CO4514 Digital Forensic Technology Assignment

Assignment Help Computer Network Security
Reference no: EM132849247 , Length: word count:600

CO4514 Digital Forensic Technology - University of Central Lancashire

Part - Short Report

You must research a specific digital device and discuss how to obtain evidence from that digital device. You will be told which digital device you must research - no two students will be researching the same digital device.

You must use the "CO4514 Assignment One Template" (located on Blackboard) for your short report.

This will require a deeper understanding of the underlying technology. You will be told which device to focus on.

Different devices bring their own challenges when it comes to evidence recovery or evidence acquisition. For example, some devices may support a full physical acquisition, some devices may not, and some devices may require a part acquisition using logical methods.

For this task, you are expected to analyse and understand your digital device, and then postulate ways in which to acquire evidence from this device. Part of your write-up should explain where and how evidence is stored on your device.

You should:
• Provide an overview of the digital device you have been assigned. This overview should focus on the hardware capabilities, and summarise the most important parts in relation to an acquisition of evidence
• Identify what kind of acquisition you can perform. This should be informed by your research and should be one of
o Full physical
o Logical
o Part-image
o Manual
• Justify why you believe this acquisition technique is the most appropriate for your specific advice. This justification should be informed by your research into the device.
• Identify and justify which tools you would use to obtain evidence from this device.
• Identify how you uphold the ACPO good practice guide principles. Do not repeat the principles here, this should be about YOU and obtaining evidence from your device. Essentially, you should tell me how you would apply the ACPO good practice guide.
• Identify any evidence artefacts you can obtain from your digital device.
• Explain and justify why those artefacts would be useful in prosecuting a crime.

Learning Outcome 1: Critically evaluate technology (software and hardware) used during the investigation of digital crime

Learning Outcome 2: Critically evaluate tools, techniques and issues related to the recovery of digital evidence LO4 - Use and extend a technical vocabulary necessary to interact with stakeholders in a digital forensic investigation.

Attachment:- Digital Forensic Technology.rar

Reference no: EM132849247

Questions Cloud

What is time series analysis : What is time series analysis? Why is understanding time important in your analysis? how likely will run into many scenarios in the real world where time is not
Find the proportion of asd in arizona : In 2008, there were 507 children in Arizona out of 32,601 who were diagnosed with Autism Spectrum Disorder (ASD) ("Autism and developmental," 2008). Find the pr
How will the students be assigned to the different treatment : How will the students be assigned to the different treatment groups? Is it possible to use simple random assignment of all students?
What is the expected profit from the investment : An investment counselor calls with a hot stock tip. He believes that if the economy remains strong, the investment will result in a profit of $50000.
CO4514 Digital Forensic Technology Assignment : CO4514 Digital Forensic Technology Assignment Help and Solution, University of Central Lancashire - Assessment Writing Service
What is the mean-median-standard deviation : What is the mean, median, standard deviation and interquartile range values of the following data set? Explain how you decide on the appropriate
Understand the center-middle of distribution of the variable : A colleague of yours is attempting to understand the center/middle of her distribution of the variable "# of prior arrests" and the variable "gender".
Examining the result of the hypothesis test : After examining the result of the hypothesis test in part a, what type of statistical error, if any, was committed? Explain your answer.
Find resulting sample standard deviation : The amount of lateral expansion (mils) was determined for a sample of ns(a)2(b) ?= 11 pulsed-power gas metal arc welds used in LNG ship containment tanks.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd