Identify potential sources of digital evidence

Assignment Help Computer Engineering
Reference no: EM133511250

Homework

Case Study

Purpose

This homework is intended to help you learn to do the following:

A. Describe their responsibilities related to the handling of data as it pertains to legal, ethical and/or agency auditing issues.
B. Identify potential sources of digital evidence.
C. Examine the role of digital evidence in criminal and civil court cases.

Overview

Based on Chapter 7 in Kremling and Sharp Parker (2018), this homework is designed to examine the prevention approaches for cyberterrorism and other forms of cybercrime.

"What is the role of violence in cyberterrorism? Within the academic definitions of terrorism, over 80% of definitions indicate violence as a necessary element. However, how does violence, and subsequently fear of harm/violence, translate in cyberspace? Furthermore, how would the presence of violence affect the prosecution of cyberterrorists?

Jackman has elaborated on the issues surrounding the conceptualization of violence. She asserts that there are four main issues that have affected society's perception of violence. The first is the idea of physical violence. Often, acts of violence that result in "psychological, material, and social injuries" are ignored. Second, the conceptualization of violence is usually limited to "physical behavior and threats of physical behavior." The third issue is the idea of failure to resist by the victim, and the last is the concentration on interpersonal violence, or the concentration on acts which have "individually identifiable agents and victims and immediate and certain outcomes." In the virtual realm, these four points come under scrutiny when examining the conceptualization of violence as it applies to cyberterrorism.

In most cases of traditional cybercrime, investigations are conducted by banks or antifraud departments, not by traditional law enforcement. However, if an act results in violence, which may be the case in events of cyberterrorism, law enforcement may have to respond to the report." (Kremling & Parker, 2018, p. 133)

Action Items

Browse Chapter 7 in Kremling & Parker (2018).

Write a 500 to 1000 words paper that addresses the following questions:

A. The data preservation stage of the collection/acquisition phase of the digital forensic process involves careful planning on the part of the examiner. Identify and discuss five ways in which the digital evidence can be tainted during the data preservation process. Think of the above case as you respond to this, sharing examples of how the evidence can be tainted.

B. A fellow classmate is confused about the following terms: slack space, clusters, and sectors. The book provided the analogy of a two-car garage to assist readers with these different terms. Create a different analogy to explain these different terms to your classmate.

Reference no: EM133511250

Questions Cloud

How culture and society have changed since its making : analyze two scenes from your chosen film for all the cinematographic and editorial techniques used, as well as give attention to mise en scene, actor
How threats are modeled and assessed in cybersecurity world : In 50 to 100 words, explain in your own words how threats are modeled and assessed in the cybersecurity world.
Explain how this article is or is not enforced in digital : Select any of the 54 articles from the UNCRC. Explain how this article is or is not enforced in digital spaces. Use real examples from the YSM Collection
Work effectively either with your manager or your work team : Discuss at least two specific actions that you have taken to work effectively either with your manager or your work team while working as a HR intern.
Identify potential sources of digital evidence : Identify potential sources of digital evidence. Examine the role of digital evidence in criminal and civil court cases.
Five contemporary unethical activities : Choose five contemporary (organization) unethical activities, and consider how each one might be stopped. Utilize real world and precise examples.
Identify and evaluate a business in its changing market : BSN450 Business Intelligence, Queensland University of Technology - identify and evaluate a Business in its changing market, industry, and PESTEL environment
Analyze television and tv audiences and teenagers and other : Can you please reflect casually on a comparison between the following film clips below: NEW WORLD DISORDER in the context of the theory presented?
Motivation to turn around struggling business unit : How did Cristiano Schena and his team at Caterpillar Brazil use employee engagement and motivation to turn around a struggling business unit?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd