Reference no: EM131418702
Cyber Crime and Digital Investigation Assignment
During the preparation phase, the investigative team discussed that it might not be possible to shut down one of the workstations and get a cold image of the hard drive.
Someone suggested that a live image analysis be performed, but not everyone was familiar with why this would work and any benefits associated with this technique.
• Describe a live image analysis and what information may be retrieved versus a situation where the system is shut down.
• Describe the types of information that you would be required to include in your report for a live image analysis.
• During the analysis phase, it was determined that the following programs were used:
o Windows 7 Operating System
o Internet Explorer
o Outlook e-mail
o Photoshop
o Office
Describe the exact investigative techniques that you would use to analyze the users' information, habits, and history for each program. Explain the reasons for your selected techniques.
The level of detail does not need to be at the bit level, but there is enough information to talk about directories and objects that should be reviewed for each.
Remember to address forensic evidence you might find relating to an employee's use of these programs, not how the program itself operates. You should be making references to specific directories, files, file types, registry entries and log files which point to sources of forensic evidence.
The 12-16 slide PowerPoint presentation should include the following:
• Title Slide (1)
• Topics of Discussion Slide (1)
• Windows 7 Operating System (3 slides)
• Internet Explorer (3 slides)
• Outlook e-mail (2 slides)
• Photoshop (2 slides)
• Office (3 slides)
• References Slide (1)
Impact the quality of a decision or future decisions
: The problem-solving process involves seven steps (the first five of which are part of the decision-making process):What type of errors might occur at the various steps of the process that can impact the quality of a decision or future decisions? Can ..
|
What is activity-based costing
: In the evaluation of alternative design configurations, an individual cost profile is developed for each. These individual profiles must be reviewed and evaluated in terms of some form of "equivalence." Briefly describe the steps you would follow ..
|
Behaviors consistent with creating high performing team
: Research suggests that teams tend to develop through a series of four stages; forming, norming, storming, and performing. Managers skilled in developing teams understand how to diagnose where a team is in its development, and encourage behaviors cons..
|
What are the four latent variables examined in given study
: What manifest variables were used to operationalize social disorder? Based on these manifest variables, explain in your own words what you think the authors mean by "social disorder."
|
Describe the types of information that you would be required
: Describe a live image analysis and what information may be retrieved versus a situation where the system is shut down. Describe the types of information that you would be required to include in your report for a live image analysis.
|
What risks does one run if a needs analysis is not conducted
: Explain the purpose of a needs analysis and the necessity of conducting one before implementing training. What risks does one run if a needs analysis is not conducted before training is implemented? In addition, talk about a needs analysis within ..
|
Prepare an investigation plan for your investigation
: Prepare an investigation plan for your investigation into the case study using the template provided - Identify and describe the facilitation of proof for each element and developed your plan and elementised the offence for your investigation.
|
Explain ways that automation can improve our sa productivity
: Explain several ways that automation can improve our SA productivity. What two common SSA tasks might benefit most from automation and how can we apply it to them.
|
Where is system engineering accomplished
: Refer to Figure 7.1. Where is system engineering accomplished? Who is responsible for the accomplishment of system engineering functions? Identify some of the major concerns associated with the organizational relationships shown in the figure.
|