What could be your priority in babas case

Assignment Help Basic Computer Science
Reference no: EM13721863

QUESTION 1:

(a) A financial fraud has happened in BABA Bank. Your services have been retained as forensic examiner to investigate the above case.

While investigating you receive a mail whereby the chairman of the board mentioned, 'it would have been great if we could get the report as soon as possible so that we can take a quick decision'.

i. 'it would have been great if we could get the report as soon as possible so that we can take a quick decision'. As forensic examiner how would you reactto this mail?

ii. While investigating the objective must be clear to you.

What could it be?

iii. What could be your priority in BABA's case?

iv. Give the steps you would be following to investigate this case.

QUESTION 2:

Chain of custody in evidence collection is a very important document when it comes to presenting a computer forensic case in the court of law.

i. Explain the term chain of custody

ii. Why according to you is the chain of custody so important?

iii. In a chain of custody form there are four important information that need to be present.

a) Name the four important points.

b) Design a chain of custody form and fill in appropriately dummy information.

iv. To ensure integrity of evidence collected from a crime scene, there are two main method of doing so. Describe them

QUESTION 3:

(a) Being just employed as junior forensic examiner at SAI computer forensic Ltd, your supervisor told you, 'hey MoonaTambi, we have received a hard disk for examination, I would like you to analyze the areas on this hard disk where we can get hidden information and document your findings'.

Stunned I looked at his face. I said to myself, 'how the hell will i do it'.

Surprisingly the supervisor starts asking:

i. Where data could be hidden? Give two places and explain them in detailed.

ii. What command would you use to take a backup and restore the first sector of the hard disk in Linux?

(b) After that your supervisor has asked the above questions, he realized that you have just been recruited and hence he himself did the analysis. Whenretrieving 'a.ii' he could only get the below information about the hard disk.'MoonaTambi, I have already retrieved the required information, we needthe hard disk size to finalize our report, please calculate the size of it andlet me know', instructed my supervisor with a smile on his face and againadded, 'hope this time I will not have to come and do it. Don't forget it's aWindows machine with FAT 32.'

1. 16,384 cylinders

2. 80 heads

3. 63 sectors per track

(c) Briefly explain the different types of file systems that you as forensic expert would be experiencing.

QUESTION 4:

a)

i. No doubt Air Force Computer Forensics Laboratory must be having a very good Lab setup to perform the tasks mentioned in the case study.

What are the basic configurations that computers Forensics

Lab need to have?

ii. What are the structural design considerations that Air Force Computer Forensics Laboratory must have considered?

b) You have been called to go on a crime scene to see whether there is any digital evidence that must be collected. You noticed a cell phone lying down at the crime scene. You collected the may-be evidence and transport it to your office.

i. Explain the five major points that a forensic examiner needs to observe before embarking on the collection of the cell phone lying down at the crime scene.

ii. Before transporting the evidence to your office, you must have followed certain principle so as not to tamper with the may-be evidence collected. Name the six principles that you followed.

Reference no: EM13721863

Questions Cloud

Calculate future cash flows precisely and obtain exact value : Do you agree or disagree with the following statement given the discussion in this chapter? We can calculate future cash flows precisely and obtain an exact value for the NPV of an investment
What is the NPV of this opportunity : A friend offers to give you 10 payments of $1,500 at annual time periods zero through 10 except year three if you give him $13,500 at year three. What is the NPV of this opportunity if i=20%?
Compute the prospective rate of return before taxes : A project has an initial cost of $150,000 and an estimated salvage value after 13 years of $90,000. Estimated average annual receipts are $27,000. Estimated average annual disbursements are $16,000. Assuming that annual receipts and disbursements wil..
What is return on equal weighted index of these three stocks : Assume there are only three stocks in the market: A, B, and C. At time 0, P(A) = $10, P(B) = $20, and P(C) = $10. At time 1, P(A) = $15, P(B) = $30, P(C) = $5. The number of shares outstanding is 1 million for A, 2 million for B, and 2 million for C...
What could be your priority in babas case : What are the structural design considerations that Air Force Computer Forensics Laboratory must have considered and Design a chain of custody form and fill in appropriately dummy information
Gender discrimination-sex discrimination and violation : Mary filed a suit against Thomas Contracts, alleging that her discharge was due to gender discrimination, sex discrimination, and in violation of Title VII. Analyze and determine what important facts you would need to know in order to ascertain Ma..
What is your net dollar sales projection for this year : Dodge Ball Bearings had sales of 19,000 units at $65 per unit last year. The marketing manager projects a 15 percent increase in unit volume sales this year with a 20 percent price decrease (due to a price reduction by a competitor). Returned merchan..
What is the reward to risk ratios : Stock Y has a beta of 1.8 and an expected return of 18.3 percent. Stock Z has a beta of 1.0 and an expected return of 11.3 percent. If the risk-free rate is 5.6 percent and the market risk premium is 6.6 percent, the reward-to-risk ratios for stocks ..
Putable bonds when interest rate volatility rises : Explain what will happen to an investment company taking positions on putable bonds when interest rate volatility rises? Explain what will happen to an investment company that takes positions in covered calls on stocks when risk aversion levels rise ..

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Emerging technology

Emerging Technology

  Smallest exponent that can be stored using this 16 bit stand

storing number in a string of 16 bits, the first bit is used for the sign of the number, and the next 5 bits store the exponent plus the bias, and the remaining 10 bits store the mantissa.  The bias is 15. What is the smallest exponent that can be st..

  Find a recurrence relations

Find a recurrence relations and initial conditions for the number of bit strings of length n that do not contain three consecutive zeros . please explain full

  Design a finite state machine similar to a 3 bit counter

design a finite state machine similar to a 3 bit counter. in this case you will have 3 bits of state which you can think of as a 3 bit unsigned number, but this time the counter must count by 3s--the sequence it goes through should be 0, 3, 6, 1, ..

  Describe the data normalization process

Describe the data normalization process including its specific steps. Why is it referred to as a "decomposition process?"

  Minimum-spanning-tree problem for lp formulation

The minimum-spanning-tree problem is to find an acyclic subset T + E that connects all of the vertices and whose total weight c(T ) = ce is minimized. Write down the dual of your LP formulation.

  Find max score and display

Write a program using functions to do the following tasks.

  Data storage question

It is true that computer storage is getting bigger and faster, discuss how does that help us? As we start saving more and more data, it is really possible for the average person to keep all of the data organized?

  What is the name of the keyboard

research the Internet and find out all that you can about the keyboard layout that you are using. Then write me a one page essay on what you found.

  Ipo chart and pseudocode

Start by analyzing the problem; use an IPO chart and pseudocode (or flowchart) to brainstorm the logic prior to start coding. Using Visual Studio code and test your program according to your pseudocode solution. Once you are satisfied with your progr..

  Simulate the game of yahtzee

After displaying the possible scores for each category, ask the user which score to keep (it might not be the largest). Once the box is filled, it cannot be scored again.

  What is the total efficiency of the protocol

Consider two nodes A and B uses the slotted ALOHA protocol to contend for a channel. Suppose node pA and pB are A and B's retransmission probabilities. Provide a formula for node A's average throughput. What is the total efficiency of the protocol..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd