+1-415-670-9189
info@expertsmind.com
In major task you are assumed as a digital forensics
Course:- Computer Networking
Length: 2000 Words
Reference No.:- EM13371762




Assignment Help
Assignment Help >> Computer Networking

In major task you are assumed as a Digital Forensics Examiner. Considering a real or a hypothetical case you are required to produce a formal report consisting of facts from your findings to your attorney who has retained you. You are free to choose a forensics scenario which can be examination of a storage media (HDD, USB Drive etc), spoofed email, unscrambling bits, revealing information from an image or any other appropriate scenario you can think of.

Rationale

This assessment task covers data validation, e-discovery, steganography, reporting and presenting, and has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to:

  • determine the legal and ethical considerations for investigating and prosecuting digital crimes
  • analyse data on storage media and various file systems
  • collect electronic evidence without compromising the original data;
  • evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab;
  • compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation;
  • prepare and defend reports on the results of an investigation

Answered:-

Verified Expert


Preview Container content

I observed mainly three files in the Pen drive image that was detained from house of the suspect. The files were covered using uncomplicated methods such as removing files (in one of the case), changing the File Allocation Table (FAT) and the main entries of the directory, and also by altering the name in the file. The three files are: 1) a Microsoft Excel spreadsheet, 2) a Microsoft Word document, and 3) a JPEG image file.

The Microsoft Excel file was encrypted and compressed with a Winrar ZIP program, however luckily it was easy to find out the password from the image of the floppy disk image. These three significant files are supposed to give the Police Department the knowledge that they need to have a strong case in opposition to the guilty and his probable assistants. (Fundamental Computer Investigation Guide, 2014)




Put your comment
 
Minimize


Ask Question & Get Answers from Experts
Browse some more (Computer Networking) Materials
What security concerns exist for personal wireless networking? What security measures do you currently have in place? If you are not using wireless networking, list your rea
The assignment is to alter Minix 3 to count sent processes and print it into table saying who sent and who's receiving. He said we require place to store counts and then prin
CIS3202 ROUTING PROTOCOLS AND CONCEPTS What is the external IPv4 address and what is the UDP port number for this Teredo client's traffic - Propose the most efficient and eco
In your network, you could use layer 3 switch, divide the network in two VLANs, one for clients, another one forĀ  server and route between them using routing capabilities.
An IPv4 header bytes in Hex notation is given below: 45 c0 00 38 9b 3e 00 00 ff 01 fd 3b 80 99 90 01 80 99 91 56.Answer the following questions about the header:What is the si
Provide an executive overview for Infrastructure proposal. How will your proposal help ESoft? What are the key aspects of your design? Why should ESoft select your proposal
IT Infrastructure: Define the computing and network platforms. Has the organization adopted industry standards? Is the necessary technical expertise and talent residing inte
XYZ is multi-billion company having 24 departments and each department consisting no more than 750 hosts. Create the IP network based on the requirements