Create fictitious digital evidence

Assignment Help Business Economics
Reference no: EM131521355

Based on your approved case ***(SEE LINK BELOW), create fictitious digital evidence. You may use logs from your own computer (no personal information) as a guide or search the internet for samples. These samples do not have to be technically correct, but there must be a reasonable presumption that this information would exist, supported by a reference.

Document who, when, and how the evidence was obtained. Remember, you are creating fictitious examples, so refer to prior reading or examples of how digital evidence was collected. If necessary, refer to the "who" as a "systems administrator" and ensure the fictitious person is identified and referenced in your investigation.

Digital evidence must meet each of the following criteria:

  • Some of your digital evidence must be retrieved by computer forensics.
  • Some of your digital evidence must be retrieved from log files.
  • Digital evidence must contain information to support who, what, when, where, and how the cyber-crime was committed.

Present digital copies of your evidence in text files, screen shots, or PDFs.

***Link to case study - https://www.computerworld.com/article/2542763/security0/database-admin-at-fidelity-national-stole-more-data-than-thought.html

You are being asked to produce fictitious digital evidence for the case you selected for your project. You will assume that you are an investigator, and that you need to identify and gather palpable evidence to help establish that the crime occurred. For this assignment, you just need to make up some evidence for the case you selected. For instance, use Excel file with data about financial discrepancies and produce information from a computer's temporary folder. Also, you may create text of logs using Note Pad or MS Word. Note that you can use your own fictitious log of activities in Word, Notepad, or WordPad. For each log (line by line), show at least user or computer IP address/name, date, time, activity (e.g. read, write, update, etc) and possibly the system or application accessed. You may assume a computer was used to access a server, and the server recorded the activities.

First, think about the evidence you will need to charge the criminal. You may be lucky to find it in court evidence for your case. If not available, use your own. For instance, if a perpetrator used a computer to access a company's database, show the access logs (for example). Your operating system has access logs. I can find some of my computer logs in C>Windows>Security>Logs and C>Windows>Logs>DISM. You may take copies and modify in NotePad or a text application. Alternatively, you may use Google to find sample evidence (access logs, computer codes, transaction changes, etc) and modify or use as templates for your evidence.

Additionally, you may create some fictitious transactions in Excel or Word, take screen shots, and include in your evidence. For this assignment, just create some evidence to support the case. For instance, if someone used a computer to steal his company's money, some of the digital evidence will include user access and activities (date, time, user, activities). One may use a log of computer activities (make it up) as digital evidence.

Please merge all your work in one document

Reference no: EM131521355

Questions Cloud

Well-designed risk management plan : Analyze a well-designed risk management plan to determine how it can prevent risk and control residual risk.
Conduct a personal interview with a training manager : Conduct a phone or personal interview with a Training Manager. Ask them to describe the role that training and development plays in their company.
What is the depreciation : Abbott Landscaping purchased a tractor at a cost of $32,000 and sold it three years later for $16,000. Abbott recorded depreciation using the straight-line.
What practices and policies this organization should use : Discuss what practices and policies this organization should use to comply with the 2 laws/regulations you discussed
Create fictitious digital evidence : Based on your approved case ***(SEE LINK BELOW), create fictitious digital evidence. You may use logs from your own computer
How to create effective individual development plans : Speak to your local training and development group on individual development plans.How to create effective IDPs.
What is the fair value of the new parcel of land : Salad Express exchanged land it had been holding for future plant expansion for a more suitable parcel of land along distribution routes.
Assignment on big switch network design : Big Switch is a medium-sized sales organization with 100 employees with annual revenue of $10 million. Big Switch has a central office of 30 employees.
List the career paths discussed in our text : List the career paths discussed in our text, sharing not only how mobility occurs in each, but also how you might have observed such practices

Reviews

Write a Review

Business Economics Questions & Answers

  Economics assignment

This document contains various important questions and their appropriate answers in the subject field of Economics.

  Demand and supply curves

Economics is the study of the principles governing the allocation of scarce means among competing ends when the objective of the allocation is to maximize the attainment of the ends.

  Long-run perfectly competitive equilibrium for the firm

Evaluate Government intervene and correct this situation?(a) Explain the concept of a concentration ratio. A rise in the price of magarine Explain the impact of external costs and external benefits on resource allocation long-run perfectly c..

  Supply and demand diagrams

Explain each of the following using supply and demand diagrams,  With the use of a graph, explain how these two programs affect cigarette consumption and the price of cigarettes.

  Case study: fisher-price toys

The case study of the Fisher-Price Toys, Inc., a popular case in basic economics and management from the prestigious Harvard Business School.

  Draw the production possibility curve

Draw the production possibility curve and a. Define consumer surplus and producer surplus.

  Tax revenue

The Australian government administers two programs that affect the market for cigarettes

  Maximize total welfare

How many tickets to sell to maximize total welfare.

  Difference between the cv and the ev

The change in consumer surplus (?CS) is not "theoretically" justifiable like the CV and EV but it continues to be the most widely used measure of consumer welfare change. Explain how this can be reconciled

  Depict von neumann-morgenstern utility index u in a diagram

Depict the von Neumann-Morgenstern utility index u in a diagram

  What is the market solution

What is the market solution (market price and quantity) and What is the total surplus of the society under the market solution

  Calculate gross national product and net national product

Calculate gross national product and net national product

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd