Reference no: EM132722811
Assignment: For the final project, you will be conducting a forensics investigation using one of the following items:
1. A smartphone
2. A network (ideally, a wireless network)
You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.
You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:
Week 7 - Prepare an investigative report of the forensics data capture conducted using the tool selected for this purpose. The paper should provide the following information:
• Executive Summary of your investigation, including a description of the device or systems and the tool used for the forensics analysis
• Step-by-step description you used to gather data for analysis
• Report on the information that was obtainable from the device
• Graphics evidence that you conducted the forensics data gathering and analysis
The paper should be in a form that would be used for reporting to a court or a law enforcement agency. Be sure to provide graphics evidence of your forensics investigation effort (Screenshots, reports, etc.). References should be in APA format.
Develop a measurable research framework
: Develop a measurable research framework of hos computer fraud and Abuse Act (CFAA) can play a role during the forensic investigation and impact on conclusive.
|
Proper fact finding, analysis and evaluation
: Research is much concerned with proper fact finding, analysis and evaluation - Do you agree with this statement? Give reasons in support of your answer
|
Explain the prohibit guessable passwords
: An IT Security consultant has made three primary recommendations regarding passwords: Prohibit guessable passwords, such as common names, real words, numbers.
|
Derive the mass energy relationship eqution
: Derive the mass energy relationship eqution
|
Conducting a forensics investigation using given details
: You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally.
|
Describe how the database supports the selected topic
: Please select one of the following topics, research their current background, analyze the purpose of requirements, and design/implement a new information system
|
Demonstrate a connection to your current work environment
: Provide a reflection of at least 500 words (or 2 pages double spaced) of how the knowledge, skills, or theories of cryptography course have been applied.
|
What is the mean value for the maths and english score
: QUESTION 2 What is the mean value for the Maths and English score for each program and Test the assumption that covariance matrices are statistically similar
|
How easily would an individual be able to find a logic error
: There is a trend in programming to make coding easier and more automatic. Some welcome this trend, but others are concerned about future programmers.
|