Write a report to your supervisor

Assignment Help Computer Networking
Reference no: EM131290877 , Length: 4

Project Descriptions

Project

For the purpose of this Project, you are still the InfoSec Specialist for the Greenwood Company. Consider this project a continuation of the work you performed in Project 1. In this portion of the investigation, you are ONLY collecting the physical evidence. You will NOT be handling the digital data during this stage of the investigation. (This step will be discussed in the Final Project.) You should limit your "care and handling" of each piece of evidence to the physical handling of the digital container.

With the scenario in mind, you are to write a report to your supervisor, thoroughly providing a response to the following questions (in paragraph format, properly citing outside research, where appropriate):

Part 1: Overview/Case Summary

1. Write a short summary of the incident that has occurred and establish what permissions/authorities you have before you search Mr. McBride's former Company work area.

Physical Evidence Acquisition:

2. Look at the photo of Mr. McBride's work area.

(See file attachment Work_Area.jpg) Identify three (3) potential items of digital evidence you see in the photo.

- For EACH item of digital evidence you identified, describe in first person what steps you took to collect the items (with emphasis on your care and handling of that item consistent with digital forensic best practices described in the module content/weekly readings). You should documenting these steps in a detailed way will mitigate questions, concerns, or a basic lack of information that will call your processes into question in court.

- For each item, explain what potential use that item would be to your investigation (e.g., what type of data that item might hold.)

3. Look at the photo of Mr. McBride's work area. (See file attachment Work_Area.jpg) Identify three (3) potential items of non-digital evidence you see in the photo.

- For EACH item of non-digital evidence you identified, describe how you would collected each item, within standards and best practices described in your module content/weekly readings.

- For each item, explain what potential use that item would be to your investigation (e.g., what type of data that item might hold.)

4. Detail in your report how you secured the collection evidence after removing it from the original scene (the desk) and prior to sending it for analysis. Describe the security procedures in place as well as any environmental protections (specific to computer/digital devices) in place within the storage area.

5. Look at the Evidence Custody Document (See file attachment Evidence Custody Document.doc) and item photographs (Items-seized (pics).pptx) Read the Evidence Custody Document prepared by one of your co-workers, in which he is attempting to document the seizure the three items pictured in the accompanying photos. Did your co-worker adequately describe each item? What could you add to the descriptions, and for which items (based on what you see in the photos), to make them more complete and serve as an example to your co-worker of what they SHOULD look like?

Project Requirements:

- Paper should be submitted as a basic report memo HOWEVER, an APA-formatted title page, in-text citations, and reference page is required.

(See the following link for memo writing guidelines: https://www.umuc.edu/writingcenter/writingresources/effective_memos.cfm)

- Each questions should be answered with a minimum of 1-2 paragraphs, so do your research, be specific, be detailed, and demonstrate your knowledge;

- Answers to the above questions should be submitted in a single document (.DOC/.DOCX, .RTF, or .PDF), with answers separated so as to make it clear which question is being answered;

- The submission should have a cover page, including course number, course title, title of paper, student's name, date of submission, and submit to the assignments folder.

- Format: 12-point font, double-space, one-inch margins;

- It is mandatory that you do some research, and utilize outside resources! References page: APA citation style

Reference no: EM131290877

Questions Cloud

Determine the implied repo rate on the contract : Determine the implied repo rate on the contract. Interpret your result. Note that you will need to determine the accrued interest. Assume delivery on June 1
Encountered learning objectives : Describe a scenario in which you encountered learning objectives that were unclear or not aligned with the broader outcomes or goals. How did this lack of clarity and/or alignment impact the learning process?
Conduct a secondary data search on key variables : Conduct a secondary data search on key variables that would allow you to make a logical decision on which area is best suited for your proposed coffee shop.
Calculate the first net payment and identify which party : Calculate the first net payment and identify which party, the party paying fixed or the party paying floating, pays
Write a report to your supervisor : Write a short summary of the incident that has occurred and establish what permissions/authorities you have before you search Mr. McBride's former Company work area.
Quantitative and qualitative research methods : What are the major differences between quantitative and qualitative research methods? What skills must a researcher have to develop and implement each type of design?
Explain what these quotes mean : Assuming the five-year Treasury rate is 7.60 percent, explain what these quotes mean.
How to combine a currency swap paying swiss francs : Show how to combine a currency swap paying Swiss francs at a floating rate and receiving Japanese yen at a floating rate with another currency swap to obtain a plain vanilla swap paying Swiss francs at a floating rate and receiving Swiss francs at..
Role of a swap dealer and present three possible equity swap : Assume the role of a swap dealer and present three possible equity swap proposals, which are based on the three different types of cash flows that could be paid against payment of the return on the stock.

Reviews

len1290877

11/26/2016 12:44:42 AM

1 1 1 -------------- Voice recorder, small, silver, Olympus. Western Digital, 1TB, silver and black with a green label, roughly rectangular, affixed with a torn sticker on the front. Thumb drive, USB, PNY-brand, 64GB in size, unknown serial number, grey and black in color, approximately 1” x 2.5” x 0.5”, metal and plastic-type construction, printed with “PNY… 64GB”, with small hole on the side (which appears to be for a lanyard. --------------------------///LAST ITEM///---------------------------------------------------------------

Write a Review

Computer Networking Questions & Answers

  1consider a desktop publishing system used to produce

1.consider a desktop publishing system used to produce documents for various organizations. give an example in which

  Network engineer for abc company

You are the network engineer for ABC company. Business is booming, a lot of new staff has been hired recently, and the company is running out of office space. A new larger building has been purchased and you have been asked to design the network f..

  Designing a client - server architecture

When designing a client - server architecture, there are generally two alternatives: thin and thick clients. Describe each alternative and give one major advantage and one major disadvantage to each of the two approaches.

  Network design document addressing each of acme requirements

Create a 700- to 1,050-word network design document addressing each of Acme's requirements with your recommendations

  Part-11 generalize the basic approaches we used for making

part-11 generalize the basic approaches we used for making the best out of best effort service for real-time

  How internet works for organization-s office administration

What would be needed along with precautionary measures, and an overview of how the Internet works for the organization's office administration.

  Upgrade the workstation''s adapter cards to support 100 mbps.

You are to come up with a solution to support the high bandwidth applications and growth potential of this company.

  Part- aduring the labs we used the national vulnerability

part- aduring the labs we used the national vulnerability database. select a recent vulnerability from that database

  Difference between server-side and client-side scripting?

difference between server-side and client-side scripting?

  Using microsofts threat analysis amp modelling tool create

using microsofts threat analysis amp modelling tool create a threat model for your own blog setup. additionally explain

  Ways to secure a wlan

Explain in 200 to 300 words at least two different ways to secure a WLAN. What are the ramifications if a WLAN is breached

  Calculate rsa signature on long message by computing mod

Calculate RSA signature on long message by ?rst computing what the message equals mod n, for some ?xed n and then signing this computed value only. Why or why not?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd