What could be your priority in babas case

Assignment Help Basic Computer Science
Reference no: EM13721863

QUESTION 1:

(a) A financial fraud has happened in BABA Bank. Your services have been retained as forensic examiner to investigate the above case.

While investigating you receive a mail whereby the chairman of the board mentioned, 'it would have been great if we could get the report as soon as possible so that we can take a quick decision'.

i. 'it would have been great if we could get the report as soon as possible so that we can take a quick decision'. As forensic examiner how would you reactto this mail?

ii. While investigating the objective must be clear to you.

What could it be?

iii. What could be your priority in BABA's case?

iv. Give the steps you would be following to investigate this case.

QUESTION 2:

Chain of custody in evidence collection is a very important document when it comes to presenting a computer forensic case in the court of law.

i. Explain the term chain of custody

ii. Why according to you is the chain of custody so important?

iii. In a chain of custody form there are four important information that need to be present.

a) Name the four important points.

b) Design a chain of custody form and fill in appropriately dummy information.

iv. To ensure integrity of evidence collected from a crime scene, there are two main method of doing so. Describe them

QUESTION 3:

(a) Being just employed as junior forensic examiner at SAI computer forensic Ltd, your supervisor told you, 'hey MoonaTambi, we have received a hard disk for examination, I would like you to analyze the areas on this hard disk where we can get hidden information and document your findings'.

Stunned I looked at his face. I said to myself, 'how the hell will i do it'.

Surprisingly the supervisor starts asking:

i. Where data could be hidden? Give two places and explain them in detailed.

ii. What command would you use to take a backup and restore the first sector of the hard disk in Linux?

(b) After that your supervisor has asked the above questions, he realized that you have just been recruited and hence he himself did the analysis. Whenretrieving 'a.ii' he could only get the below information about the hard disk.'MoonaTambi, I have already retrieved the required information, we needthe hard disk size to finalize our report, please calculate the size of it andlet me know', instructed my supervisor with a smile on his face and againadded, 'hope this time I will not have to come and do it. Don't forget it's aWindows machine with FAT 32.'

1. 16,384 cylinders

2. 80 heads

3. 63 sectors per track

(c) Briefly explain the different types of file systems that you as forensic expert would be experiencing.

QUESTION 4:

a)

i. No doubt Air Force Computer Forensics Laboratory must be having a very good Lab setup to perform the tasks mentioned in the case study.

What are the basic configurations that computers Forensics

Lab need to have?

ii. What are the structural design considerations that Air Force Computer Forensics Laboratory must have considered?

b) You have been called to go on a crime scene to see whether there is any digital evidence that must be collected. You noticed a cell phone lying down at the crime scene. You collected the may-be evidence and transport it to your office.

i. Explain the five major points that a forensic examiner needs to observe before embarking on the collection of the cell phone lying down at the crime scene.

ii. Before transporting the evidence to your office, you must have followed certain principle so as not to tamper with the may-be evidence collected. Name the six principles that you followed.

Reference no: EM13721863

Questions Cloud

Calculate future cash flows precisely and obtain exact value : Do you agree or disagree with the following statement given the discussion in this chapter? We can calculate future cash flows precisely and obtain an exact value for the NPV of an investment
What is the NPV of this opportunity : A friend offers to give you 10 payments of $1,500 at annual time periods zero through 10 except year three if you give him $13,500 at year three. What is the NPV of this opportunity if i=20%?
Compute the prospective rate of return before taxes : A project has an initial cost of $150,000 and an estimated salvage value after 13 years of $90,000. Estimated average annual receipts are $27,000. Estimated average annual disbursements are $16,000. Assuming that annual receipts and disbursements wil..
What is return on equal weighted index of these three stocks : Assume there are only three stocks in the market: A, B, and C. At time 0, P(A) = $10, P(B) = $20, and P(C) = $10. At time 1, P(A) = $15, P(B) = $30, P(C) = $5. The number of shares outstanding is 1 million for A, 2 million for B, and 2 million for C...
What could be your priority in babas case : What are the structural design considerations that Air Force Computer Forensics Laboratory must have considered and Design a chain of custody form and fill in appropriately dummy information
Gender discrimination-sex discrimination and violation : Mary filed a suit against Thomas Contracts, alleging that her discharge was due to gender discrimination, sex discrimination, and in violation of Title VII. Analyze and determine what important facts you would need to know in order to ascertain Ma..
What is your net dollar sales projection for this year : Dodge Ball Bearings had sales of 19,000 units at $65 per unit last year. The marketing manager projects a 15 percent increase in unit volume sales this year with a 20 percent price decrease (due to a price reduction by a competitor). Returned merchan..
What is the reward to risk ratios : Stock Y has a beta of 1.8 and an expected return of 18.3 percent. Stock Z has a beta of 1.0 and an expected return of 11.3 percent. If the risk-free rate is 5.6 percent and the market risk premium is 6.6 percent, the reward-to-risk ratios for stocks ..
Putable bonds when interest rate volatility rises : Explain what will happen to an investment company taking positions on putable bonds when interest rate volatility rises? Explain what will happen to an investment company that takes positions in covered calls on stocks when risk aversion levels rise ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Find the binary, octal and hexadecimal representations

Find the binary, octal and hexadecimal representations for each of the following integers (given in base 10).

  Implement a binary search or avl tree

You are to implement a Binary Search or AVL tree containing the details of known criminals.  The criminal object must minimally contain the following information.

  Discuss how automated cybersecurity tools

1. Prevent, Detect, and Respond to Cyber Attacks Discuss how automated cybersecurity tools can support operations personnel as they attempt to prevent, detect, and respond to cyber-attacks against a company's networks and information systems.

  Justify five reasons not consider smartphone to computer

justify at least five reasons why you would or would not consider a smartphone and other cell phones to be computer systems

  Computing effective cpi of computer

Workstation uses a 15-MHZ processor with claimed 10-MIPS rating to execute a given programme mix. Suppose a one-cycle delay for each memory access. Compute effective CPI of this computer ?

  What are the risks associated with the loss of these data

Based on the Ledford (2012) article, what special issues must be considered for corporate data which are not fully digitized? What are the risks associated with the loss of these data? What recovery procedures do you recommend for these situations..

  Create a view that lists the isbn and title for each book

Create a view that lists the ISBN and title for each book in inventory along with the name and phone number of the person to contact if the book needs to be reordered. Name the view REORDERINFO

  Role of systems analysis in success of firms today

What role does systems analysis play in success of firms today? Why? Where would you "place" analysis function to maximize its effectiveness? Support recommendations.

  Use jsp to display current date & time

Fail authentication page will ask user to create the new account if the user does not have an account on the system.

  What are the costs of this massive expansion of information

does this increase in data and computing power always benefit companies that employ these tools? what are the costs of

  Write the code of the main part of the program

Write the code of the main part of the program so that the code only uses the operations enqueue, dequeue, size, and isEmpty. Then, show that your program works with both types of queue implementation { as a linked list and as an array.

  The opportunity to do analysis on the data

Task Background: Graphs and trees provide you with ways to visualize data sets, and the opportunity to do analysis on the data (e.g., shortest path). Knowing the structure of a database enables you to choose a proper algorithm for searching for..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd