Reference no: EM132415210
OMA054-6 - Advanced Digital Forensics - Majan University College
Research Paper
Scenario
The rapid increase of personal and industrial computers has been subject to sophisticated cyber-crimes. This has led to development of various laws and standards that define cyber-crimes, digital evidence, search and seizure methodology, evidence recovery and investigation process. This means a forensic expert should adhered to a set of processes/framework to comply with local laws and established precedents; any deviation from the standard process may jeopardize the complete investigation which could result in digital evidence inadmissible in front of court. As digital evidence are flimsy in nature, this requires a proper and thorough forensic investigation process to follow which can safeguard the integrity of evidence, which is critical to prove a case in a court of law. The forensic investigators must follow a repeatable and well documented set of steps such that every iteration of analysis gives the same findings, else the findings of the investigation can be invalidated during the cross examination in a court of law.
Your team is working for an elite digital forensics company in the UK, usually invited to investigate major security incidents involving suspected criminal activities.
To remain competitive, the company has a strategy to produce reviews covering state-of-the-art research in the field of Digital Forensics and Incident Response.
Assignment tasks
You have been given an assignment to produce a literature review paper. The paper should cover recent methods, procedures and tools to investigate a specific technology. To clarify further, the following topics are few examples to what you could consider:
- Hard Disks and File Systems
- Operating Systems Forensics
- Browsers Forensics
- Cloud Forensics e.g. Google Drive and Dropbox
- Electronic emails
- Email clients e.g. MS Outlook and Mozilla Thunderbird
- Mobile Phones
- Android-based devices
- Internet-of-Things (IoT)
- Electronic wearables
- GPS systems
- Wi-Fi data
- Cryptocurrency e.g. Bitcoin
It is also expected that you address any ethical or legal implications related to investigating the technology you have selected. The paper should not exceed 6 pages (excluding references and appendices). The following is an outline of what should be covered:
1. Abstract: a summary of the paper's context, objective, methodology, results and conclusion.
2. Introduction: this is where you can introduce your work and discuss the problem statement e.g. a full justification behind reviewing incident response methods to the technology of your choice.
3. Background: a literature review of related research.[300 words]
4. Methodology: scope and a discussion on procedure, instruments, and data collection methods (etc.) used to accomplish this work. [600 words]
5. Results and discussion: critical discussion and analysis [no more than 800 words]
6. Conclusion: a summary of your key findings and what they mean to the field of Digital Forensics and Incident Response. [300 words]