Monday, June 17, 2019

Answer Questions Part 2 Essay Example | Topics and Well Written Essays - 3750 words

Answer Questions Part 2 - Essay ExampleEach much(prenominal) attack, irrespective of the location from where it is initiated, would also have the server to server IP address access details and these should have been highlighted in the audit of log data.Morever the agaze point of this investigation should have been the proof underlying the tip. Chat softwares norm altogethery keep record of the confabulate data and it is available time and date wise. nag chat site, where the alleged boasting was done by Jack Hasenpfeffer, should have been approached to obtain more substance to the claim of the theft of the marketing plan. This would have justifiedly set the investigation on the right course. As the investigations stand Trigraph side has proven that the recipient email address was that of Jack Hasenpfeffer however until unless it is proven that the machine politician tool author was Jack Hasenpfeffer and that he alone had intruded the Trigraph systems using such a tool and that s uch a tool had sent the data register to Jack Hasenpfeffer it cannot be concluded easily that Jack Hasenpfeffer was responsible for the theft of the marketing plan. ... ack Hasenpfeffers personal system but the moot question here is if these addresses were the scarcely ones available to Jack Hasenpfeffer and if there were no possibilities of using the hacking tool from any other address. In f proceed, Megagargantuans investigations have left out the vital fact that they had examined all skid of firewall intrusions in the under consideration time interval. However, one fact of Megagargantuans investigation is a grave point that stands against their own case they have conceded that a copy of the disputed information was found on Megagargantuans servers. This still leaves us at the above conclusion that the marketing software was accessed and received at Megagargantuans servers however, the act cannot be readily attributed to Jack Hasenpfeffer. Question 2 (1/3 page answer) Assuming that both you and T. William Stoat testify in the trial of the case presented in fact Set 1, is the expert testimony based on sufficient facts or dataIs the testimony the product of reliable principles and methods Have the principles and methods been applied reliably to the facts of the case The testimony of both the experts cannot be considered to be based on reliable principles and methods. In fact in Trigraph investigations-which have given rise to testimony facts- it is already pointed out that they picked the thread from one step ahead of the step required to be taken up. They totally bypassed the collecting information and data on the chat room boasting by Jack Hasenpfeffer. This would have provided circumstantial evidence to Jack Hasenpfeffers involvement even if the use of hacking tool could not be attributed to him. Moreover, the tools use to obtain system images are labeled as popular public software in Trigraph investigations.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.