Analyse complex data and identify key evidential elements

Assignment Help Computer Network Security
Reference no: EM133110826

Assessment Description

Learning outcome 1: Knowledge and Understanding Recognise and define what digital evidence is, and the role it plays in investigations

Learning outcome 2: Knowledge and Understanding Discuss the legislative and regulatory requirements in relation to digital forensics

Learning outcome 3: Intellectual, practical, affective and transferable skills Analyse complex data and Identify key evidential elements, relating to digital forensics

Learning outcome 4: Intellectual, practical, affective and transferable skills Construct results in appropriate formats to be comprehensible to a varied audience

Question 1: Digital law & Security Principles

You have just started a new job at a new high-tech crime unit. Your first job is to brief your colleagues on the laws that could be useful, in the world of digital forensics. Some of your colleagues are not up to date on these laws and regulations. They are also not good with technology, so please explain complex concepts so that information is comprehensible to a varied audience.

Using the ACPO guidelines (or any other standards/laws you believe to be appropriate) Compare and contrast the differences between collecting, copying and securely storing, both live and static evidence.

You should produce a briefing report that:
- Outlines both the laws and regulations you believe to apply
- Describe the differences between live and static evidence
- List the ways (with examples/cases) that live and static evidence should be gathered/copied/securely stored

Question 2: Digital Forensic Artefacts
A suspect known as Mr Whale has been accused of downloading and distributing various illegal materials, on their Windows 10 based PC. These illegal material takes the form of personal information, blackmail photos/videos and accessing illegal websites. On top of this, someone had started deleting many files from the computer's hard drive. Mr Whale has stated "These alleged files are not mine, I did not do this" also "someone must have broken into my computer and used it without me knowing".
- What digital forensic artefacts, techniques and analysis, can be used to prove if illegal material was once or is currently still on this hard drive?
- What digital forensic artefacts, techniques and analysis, can be used to prove, if Mr Whale deleted these files himself or if it was someone else?
Both questions above must be comprehensible to a varied audience, so it can be understood by non-technical people, (laymen) in court.

Both questions above must be comprehensible to a varied audience, so it can be understood by non-technical people, (laymen) in court.
(We work in a society where we are innocent until proven guilty beyond all reasonable doubt). So, researching some case law for these situations could prove valuable to giving strength, to your argument)

Added Value
This section is specifically for what above and beyond additions the student has included in the report. This could take the form of actually showing and testing artefact analysis, rather than just researching it

Report Presentation and Layout
You are expected to compile a well-constructed, formal written report of no more than 3,000 applicable words. The presentation, layout and ease of reading for the report, will be critical in this document. Please make the information comprehensible to a varied audience.

Reference no: EM133110826

Questions Cloud

Compute the standard deviation of the expected return : Compute the standard deviation of the expected return given the economic states, their likelihoods, and the potential returns.
How much of the interest expense may she deduct : Assume that Margaret Lindley has $10,110 of interest income this year and no investment expenses. How much of the interest expense may she deduct this year
Determine the amount of ending inventory company will report : Determine the amount of ending inventory the company will report on its proforma balance sheet at the end of the first quarter
Remaining rights and maintenance of the social order : The Social Contract Theory is a moral and political philosophy that essentially provides that in choosing their leaders the people are giving their consent to s
Analyse complex data and identify key evidential elements : Discuss the legislative and regulatory requirements in relation to digital forensics and Understanding Recognise and define what digital evidence
Reconcile a net income to net cash flow : The income statement showed a gain of $22,420 from the sale of investments. Reconcile a net income of $286,900 to net cash flow from operating activities
What is interpersonal communication : What is interpersonal communication? Provide examples of the barriers that can prevent effective communication.
Potential problems associated with conflict : What are the benefits and potential problems associated with conflict?
Explain the difference between a call option and put option : Explain the difference between a call option and a put option. Would you use options in your personal investment portfolio

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd