CTEC5806 Digital Forensics Assignment

Assignment Help Computer Networking
Reference no: EM132541565 , Length: word count:4000

CTEC5806 Digital Forensics: Principles and Practice DL - De Montfort University

Learning outcome 1: Discuss the principles underpinning digital forensic practice & their importance;

Learning outcome 2: Explain the main stages & the associated procedures of a digital forensic investigation;

Learning outcome 3: Apply the principles & practices of digital forensics to given scenarios;

Learning outcome 4: Analyse forensic images of different formats using a suitable selection of tools;

Learning outcome 5: Prepare a suitable report to present your findings and professional opinion of a given scenario;

Learning outcome 6: Critically evaluate & reflect upon your own learning in relation to digital forensics & your future learning needs to be successful in the field of digital forensics;

Digital Forensics: Principles & Practice Distance Learning Coursework

Digital Forensics Report

Introduction

1. As a Digital Forensics Investigator, you are expected to follow several principles that are a combination of legal, ethical/moral and general guidelines.
• Discuss what these principles are and why they are important.

2. Explain the main stages of a Digital Forensic investigation, giving examples of what tasks, activities and the tools where appropriate, you would complete or use at each stage.
Background

3. Summarise the case you have been asked to investigate in your own words. State the case hypothesis.

4. What will you be looking for? Where will you expect to find such artefacts?

5. What tools are you going to use? How will they help you investigate? How do you use these tools?
Main Body - Biggest Section

6. Analyse the forensic image and illustrate step by step the process of what you did and what you found.

7. Assemble your findings in relation to what you have been asked to investigate.

8. Based on your findings, does the evidence support or refute the case hypothesis? Why? Back up your answer with demonstrable reasons and evidence.

Conclusions

9. What have you learnt during this assignment?

10. If you had to do the assignment again, what would you do differently? Why would this help you?
Appendices - each appendix should be on a separate page and have a title, plus a paragraph to explain what it is showing (except B and C which should just have a title)
A. References;
B. Spreadsheet and written details about their proposed lab setup and field kit;
C. Incident Response plan;
D. E. F. etc. Screenshots you think will support your report that do not fit in the main body of your assignment.

Attachment:- Digital Forensics Report.rar

Reference no: EM132541565

Questions Cloud

Differences between general civil liability-tort liability : Explain differences between general civil liability, tort liability, and vicarious liability, to include potential civil and criminal ramifications
State the defining characteristics of the concept : Describe the authors' purpose for the concept analysis. State the defining characteristics of the concept. Identify antecedents and consequences of the concept.
Evaluate a company performance as a company manager : Managerial Accounting, Analyze and evaluate a company's performance as a company manager as well as an external user of financial information
Explain how criminal justice administrators : Explain how criminal justice administrators, whether in law enforcement, corrections, or the court system, can hold their employees accountable,
CTEC5806 Digital Forensics Assignment : CTEC5806 Digital Forensics: Principles and Practice DL Assignment Help and Solution, De Montfort University - Assessment Writing Service
Crime statistics tell us about crime picture in america : What can crime statistics tell us about the crime picture in America? What four broad categories of criminal defenses does our legal system recognize?
Describe how dorothea orem theory : Explain how Dorothea Orem's theory can be applied to you daily nursing profession? Minimum of 150 words. The response must be typed.
How budgeting process as employed by springfield corporation : How the budgeting process as employed by Springfield Corporation contributes to thefailure to achieve the president's sales and profit targets
Specify when to refer the patient after therapy and why : Specify when to refer the patient after therapy and why? Provide a rationale. Provide patient education. Keep in mind the past medical history of this patient.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd