Write a short summary of the incident that has occurred

Assignment Help Management Information Sys
Reference no: EM131726501

Project #2 - Investigative Collection of EvidenceInstructions

No directly quoted material may be used in this project paper.

Resources should be summarized or paraphrased with appropriate in-text and Resource page

Project #2 - Investigative Collection of Evidence

For the purpose of this second Project, you are still the Data Security Analyst for Allied Technology Systems. Consider this project a continuation of the work you performed in Project #1.

In this portion of the investigation, you are ONLY collecting the physical evidence, documenting and reporting.

You will NOT be handling the digital data during this stage of the investigation. (This step will be discussed in the Final Project.) You should limit your "care and handling" of each piece of evidence to the physical handling of the digital item/container.

With the scenario in mind, you are to write a report to your supervisor, thoroughly providing a response to the following questions (in paragraph format, properly citing outside research, where appropriate) to both Part I and Part II of the project:

Part I: Overview/Case Summary

1. Write a short summary of the incident that has occurred and establish what permissions/authorities you have before you search Mr. Jackson's former Company work area.

Part II: Physical Evidence Acquisition:

2. Look at the photo of Mr. Jackson's work area. (See file attachment Work_Area.jpg) Identify three (3) potential items of digital evidence you see in the photo.

• For EACH item of digital evidence you identified, describe the steps that would be taken to collect the items (with emphasis on the care and handling of each item consistent with digital forensic best practices described in the module content/weekly readings) at the scene.

You should document these steps in a detailed way that will mitigate questions, concerns, or a basic lack of information that will call your processes into question in court.

• Also for EACH item you identified, explain what potential use the item would be within the investigation (e.g., what type of data that item might hold, and what kind of evidence represents for prosecution.)

3. Look at the photo of Mr. Jackson's work area. (See file attachment Work_Area.jpg) Identify three (3) potential items of non-digital evidence you see in the photo.

• For EACH item of non-digital evidence you identified, describe the steps that would be taken to collect the items (with emphasis on the care and handling of each item consistent with digital forensic best practices described in the module content/weekly readings) at the scene.

You should document these steps in a detailed way that will mitigate questions, concerns, or a basic lack of information that will call your processes into question in court.

• Also for EACH item you identified, explain what potential use the item would be within the investigation (e.g., what type of data that item might hold, and what kind of evidence represents for prosecution.)

4. Detail in your report how your seized evidence from Questions two (2) and three (3) are secured and stored after removing it from the original scene (the work area) and prior to sending it for analysis.

Describe the security procedures in place as well as any environmental protections (specific to computer/digital devices) that are in place within the storage area.

5. Look at the Evidence Custody Document (See file attachment Evidence Custody Document.doc) and item photographs (Items-seized (pics).pptx).

Read the Evidence Custody Document prepared by one of your co-workers in which they are attempting to document the seizure of the three (3) items pictured in the accompanying photos. Did your co-worker adequately describe each item?

What could be added to the descriptions, and for which items (based on what you see in the photos) to make them more complete and serve as an example to your co-worker of what they SHOULD look like (how they should be described)?

Project Requirements:

• Paper should be submitted as a basic report memo HOWEVER, an APA-formatted cover page, in-text citations, and reference page is required.

• Each question should be answered with a minimum of 1-2 paragraphs, so do your research, be specific, be detailed, and demonstrate your knowledge; submitting your project through the appropriate assignment folder.

• Answers to the above questions should be submitted in a single Microsoft Word document (.DOC/.DOCX), with answers separated and/or numbered in respect to the question, so as to make it clear which question is being answered. It may be in a question and answer format, or as described with answers to the associated question numbers;

• The paper should be written in third-person grammar, not first person (I, me, myself, etc.);

• The submission is to have a cover page that includes course number, course title, title of paper, student's name, and the date of submission per APA writing format;

• Format: 12-point font, double-space, one-inch margins;

https://www.dropbox.com/s/oa4oogmi1ch7kj4/Evidence%20Custody%2817-11-17%29.rar?dl=0

Reference no: EM131726501

Questions Cloud

What is the company inventory turnover ratio : What is the Company's Inventory Turnover ratio for 2015? What inventory cost flow assumption does the Company apply for 2015
What policies can help solve this challenge : What do you think is the most challenge issue we are facing today? What policies can help solve this challenge?
Define what you believe the conclusion of your research : Submit a paragraph and detailing your plan for research, and another paragraph explaining what you believe the conclusion of your research
Who has the better grasp on the macro economy : Who has the better grasp on the Macro economy? The Classical school or the Keynesian school?
Write a short summary of the incident that has occurred : Write a short summary of the incident that has occurred and establish what permissions/authorities you have before you search.
Examples of a perfectly competitive industry : 1.) The production of agricultural products like wheat is one of the few examples of a perfectly competitive industry.
Why did water move out of the potato strips : Why did water move out of the potato strips? Were these solutions hypotonic, hypertonic, or isotonic - What was the purpose of testing distilled water
What is the maximum exclusion they can take : If the basis in the home is $300,000 and the sale price is $600,000, what is the maximum exclusion they can take on this transaction
Determine the average time customer must wait : Determine the average length of the waiting line and the average time a customer must wait.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Create a gantt chart to reflect the wbs for project

You have been selected as the project manager for the Global Treps project. You helped to run a local shark tank like event at your college last year as part.

  Describe about manufacturing resource planning

Manufacturing Resource Planning - why mandatory requirements is necessary in Manufacturing Resource Planning?

  How did efficient transactional data management

Why is it important for a company that operates internationally to have centrally located information visible to multiple departments?

  Why are there so many versions of os

As a system administrator who is responsible for your company's network, you understand that operating systems (OS) are various.Discuss the following queries:Why are there so many versions of OS?What are the features that make them different?Explai..

  Examine significant risk of going global with e-com business

Imagine that you are interested in starting an e-Commerce business. Examine the significant risks of going global with an e-Commerce business.

  Electronic auctionssome electronic auction web sites allow

electronic auctions.some electronic auction web sites allow sellers to put almost anything up for auction even though

  Changed the way businesses operate in the global market

Write a 500 word essay based specific ways in which the internet has changed the way businesses operate in the global marketplace, for example global wage arbitrage. Issues of global regulation and oversight might form the basis for an essay

  Find the first tcp handshake

What is the IP address of the host that started the handshake? What is the TCP port connection pair for this handshake? In the first packet of the handshake, the source port is the ephemeral port this host wants to use for the connection, and the d..

  Pure prototyping methodology

SDLC Methodology vs. Pure Prototyping Methodology - pure prototyping methodology alone.

  What other instances of difficulty in accessing information

You know that you generally can't use a PC to access the information stored on a Macintosh formatted disk.- What other instances of difficulty in accessing information have you experienced personally or heard of?

  Suggest a significant challenge of applying wsihs

Determine the most significant requirement of an effective solution to interoperability - Provide a rationale for your determination.

  Choose a strategy for addressing the associated risk

Choose a strategy for addressing the associated risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Explain your rationale.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd