Complete an expert witness report

Assignment Help Computer Networking
Reference no: EM133005875

BIT362 Digital Forensics

Assignment Overview

Digital Corpora have given us the rights to use their scenario in our assignment. These are fictitious scenario. You are a forensics investigator. You are to choose one of the following cases to solve. You are required to complete an Expert Witness Report for a court examining the case. It is expected to use multiple tools and techniques to establish the claim.

Choose of the following Digital Corpora Scenarios:

* Nitroba University Harassment Scenario --- A fun-to-solve network forensics scenario.
* M57-Patents --- A complex scenario involving multiple drives and actors set at a small company over the course of several weeks.
* National gallery DC 2012 --- a fictional attack on the National Gallery DC, foiled in 2012.
* 2018 Lone Wolf Scenario --- A scenario involving the seizure of the laptop of a fictional person planning a mass shooting.

Report
Cover Page: Name, Student ID, Subject Code.
Executive Summary
Introductions
Actors
Inventory
Timeline of Events
Key Findings (with techniques such as RAM, Network, USB, Phone, Search Analysis)
Appendix: Tools Generated Reports
Presentation  - 3 minutes + 2 minutes questions
Present your findings in a video (or in classes).

Attachment:- Digital Forensics.rar

Reference no: EM133005875

Questions Cloud

What the gain or loss on disposal is : July 1, 2020, after the current year's depreciation of $15,000 had been recorded, using the straight-line method. The gain or loss on disposal is
Journal entry to record the exercise of the share rights : The market value of the share is P250. A Company exercised all share rights. Journal entry to record the exercise of the share rights
Determine the net income or net loss of guji : Determine the net income or net loss of Guji for the year under each of following unrelated assumptions: Owner withdrew Br.17,500 and invested Br.25,000 cash
Explain the purported indiscretion : Describe the purported indiscretion, and how it relates to mis-reporting earnings or shady accounting, estimate the impact of potential misrepresented amount.
Complete an expert witness report : Complete an Expert Witness Report for a court examining the case. It is expected to use multiple tools and techniques to establish the claim
Discuss factors contributing to reason : Demand for qualified workers is far outpacing supply, fueling a 'talent war or crisis' that will directly impact organizations across a wide range of industries
Improve performance improvement plan : What would be your response to improve Performance improvement plan for a "staff member" who is not meeting expectations?
Calculate a corrected amount for the ending inventory : On December 27, 2019, a regular customer purchased goods for cash amounting to Tshs.1,000,00. Calculate a corrected amount for the ending inventory
Charge of overseeing a cultural overhaul : if you were in charge of overseeing a cultural overhaul for FAVI, where would you start and why?

Reviews

len3005875

10/5/2021 11:57:29 PM

National gallery DC 2012 --- a fictional attack on the National Gallery DC, foiled in 2012. This is the case study which needs to be done.

Write a Review

Computer Networking Questions & Answers

  Many organization struggle with writing policies

Information Security Policy. An Information Security Policy is the cornerstone of an Information Security Program. It should reflect the organization's objectives for security and the agreed upon management strategy for securing information.

  Develop a logical design of the new network

ITECH2301 - Network Architecture and Design - Federation University - Develop a logical design of the new network for this enterprise campus

  List command and prompt used to load save configuration file

Use the Finisar Surveyor demo software to capture a file transfer to a TFTP server. Prepare a report on your findings. Identify the port used to establish.

  Project management database system

Create a project management database system which manages baseline project information for an IT database design project, for many different users in multiple different locations of an organization.

  Characteristics of mobile devices that need to be

1 a major purpose of an organizational knowledge base is to support and allow .a. knowledge sharingb.e-learningc.

  What is the chance of success on the first attempt

THE MEDIUM ACCESS CONTROL SUBLAYER- Computer Networks for HND RQF Level-What is the probability of exactly k collisions and then a success?

  Evaluating principal physical characteristics for biometric

The security manager is to estimate principal physical characteristics used for biometric user authentication,  concepts of enrollment.

  How big is the mac address space

How big is the MAC address space? The IPv4 address space? The IPv6 address space?

  What is the purpose of a private ip address

How many network and host bits are in a class C network address?

  What happens if three processors try to access global memory

Consider a multiprocessor using a shared bus. What happens if three processors try to access the global memory at exactly the same instant?

  Define network convergence

Which protocol is used by PING? List the names of two PING messages - define network convergence. How can you identify your configured network has reached convergence?

  What alternatives telephone company use to increase capacity

This fiber-optic line has reached capacity. What alternatives can the telephone company consider to increase capacity?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd