Documents the forensic investigation activities

Assignment Help Basic Computer Science
Reference no: EM131217386 , Length:

Charlie's computer we identified the Cygnus free hex editor software. Also discovered a program folder name called invisible secrets 2.1. Inside this folder we got three folders. After each was folder checked, we had discovered that one of the folders is empty and other two folders have dll files. The dlls file name is "blowfish","jpgcarrier" and "bmpcarrier". These dlls file are supports to suspicion that means it is steganography tools.

When investigating Jo's computer he attached two flash drive with his compute. Also he downloaded TrueCrypt software on his computer. Recent Documents folder shows a hidden folder with images.

Pat's computer we identified vnc free edition software installed in his computer. In his computer recent documents folder shows tool keylogger log on 12/03, 12/04 and 12/08/2009 date. Also in program files shows real vnc folder.

When we investigation terry's computer hard disk image we got the keylogger software download, VNC free edition software install and Eraser software install his computer. Also he downloads realvnc Software in his computer. When click realvnc folder then we can see logmessages.dll, winvnc4.exe and wm_hooks.dll file in here.

You need working here

Part A

Accuracy of practical work-

- Does it follow the proper forensic methodologies taught in the course?

- How the investigation follow current professional forensic practice taught in this course?

- Does the investigation identified all possible evidence that can be presented based on given police evidence

Part B -

- Finally prepare a report for your team members to carry the investigation further

o Details of digital forensic methodologies and process flow used to investigate this case. Provide appropriate screenshots to show detail process of the investigation.
o Identify ethical and legal issues are applicable for the case you are working on
o Write appropriate justifications to support your chosen methodologies and process.
o Justification of choosing ethical and legal issues that are relevant to the case.

Marking sheet

Report quality:
- How well the report documents the forensic investigation activities
- Is the report easy to follow
- How well the flow of the investigation were sequentially presented in the report
- Does it prepare with formal report writing style such as table of content, page numbers, appropriate referencing (if any), cover page and so on.

Evidence of the practical work:

- Does the report properly evidence (using screenshots or video or any other possible means) the practical work with detail explanation of possible steps followed for creation/ acquisition/investigation of the case?

Verified Expert

The solution file prepared in Ms word which contain 400 words and explained about the case investigation with forensic methodologies. The solution has two parts A and B , answered both parts of the questions with diagram which is explained about the process of the digital investigation, ethical legal issues and justifications. The references are included as per APA format and cited properly.

Reference no: EM131217386

Questions Cloud

Define quantitative research and qualitative research : What are the steps in the scientific method of inquiry or research process? Why must each of these steps be included to support the scientific method? Briefly discuss how the scientific research method was applied in the article you found.
Components of consumption spending : According to the Keynesian model, what are the two components of consumption spending? What factors determine how consumption changes when real disposable income changes? Explain.
Johnson and johnson plan of action : What do you think Johnson and Johnson's plan of action would be if the inflation rates continued to decrease to the point where deflation occurred?
Find the transfer function : For the rotational mechanical system given below, find the transfer function.
Documents the forensic investigation activities : Identify ethical and legal issues are applicable for the case you are working on Write appropriate justifications to support your chosen methodologies and process - How well the report documents the forensic investigation activities
How will this theory impact your instruction : How will you incorporate the principles of this theory into a lesson plan? Provide a minimum of three examples (activities or strategies). How will you incorporate the principles of this theory into your assessment plan? Provide a minimum of two..
Prepare a lecture that is focused on government : Congratulations! You have just been selected by a prestigious college to fill in for a professor of Economics and to prepare a lecture that is focused on Government & Business and International Trade.
Statement of financial position profit & loss cash flow : Provide an executive summary which states the problem, how it was investigated, what was found, and what the findings mean. The introduction may include the company's background relating to business structure, operations, services and all other busin..

Reviews

inf1217386

9/26/2016 8:39:53 AM

I need to thank you guys and say that you did magnificent work. I thought you had a great deal of data that was helpful and when consolidated with the data that I had... WoW my papers was spectacular. I need to say that I would love to utilize you again for any exploration that I may have.

inf1217386

9/24/2016 4:47:01 AM

How the investigation follow current professional forensic practice taught in this course? [1] Collection, Examination , Analysis , Reporting you need little bit explain in here collection - explain , examination -explain etc, Does the investigation identified all possible evidence that can be presented based on given police evidence. the investigation identified all possible evidence that can be presented based on given police evidence such as shoes print little bit more explain 2-3 lines

Write a Review

Basic Computer Science Questions & Answers

  Design an active bandpass filter

design an active bandpass filter that meets the following specifications: center frequency, fc, 50 kHz

  What are all possible values of the ack field

What are the possible sets of sequence numbers inside the sender's window at time t? Justify your answer.What are all possible values of the ACK field in all possible messages currently propagating back to the sender at time t? Justify your answer.

  Esign a four state finite automaton that accepts the words

Design a 4-state finite automaton that accepts the words over {a,b} that end with aba.

  Write a python function celcius fahrenheit

Write a python function celcius_fahrenheit wich takes temperature values from a list and changes them into fahrenheit values.

  Develop an analytic formula for the price of this option

A trigger call option forces the holder to buy a stock S at a price K if the stock price is above H at the time of expiry. Develop an analytic formula for the price of this option in a Black-Scholes world.

  Explain what aspects of the system should be evaluated

What aspects of the system do you think should be evaluated. Are those aspects considered in the evaluation. What is the experimental testbed used. What experiments were performed. Details of experimental results. What aspects of the system were n..

  Who trains computer users in an organization

After a DBMS has been selected, what is the DBA's role in DBMS maintenance?

  The processes and procedural considerations for implementing

For the purpose of this assignment, you will have to recap your previous assignment (in 250 words) and then provide a well-researched and informed report to the CIO.

  Information technology is the process of using computers or

information technology is the process of using computers or computing devices to obtain and handle information and

  How many processing elements are used

how many processing elements are used.

  What compression ratios are you able to achieve

What compression ratios are you able to achieve? See if you can generate data files for which you can achieve 5:1 or 10:1 compression ratios.

  You have been working as a police officer for the

you have been working as a police officer for the centervale police department for two years. you are on your nightly

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd