In major task you are assumed as a digital forensics
Course:- Computer Networking
Length: 2000 Words
Reference No.:- EM13371762

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Computer Networking

In major task you are assumed as a Digital Forensics Examiner. Considering a real or a hypothetical case you are required to produce a formal report consisting of facts from your findings to your attorney who has retained you. You are free to choose a forensics scenario which can be examination of a storage media (HDD, USB Drive etc), spoofed email, unscrambling bits, revealing information from an image or any other appropriate scenario you can think of.


This assessment task covers data validation, e-discovery, steganography, reporting and presenting, and has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to:

  • determine the legal and ethical considerations for investigating and prosecuting digital crimes
  • analyse data on storage media and various file systems
  • collect electronic evidence without compromising the original data;
  • evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab;
  • compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation;
  • prepare and defend reports on the results of an investigation


Verified Expert

Preview Container content

I observed mainly three files in the Pen drive image that was detained from house of the suspect. The files were covered using uncomplicated methods such as removing files (in one of the case), changing the File Allocation Table (FAT) and the main entries of the directory, and also by altering the name in the file. The three files are: 1) a Microsoft Excel spreadsheet, 2) a Microsoft Word document, and 3) a JPEG image file.

The Microsoft Excel file was encrypted and compressed with a Winrar ZIP program, however luckily it was easy to find out the password from the image of the floppy disk image. These three significant files are supposed to give the Police Department the knowledge that they need to have a strong case in opposition to the guilty and his probable assistants. (Fundamental Computer Investigation Guide, 2014)

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Computer Networking) Materials
You want deny any ICMP traffic to the subnet by adding an entry to existing access list 105. This existing ACL ends with a "permit all" entry, so you will ad
Determine the data point that has the largest distance to the centre, and determine the data point that has the largest angle. Name the modulation method(s) used in this const
Configure the backup route through the Serial 0/1/0 interface with 25 AD. Explain and analysis the routing process of three routers in the case of ping from PC-A to Outside Ho
Suppose the role of the IT consultant to new nonprofit organization, Free Flu, which provides flu shots to elderly. Organization requires a domain name. Use Internet resourc
(15%) Allen FINALLY has been able to secure broadband service to his home in a remote area of the country via newly installed telephone lines. He had a powerful desktop. But h
Create a program that estimates the radio signal strength (%) - a range - for computers stationed at different distances (ft) from the AP. In your design use 5 distance zone
Describe and discuss data networking standards, recalling names, and order of the seven layers of the OSI reference model and the TCP/IP protocol stack. Discuss the differen
Display the weight matrix for the network. Using Dykstra's algorithm, calculate a route from node S to node D on the network as displayed in Fig. 1. Show each step of the al