OMA054-6 Advanced Digital Forensics Assignment

Assignment Help Computer Engineering
Reference no: EM132415210

OMA054-6 - Advanced Digital Forensics - Majan University College

Research Paper

Scenario

The rapid increase of personal and industrial computers has been subject to sophisticated cyber-crimes. This has led to development of various laws and standards that define cyber-crimes, digital evidence, search and seizure methodology, evidence recovery and investigation process. This means a forensic expert should adhered to a set of processes/framework to comply with local laws and established precedents; any deviation from the standard process may jeopardize the complete investigation which could result in digital evidence inadmissible in front of court. As digital evidence are flimsy in nature, this requires a proper and thorough forensic investigation process to follow which can safeguard the integrity of evidence, which is critical to prove a case in a court of law. The forensic investigators must follow a repeatable and well documented set of steps such that every iteration of analysis gives the same findings, else the findings of the investigation can be invalidated during the cross examination in a court of law.

Your team is working for an elite digital forensics company in the UK, usually invited to investigate major security incidents involving suspected criminal activities.

To remain competitive, the company has a strategy to produce reviews covering state-of-the-art research in the field of Digital Forensics and Incident Response.

Assignment tasks

You have been given an assignment to produce a literature review paper. The paper should cover recent methods, procedures and tools to investigate a specific technology. To clarify further, the following topics are few examples to what you could consider:

- Hard Disks and File Systems
- Operating Systems Forensics
- Browsers Forensics
- Cloud Forensics e.g. Google Drive and Dropbox
- Electronic emails
- Email clients e.g. MS Outlook and Mozilla Thunderbird
- Mobile Phones
- Android-based devices
- Internet-of-Things (IoT)
- Electronic wearables
- GPS systems
- Wi-Fi data
- Cryptocurrency e.g. Bitcoin

It is also expected that you address any ethical or legal implications related to investigating the technology you have selected. The paper should not exceed 6 pages (excluding references and appendices). The following is an outline of what should be covered:

1. Abstract: a summary of the paper's context, objective, methodology, results and conclusion.

2. Introduction: this is where you can introduce your work and discuss the problem statement e.g. a full justification behind reviewing incident response methods to the technology of your choice.

3. Background: a literature review of related research.[300 words]

4. Methodology: scope and a discussion on procedure, instruments, and data collection methods (etc.) used to accomplish this work. [600 words]

5. Results and discussion: critical discussion and analysis [no more than 800 words]

6. Conclusion: a summary of your key findings and what they mean to the field of Digital Forensics and Incident Response. [300 words]

Reference no: EM132415210

Questions Cloud

Analyze the information systems risk management plans : Analyze the Information Systems Risk Management Plans. Describe how their Information Systems Risk Management plans do or should look
Calculate the percent of inflation or deflation : Last year, a turkey costs $11.88, this year the same turkey costs $12.24. Calculate the percent of inflation or deflation? (Show work.)
Remember the government spending multiplier : By how much in Aggregate Demand is the stimulus of 2009 expected to generate? Remember the Government spending multiplier is 1/1-mpc * G
Relevance of incident responses in cybersecurity program : Your weekly reading discusses "response" and the relevance of incident responses in a Cybersecurity program.
OMA054-6 Advanced Digital Forensics Assignment : OMA054-6 Advanced Digital Forensics Assignment Help and Solution, Majan University College - Assessment Writing Service - produce a literature review paper
What is the monetary transmission mechanism : What is the monetary transmission mechanism? Explain how it works in the case of a decrease in supply of money in an open economy.
Gdp on purchasing power parity : What is the per capita real GDP on Purchasing Power Parity basis in China? What is the trend in this variable?
Describe the challenges of criminal justice organizations : Write a 1,400- to 1,750-word paper on the goals, objectives, and challenges of criminal justice organizations and private security entities.
Explain delinquent behavior among juveniles : The course materials present a number of criminological, sociological, and developmental theories that endeavor to explain delinquent behavior among juveniles.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd