Forensics investigation trainee at two way communications

Assignment Help Basic Computer Science
Reference no: EM131349912

In this course, you will assume the role of a forensics investigation trainee at Two Way Communications, a telecommunications company. You will conclude your training period by completing projects supporting each of the three forensics specialists, each of whom work on different parts of the investigation process. You will work on this project in phases, beginning in Unit 1 and building on it with each subsequent unit.

Read the following project information, which will give you all the details you need to get started.

  • There has been a report of an employee using unauthorized software licenses that may have been illegally downloaded from the Internet. This is a violation of the company's Internet Usage Policy and an ethics violation. In order to investigate this matter, one of the forensics specialists asks you to write a 1-2 page report describing the following.
  • What tools you will you use to gather evidence? What kind of evidence will you need?
  • Will you use a single evidence form or a multi-evidence form to complete intake of this evidence? Identify the form you will need and prepare the following information: nature of case, location where evidence was obtained, description of evidence, and vendor name. Then describe how you would secure the evidence.
  • You have isolated the illegally downloaded software to a legacy operating system that is no longer publicly in use, but no one on the team is familiar enough with this system to begin investigations. List resources you would use to take next steps in this investigation.

Submit the assignment as a Microsoft Word document using the template provided to the Unit 1 Part 3 Dropbox.

Reference no: EM131349912

Questions Cloud

Explore what it means to be an ethical accountant : Based on the readings and your own experiences, you will explore what it means to be an "ethical accountant." What are some of the characteristics of an ethical accountant?
Product evaluation schedule diagram : Que.1 Draw the product evaluation schedule diagram and briefly describe the importance of product evaluation schedule in software life cycle in your own words.
Preparation required for an effective virtual meeting : Write an essay that describes the preparation required for an effective virtual meeting. What are the key things that a facilitator need to do to keep the meeting on track. Your essay must also address V-meeting checklist, V-meeting agenda, Sched..
Discusses the ramifications if pete accepts henrys proposal : Write a paper that discusses the ramifications if Pete accepts Henry's proposal. What laws may be violated and/or ethical considerations should be taken into account?
Forensics investigation trainee at two way communications : In this course, you will assume the role of a forensics investigation trainee at Two Way Communications, a telecommunications company. You will conclude your training period by completing projects supporting each of the three forensics specialists..
Find the maximum-likelihood estimator : Find the maximum-likelihood estimator for estimating amplitude only with data treated as a random nuisance parameter and averaged out. How do these three estimators compare?
Are there elements of value chain that pyramid may leverage : Are there elements of the value chain that Pyramid may leverage in order to optimize target costing for a mature customer relationship?
Employer computer workstation : Should employees have the right to the expectation of privacy while using an employer's computer workstation? Why or why not? How far should an employer be able to take their investigation of off-work but online habits of employees? Should off-wor..
Explain advantages of business owner with minimal accounting : Explain the major advantages of a business owner with minimal accounting experience maintaining the company's book. Then explain the disadvantages.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Sequential and selection processing control structure

Sequential and Selection Processing Control Structure

  Information security planning

Final Research PaperYou will prepare a research paper that is 4 - 5 pages in length (not including the title and reference pages). Your research should demonstrate thoughtful consideration of the comprehensive ideas and concepts that have been pre..

  Develop the tourism industry at sterling bay

Assume that tourism has been selected as the preferred industry to be developed. What type of tourism should be adopted? Describe examples of F&B, accommodation, transportation, attractions and events that suit the approach that you have recommend..

  Explain whether this policy a good idea

Hughes Paint is considering enacting a policy that will forbid all but security analysts to posses and use security tools such as scanning tools, password crackers, disassemblers, sniffers, and code analyzers.

  Compute more than a lower-level programming language

Can a higher-level programming language instruct a computer to compute more than a lower-level programming language?

  Development of a new software development

Provide a discussion on the various object oriented tools and their purpose, youshould concentrate on the UML group of tools - these might prove useful in the development of a new software development which is to be developed for the organisation ..

  Application-information security laws

You probably obey most laws; however, you may not view some seriously enough to obey them. For example, you might be someone who is comfortable going faster than the posted speed limit. Is it all right to ignore some laws because they do not seem ..

  Manager of a business that cleans airliners

You are the manager of a business that cleans airliners. You are contracted by airlines to perform quick cleanups on planes between flights as well as more extensive cleanings while planes are parked overnight. The airline industry is facing finan..

  What is the annual increment

A man starts his job with a certain monthly salary and a fixed increment every year. his salary will be Rs 11000 after 2 years and Rs 14000 after 4 years. What is his starting salary and what is the annual increment?

  Litigating divorce and insurance fraud cases

Should congress enact laws requiring ISP's to formally track their customers' activities in an attempt to aid police investigating crimes, attorneys litigating divorce and insurance fraud cases, and the entertainment industry in locating illegally..

  Why do you need to run both zenmap gui and nessus

Why do you need to run both Zenmap GUI and Nessus to perform the first three steps of the hacking process

  Write a program that measures the bandwidth provided by pipe

After all data has been read, the parent should print the elapsed time required and the bandwidth (bytes transferred per second). Measure the bandwidth for different data block sizes

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd