely about topics related to cybercrime techniques and response using proper writing mechanics and technical style conventions.

WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?
Scroll to Top