COMP40571 Computer Forensics Assignment

Assignment Help Computer Network Security
Reference no: EM132429822 , Length: word count:2500

COMP40571 - Computer Forensics - Nottingham Trent University

Assignment - Computer Forensics Investigation

Assessment Requirements

This assignment allows you to build your knowledge and critical evaluation of computer forensics investigations.To pass the coursework you must demonstrate your understanding of the practice of digital investigations as they are conducted in an organisation. This is achieved through the investigation of computer-based evidence using tools and techniques that you have been introduced to during the module delivery. You are allowed to make use of any references during your digital investigation but are encouraged to use academic sources such as conference and journal papers. This is an individual coursework.

Assessment Scenario/Problem

Many organisations have an IT security strategy in place covering the management of IT security facilities and acceptable activities undertaken within the organisation. Computer forensics has long been an activity within the bounds of law enforcement agencies. However, commercial organisations are increasingly making use of computer forensics tools and techniques to investigate system misuse. In addition, corporate digital investigations are also conducted to provide evidence in cases such as fraud, Intellectual Property theft, or harassment.

Another UK university, which does not have expertise in computer forensics, has asked Nottingham Trent University's College of Science and Technology (NTU CST) to conduct a digital investigation into suspected Intellectual Property (IP)‘theft' on their behalf. A number of relevant files have been recovered from a staff member's (Dr John Haggerty) shared drive. In addition, a number of emails have been recovered from the mail server and provided as .pst archives. All recovered files have been placed on a flash memory drive and imaged by IT staff at the other university. The image is made available to you via the module room on NOW. You are to investigate the files and provide a report of your findings to NTU CST's School Management Team. The report should include an overview of your methodology and the programs that you used during the investigation. If a case of IP‘theft' is founded, you have been asked to recommend to the School Management Team the severity of the offence with supporting evidence. If no evidence of IP‘theft' is found, again provide supporting evidence to defend this position. In addition, you are to make recommendations for future investigations based on the handling of the case up to the point at which you have become involved.

Your report should not exceed 2500 words (excluding references and appendices). Particular care should be made to ensure that the report contains correct references to all cited work in an appropriate style, for example, the Harvard Referencing System. You should submit your report to the module Dropbox in NOW before the submission deadline.

Attachment:- Computer Forensics Investigation.rar

Reference no: EM132429822

Questions Cloud

Divide the periods of development differently : What influences make one child different from another? How might you be different if you had grown up in a culture other than your own?
Discuss kelly''s follower types : Discuss Kelly's (1988) follower types. Consider how you as a leader would work to develop your employees who are not already effective followers
Determine the estimated bonus to the manager : The bonus percentage is 3% of the firm income above a base level of $300,000 after tax. Determine the Estimated Bonus to the Manager
Identify one of the significant risks finance companies face : Identify one of significant risks finance companies face. Why is risk important to monitor? In what way does change in risk-free rate affect bond mutual fund?
COMP40571 Computer Forensics Assignment : COMP40571 Computer Forensics Assignment Help and Solution, Nottingham Trent University - Assessment Writing Service - critical evaluation of computer forensics.
Prepare a purchases budget in metres for the first quarter : Prepare a purchases budget in metres for the first quarter of 2019, giving total purchases in both metres and dollars for each month
Explain how mental health and addiction therapy : Explain how mental health and addiction therapy are viewed in various cultures
What are the goals and techniques of behavioral therapy : What are the goals and techniques of behavioral therapy? Applying specific terms and concepts from classical conditioning techniques
What are the goals and techniques of humanistic therapy : Applying specific terms and concepts, describe how a humanistic therapist would help a client who feels ashamed of his/her/their physical appearance.

Reviews

Write a Review

Computer Network Security Questions & Answers

  The performance of a wimax network appears to be lower than

the performance of a wimax network appears to be lower than expected and you suspect interference to be the cause.

  Cyber terrorism

competitive intelligenc, information safekeeping governance, administration, ISO/IEC 27002, Conceptual Framework

  Xyz company xyz a mid-sized corporation is in the middle of

company xyz a mid-sized corporation is in the middle of satisfying their regulatory compliance needs. the manager of

  Discuss your experiences with cyber-bullying

Discuss your experiences with cyber-bullying - either a personal experience or one you know of from peers or the media.

  Decrypt the message baab using this cipher

You can think of this as a simple substitution cipher for hexadecimal digits. There is no "key" other than the table itself.

  Demonstrate connection to your current work environment

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to you desired work environment.

  Why would a network administrator configure port security

Since switches are generally used within the local network configuration, why would a network administrator configure port security on a switch?

  Provide outline of overall configuration management system

Provide an outline of the overall configuration management system that is required to implement the security configuration of the network. Define the process for change management for security configuration of network devices and systems.

  Identifying and discussing technological improvements

Identify the type of breach and identify and explain how the breach occurred (or suspicions by authorities as to how it may have occurred)

  What is the principle of adequate protection

What is the principle of adequate protection? Do you agree with the principle? What difficulties are associated with implementing it?

  Show how you get the ciphertext from the plaintext

Show how you get the ciphertext from the plaintext through XORing the round keys, performing the substitutions, and the permutations.

  Countermeasures in networked information systems

Analyse and discuss common emerging threats, attacks, mitigation and countermeasures in networked information systems - Potential threats and mitigation tools

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd