COMP40571 Computer Forensics Assignment

Assignment Help Computer Network Security
Reference no: EM132429822 , Length: word count:2500

COMP40571 - Computer Forensics - Nottingham Trent University

Assignment - Computer Forensics Investigation

Assessment Requirements

This assignment allows you to build your knowledge and critical evaluation of computer forensics investigations.To pass the coursework you must demonstrate your understanding of the practice of digital investigations as they are conducted in an organisation. This is achieved through the investigation of computer-based evidence using tools and techniques that you have been introduced to during the module delivery. You are allowed to make use of any references during your digital investigation but are encouraged to use academic sources such as conference and journal papers. This is an individual coursework.

Assessment Scenario/Problem

Many organisations have an IT security strategy in place covering the management of IT security facilities and acceptable activities undertaken within the organisation. Computer forensics has long been an activity within the bounds of law enforcement agencies. However, commercial organisations are increasingly making use of computer forensics tools and techniques to investigate system misuse. In addition, corporate digital investigations are also conducted to provide evidence in cases such as fraud, Intellectual Property theft, or harassment.

Another UK university, which does not have expertise in computer forensics, has asked Nottingham Trent University's College of Science and Technology (NTU CST) to conduct a digital investigation into suspected Intellectual Property (IP)‘theft' on their behalf. A number of relevant files have been recovered from a staff member's (Dr John Haggerty) shared drive. In addition, a number of emails have been recovered from the mail server and provided as .pst archives. All recovered files have been placed on a flash memory drive and imaged by IT staff at the other university. The image is made available to you via the module room on NOW. You are to investigate the files and provide a report of your findings to NTU CST's School Management Team. The report should include an overview of your methodology and the programs that you used during the investigation. If a case of IP‘theft' is founded, you have been asked to recommend to the School Management Team the severity of the offence with supporting evidence. If no evidence of IP‘theft' is found, again provide supporting evidence to defend this position. In addition, you are to make recommendations for future investigations based on the handling of the case up to the point at which you have become involved.

Your report should not exceed 2500 words (excluding references and appendices). Particular care should be made to ensure that the report contains correct references to all cited work in an appropriate style, for example, the Harvard Referencing System. You should submit your report to the module Dropbox in NOW before the submission deadline.

Attachment:- Computer Forensics Investigation.rar

Reference no: EM132429822

Questions Cloud

Divide the periods of development differently : What influences make one child different from another? How might you be different if you had grown up in a culture other than your own?
Discuss kelly''s follower types : Discuss Kelly's (1988) follower types. Consider how you as a leader would work to develop your employees who are not already effective followers
Determine the estimated bonus to the manager : The bonus percentage is 3% of the firm income above a base level of $300,000 after tax. Determine the Estimated Bonus to the Manager
Identify one of the significant risks finance companies face : Identify one of significant risks finance companies face. Why is risk important to monitor? In what way does change in risk-free rate affect bond mutual fund?
COMP40571 Computer Forensics Assignment : COMP40571 Computer Forensics Assignment Help and Solution, Nottingham Trent University - Assessment Writing Service - critical evaluation of computer forensics.
Prepare a purchases budget in metres for the first quarter : Prepare a purchases budget in metres for the first quarter of 2019, giving total purchases in both metres and dollars for each month
Explain how mental health and addiction therapy : Explain how mental health and addiction therapy are viewed in various cultures
What are the goals and techniques of behavioral therapy : What are the goals and techniques of behavioral therapy? Applying specific terms and concepts from classical conditioning techniques
What are the goals and techniques of humanistic therapy : Applying specific terms and concepts, describe how a humanistic therapist would help a client who feels ashamed of his/her/their physical appearance.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd