Forensic investigation case study

Assignment Help Business Law and Ethics
Reference no: EM131063289

Forensic Investigation Case Study

Background

Linda is suspected of accessing and possessing digital content pertaining to ‘clowns', and being in possession of, and using encryption software. Accessing, possessing, or distributing of any digital content pertain to ‘clowns' is considered illegal and may carry severe penalties. Private communication, including the use of encryption software or techniques is strictly forbidden in the country.

You are a consultant who specialises in Digital Forensic investigations. You have been assigned the task of examining an image of Linda'slaptop which was seized with the appropriate warrants and imaged using forensically sound practices.Unfortunately, the junior investigator who obtained a ‘forensic image' of Linda's laptop only performed a logical acquisition. To make matters worse, the junior investigator then went on to forensically wipe Linda's hard drive. The logical acquisition was undertaken in a forensically sound manner and the md5 value is "5046fdcc23d05e7535801353bf832a7d".

At this point in time it is unknown if Linda was also distributing the digital content of ‘clowns'. Linda denies accessing and possessing any content pertaining to the ‘clowns', or possessing and using encryption software. Linda has stated that she believes she is simply the victim of cyber crime, and doesn't understand why anyone would want to target her. Linda claims that she may have been targeted after a recent online interaction with an unknown individual who was supposed to help secure her computer.

Task

Your task is to investigate the supplied image using appropriate tools and forensic process and to develop and submit a written report on your findings. You may use any tools to undertake the investigation but you must justify all of your actions!

Report Structure

Your reportmust be structured as follows:
• Cover Page

• Table of Contents

• Overview of Tasks
o What were you looking for?
o How did you approach the investigation?
o What did you do?
o What did you find?
o In YOUR expert opinion what is the outcome of the investigation?

• Issue #1 Presentation of content relating to offence

• Issue #2 Identification

• Issue #3 Intent

• Issue #4 Quantity of Files

• Issue #5 Installed Software

• Appendix A
o Running Sheet

-This section should contain a well-structured running sheet (in table form) showing what do you did, how you did it, and what was the outcome. This should be very detailed and show clear use of the forensic process.
-The process must be detailed enough so that the procedures can be repeated and results reproduced.
-You must clearly state the date/time you undertook the action in the running sheet.

• Appendix B

o Timeline of events (chronological order of events on Linda's laptop).

Reference no: EM131063289

Questions Cloud

The vice-president for human resources in learning : 1. Sandra Pilsden, the Vice-President for Human Resources in Learning, Inc. was concerned about a recent memo she had recently received from the CEO's office regarding the possibility of outsourcing the payroll function to Salary Experts, a growin..
Denote the linear function ofz : Write the same relationship whend51, where you should usef1(z) on the left-hand side to denote the linear function ofz
Why critical thinking is important : Last week, you were asked to consider which stage of critical thinking you felt that you were in. This week, building off last week's assignment and lecture, we know that employers are wanting more critical thinking from their employees.
Find outstanding load balance after five years of payment : How much should you pay monthly for a loan of $1,000,000 for 15 years at a rate of 9% per annual. Find Monthly load payment. How much is the outsanding loan balance after 5 years of payment? Find outstanding load balance after 5 years of payment.
Forensic investigation case study : Forensic Investigation Case Study - Linda is suspected of accessing and possessing digital content pertaining to ‘clowns', and being in possession of, and using encryption software
Closing case negotiating salaries on the web : Once upon a time, negotiations about individual wages and salaries were typically handled in a meeting between the employee and his or her manager.
How many hours will it take thebullock cart to travel 20 km : A bullock cart can travel at the rate of 4 kmph for the first two hours of a trip. After the firsttwo hours, the bullock cart's speed drops to 3 kmph. How many hours will it take thebullock cart to travel 20 km?
What is the implied overall capitalization rate : A property is being appraised assuming NOI will be $250,000 per year over the 25-year remaining economic life of the building. Using the sales comparison approach, land is found to be worth $500,000 today. What is the total property value? What is th..
Impact of transferring demand information : 1. What is the impact of transferring demand information across the supply chain? 2. How can supply chains meet the conflicting goals of different partners and facilities?

Reviews

Write a Review

Business Law and Ethics Questions & Answers

  Define restorative justice

In your own words, define restorative justice, and provide an example of a restorative justice theory (or theories) in use by identifying a public or private program utilizing principles of restorative justice

  Describe each of the five goals of sentencing create a

describe each of the five goals of sentencing create a list of the favorable and unfavorable consequences focusing on

  Key issues and obligations as moral challenges

What are the key issues and obligations as moral challenges including associated risks, dangers, uncertaintles and/or opportunities and what are the competing moral claims and obligations and how will you assess and prioritize them?

  Differences between the treatment and punishment concepts

Explain the differences between the treatment and punishment concepts. Build the case for which one you believe has the stronger position based on your research and the crime or criminal justice issue you selected to study

  Describe counterterrorism actions

Identify the threats that funding strategies pose to legitimate businesses. Describe counterterrorism actions taken that affect the terrorist funding strategy

  Piecemeal structure and organisation

'One major problem with the corporate regulatory bodies in Australia relates to their piecemeal structure and organisation.' Should Australia's regulatory and administrative bodies be further harmonised to create one 'super' regulator for design a..

  Identify threats or vulnerabilities presented in the video

Introduce the term cybercrime and why IT professionals should be concerned about it. Identify the threats/vulnerabilities presented in the video. Discuss if the threats controllable

  Utilizing the gcu elibrary collection research the plea

1.utilizing the gcu elibrary collection research the plea bargaining process. write a positional essay of 600-800

  Has big arrow or broderick violated any laws in firing beth

A few months later, Beth is fired by Broderick. What can Beth do about her firing? Has Big Arrow or Broderick violated any laws in firing Beth? If so, which laws were violated

  Interest payable annually

A BOND WITH CURRENT YIELD=10.75% ON ISSUE DATE, MATURING IN 5 YEARS, IRR=8.57%, INTEREST PAYABLE ANNUALLY, INTEREST PAYABLE SEMI-ANNUALLY

  How is undue influence different from duress

Which of the following refers to agreements in which parties pay consideration for the chance, or opportunity, to obtain an amount of money or property? How is undue influence different from duress

  In intellectual property and the information age richard t

in intellectual property and the information age richard t. de george begins by examining the case of napster and the

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd