What artefacts will you analyse

Assignment Help Other Subject
Reference no: EM133283208 , Length: word count:2400

Assessment Task Detail and Instructions:

Question 1

There is a company, that regularly does police-based work and stores evidence for these cases. They are being forced to update their policies to conform to new (current) standards. This system must be able to handle different types of evidence (not just static and not just PCs)

Design evidence-based:
• Processing
• Tracking
• Storage system

Using current UK policies and applicable laws. This system will attempt to better the current Corporate/law enforcement systems and suggest better alternatives to current industry issues. This will be displayed using a flow chart to show the logic of the new system and to justify why it is worth using.

A functional requirement of this system is that it can be accessed by staff via a secure login prompt remotely in the building. To find out what current issues there are, research must be performed. How creative can you be to solve this situation?

Question 2
Allegedly, malware has infected a Windows 10 machine of a suspect, who is suspected of holding illegal images and videos.

The defenses "expert" says they are innocent, claiming the PC has lots of viruses on it and it was the cause of this material being on this computer.

How can you prove the suspect did/didn't do it or if it was malware instead? What artefacts will we need to look at to see user interaction/automated responses? What artefacts will you analyse and what tools would you use to do this? Are there specific environments that could be used? If so, how would this be useful to the investigation?

You must show testing and evidence of how malware would infect a machine and the difference between human and automated interaction via malware.

Question 3
A new Malware has been running riot across all UpToDate versions of windows 10. A string of top-rated anti-viruses has not picked anything up.
As a security professional, how might you:
• How do you think the rnalware is avoiding the system?
• Where/how should we look for this malware? Are there stages?
• How do you think you can safely test your theory? please explain in detail

References, must be in Harvard format, use in-text citations and have a complete reference at the bottom of the document.

Attachment:- digital forensics.rar

Reference no: EM133283208

Questions Cloud

What would gerbner predict about bob : Bob is a heavy television viewer who watches TV every night after work, usually from 7 until 11pm. What would Gerbner predict about Bob
Does digital technology cause us to be connected or alone : In your opinion, does digital technology cause us to be connected or alone? The TEDTalk video discusses several negative impacts on communication
How to open a conversation and break into a conversation : How to open a conversation and break into a conversation. Why networking is important; tips to prepare for a networking event
Write a letter to request your company for a new space : Write a letter to request your company for a new space for the office gym. How will you apply the three-step writing process to this situation
What artefacts will you analyse : find out what current issues there are, research must be performed. How creative can you be to solve this situation - What artefacts will you analyse
What enabled him or her to accomplish this : Name a leader from your experience who made you feel more powerful and raised your capabilities. What enabled him or her to accomplish this
Create a powerpoint slide presentation on bands : Create a PowerPoint slide presentation on bands, tribes, chiefdoms, and states. Your PowerPoint presentation must include a title slide and a reference slide
How does it accomplish the functions of family : How does it accomplish the functions of family stories-establishing identity, developing connections through time, and teaching life lessons
How you verify that receiver clearly understand your message : When a message is extremely important to you or to your work, how do you verify that the receiver clearly understands your message

Reviews

Write a Review

Other Subject Questions & Answers

  Values-beliefs-enculturation

Values, Beliefs, and Enculturation - Exploring how and why moral reasoning may differ cross-culturally.

  Main causes or sources of violence

What are some of the main causes or sources of violence? What are the roots of hate and the factors that produce hate crimes?

  ITC571 Emerging Technologies and Innovation Assignment

ITC571 Emerging Technologies and Innovation Assignment Help and Solution - Charles Sturt University, Australia - Assessment Writing Service

  Explain what information were you given to do your analyses

Explain what information were you given to do your analyses? What additional calculations would you recommend to improve this analysis?

  Explain your selection of teaching materials

Explain your selection of teaching materials. How do they cater to or possibly impede the audience's receptivity to the shared health education information?

  What four conditions must an argument meet

What four conditions must an argument meet if we are to accept the worthiness and reasonableness of its conclusions?

  Legal ramifications and violations of any legal subjects

Discuss the legal ramifications and violations of any legal subjects and/or decisions related to any constitutional principles and/or administrative agency.

  Description of monstrosity

What connections do you see between Metamorphosis and Handling the Undead? What are some themes and/or messages that they have in common?

  Discussions of ethics be forbidden

In school sex education, should discussions of ethics be forbidden? Is ethics irrelevant to sexual ethical behavior? Why or why not?

  How does the software facilitate group interaction

In recent years there has been incredible growth in the number of software applications that have been designed to help support project management and project.

  Examine the process of developing a business plan

Write a one page overview of your plan for the startup funds and working capital strategy for your business plan. Remember, you will take feedback from all submitted portions of your plan, revise, and then submit the final business plan in Week 9.

  High quality early childhood programs provide safe and

1. the term developmentally appropriate practice as referred to by the national association for the education of young

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd