CST 640 9040 Digital Forensics Technology and Practices

Assignment Help Computer Network Security
Reference no: EM132830998

CST 640 9040 Digital Forensics Technology and Practices - University of Maryland Global Campus

Mobile Incident Response and Investigations

In this project, you will write a 13- to 21-page white paper that describes the current state of mobile incident response and investigation. The context is that as a forensic investigator, you are providing an objective overview of mobile technology and digital forensic and incident response capabilities for a law enforcement unit that has limited experience and capability with mobile forensics.

Your white paper will describe mobile investigative challenges and the techniques and technologies available to perform mobile forensic examinations. You will also provide your perspective on the future of mobile forensics-the biggest threat to mobile forensics in years to come, and the biggest opportunity for investigators of mobile cybercrime. The most successful papers will include references to resources outside of the classroom.

There are six steps in this project. Each step focuses on one required element of the paper to be submitted at the end of this project. In Step 1, you will provide an overview of mobile technologies and cellular networks.

Step 1: Conduct a Mobile Technology Overview
You're ready to begin writing the white paper. The sheriff has stated that the first section should be an overview of how cellular networks operate. You decide to provide an overview of cellular networks: how mobile phones communicate with cell sites, cellular-to-cellular communication, mobile switching centers, and the base switching subsystem. You also want to cover the technology of mobile networks, including form factors of smart devices and other wireless technologies.
Submit the results of your research (three to five pages) to the sheriff (your instructor) for review and ungraded feedback. Incorporate any suggested changes. Your overview will serve as the introduction to the 13- to 21-page white paper for this project.
Since mobile technologies are constantly changing, you decide to address trends in mobile technology in the next section of your paper. You know that NIST 800-101, Revision 1, will provide a good starting point on all these topics.

Step 2: Describe Trends in Mobile Technology
With the overview drafted, you now need to describe trends in mobile technology. For this step, you will address handset transmission types, mobile operating systems, challenges with mobile technology, and mobile device threats. The "trends" section would not be complete without addressing the latest in embedded device forensics.
Review this three- to five-page section of your paper for accuracy and completeness; it will serve as the second section of the final white paper.
Once you have developed this section, you are ready to move on to considerations for the forensic handling of mobile devices.

Step 3: Discuss Laws, Regulations, and the Forensic Handling of Mobile Devices
After detailing trends in mobile technology, your next step is to discuss laws and regulations governing the search and seizure of mobile devices under the Fourth Amendment to the US Constitution, including describing the mobile device forensics process, considerations for effectively handling mobile devices during an investigation, use of proper investigative techniques, types of mobile forensics tools available, and identifying where digital forensics evidence may be found on mobile devices.
It is important for you to research electronic seizure practices for complying with the Fourth Amendment when searching and seizing mobile devices. Cite reference sources in your final white paper discussion.
These subjects are important because mobile devices present unique challenges when it comes to handling and analysis, and court cases are won or lost based on the arresting officer's understanding of legal technicalities. Review this three- to five-page section of your paper for accuracy and completeness; it will serve as the third section of the final white paper.
Upon completion of this section, you will be ready to move on to the next section of your paper: forensic tools and investigative techniques.

Step 4: Describe How to Analyze and Present Forensic Information
You have discussed your research on laws, regulations, and forensic handling. You are now ready to create the fourth section of the white paper, where you describe the analysis and presentation of forensic information.
Based on your training, you know you will need to include mobile file system analysis, techniques for bypassing security measures, and third-party applications in this section. In addition, you will address data carving, file system, and compound file analysis and the presentation of a case report.
Review this three- to five-page section of your paper for accuracy and completeness; it will serve as the fourth section of the final white paper.
You are ready to move on to a final, less-objective summary of your research on the evolving field of mobile forensics.

Step 5: List the Biggest Threat and Most Promising Technology

In the previous four steps, you have reported on a variety of topics relating to mobile forensics. You have read and reported on technologies, trends, laws, and regulations, handling, and analysis of mobile data. For the final section of your paper, the sheriff has asked for your perspective on the biggest threat posed by cyber criminals using mobile technology, and a technology that promises a solution.

Reflect on your in-class and outside readings, as well as your personal and professional experience, to respond to these questions. There are no right or wrong answers, but you should provide references for your observations. You will be attaching this one-page section to the white paper.

You have collected the information needed to inform your department's future decisions regarding mobile forensics. In this step, you will combine the five sections that you've written into a single, cohesive white paper. Your 13- to 21-page paper should be double-spaced, excluding images and references. Use 12-point font and APA format.
Include the following five sections:

1. Overview of mobile technology, including network operations and mobile technologies

2. Description of trends in mobile technology, including handset transmission types and embedded device forensics, as well as operating systems, applications, and challenges and threats to forensic investigations

3. Laws, regulations, and considerations for the forensic handling of mobile devices

4. Analysis and presentation of forensic information including file system analysis, techniques for working through security measures, third-party applications, and other forms of mobile data analysis

5. Personal perspective on the greatest biggest threat and greatest opportunity/most promising technology in mobile forensics, based on in-class and outside readings, as well as personal/professional experience

Attachment:- Digital Forensics Technology.rar

Reference no: EM132830998

Questions Cloud

How much is the estimated price of the illiquid bond k : How much is the estimated price of the illiquid bond K per P100 of each par value. Bond-L: 3-year, 5.5% annual coupon payment bond at a price of 108
Differences between ethics-organizational policies and laws : The Cruisin' Fusion taco trucks are gaining popularity, Explain the differences between ethics, organizational policies, and laws.
Prepare IBMs December entry to record the lease transaction : Assume that IBM leased equipment that was carried at a cost of $97,000 to Crane Company. Prepare IBMs December entry to record the lease transaction
Calculate net profit margin for the year for muggie pty ltd : Calculate net profit margin for the year 2019. The information has been extracted from the financial statements of Muggie Pty. Ltd., a mug wholesaler.
CST 640 9040 Digital Forensics Technology and Practices : CST 640 9040 Digital Forensics Technology and Practices Assignment Help and Solution, University of Maryland Global Campus - Assessment Writing Service
Construct a work-back schedule : For this assignment, you will create an implementation project plan, which outlines the steps involved in implementing your project. This document is sometimes.
Big data analytics : Which highlights how businesses have integrated Big Data Analytics with their Business Intelligence to gain dominance within their respective industry.
What are formulas for inventory turnover critical asset : How are items translated into days and what does a movement in each tell you about the asset category and applicable risk management?
Describe the importance of data transformation : Write a short paragraph (

Reviews

Write a Review

Computer Network Security Questions & Answers

  Discuss smart grid network architecture

Discuss smart Grid network architecture (System Component and Network Components), Recent developments in Smart Grid networks

  Explain how you would go about decrypting a message that

explain how you would go about decrypting a message that was encrypted in blocks of length two using an affine

  Provide one real-world example that demonstrates severity

Examine at least three (3) risks associated with using public wireless access points to gain access to a corporate network. Provide one  real-world example that demonstrates the severity of the identified risks.

  ISCS3523 Intrusion Detection and Incident Response

ISCS-3523 Intrusion Detection and Incident Response Assignment Help and Solution, Book Report - Cuckoo's Egg Analysis Homework Help

  Choose two firms which offer computer security outsourcing

you have been asked to help decide whether to outsource security or keep the security function within the firm. search

  Define the cybercrime paper

The papers should be comprised of a INTRODUCTION, REVIEW OF LITERATURE, DISCUSSION, CONCLUSIONS, and REFERENCES.

  Setup secure configuration settings and anti-virus

You are a security administrator responsible for providing secure configuration requirements for new laptop deployments.

  It infrastructure management assessment item 2enterprise

assessment item 2 ltbrgtenterprise architect3939s bog amp swot analysis ii ltbrgtvalue 35 ltbrgtdue date 04-oct-2014

  Essence of a digital signature is ensures authentication

1. The essence of a digital signature is that it ensures authentication. Explain how and why it does that.

  Implement the s-box functionality as a class

Implement the cipher as a class which implements the provided interface.

  Computer security for your company

Present a brief summary of the arguments for and against outsourcing computer security for your company. Select two firms that offer computer security outsourcing services, and compare them and their services. Include several pros and cons of each

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd