CST 640 9040 Digital Forensics Technology and Practices

Assignment Help Computer Network Security
Reference no: EM132830998

CST 640 9040 Digital Forensics Technology and Practices - University of Maryland Global Campus

Mobile Incident Response and Investigations

In this project, you will write a 13- to 21-page white paper that describes the current state of mobile incident response and investigation. The context is that as a forensic investigator, you are providing an objective overview of mobile technology and digital forensic and incident response capabilities for a law enforcement unit that has limited experience and capability with mobile forensics.

Your white paper will describe mobile investigative challenges and the techniques and technologies available to perform mobile forensic examinations. You will also provide your perspective on the future of mobile forensics-the biggest threat to mobile forensics in years to come, and the biggest opportunity for investigators of mobile cybercrime. The most successful papers will include references to resources outside of the classroom.

There are six steps in this project. Each step focuses on one required element of the paper to be submitted at the end of this project. In Step 1, you will provide an overview of mobile technologies and cellular networks.

Step 1: Conduct a Mobile Technology Overview
You're ready to begin writing the white paper. The sheriff has stated that the first section should be an overview of how cellular networks operate. You decide to provide an overview of cellular networks: how mobile phones communicate with cell sites, cellular-to-cellular communication, mobile switching centers, and the base switching subsystem. You also want to cover the technology of mobile networks, including form factors of smart devices and other wireless technologies.
Submit the results of your research (three to five pages) to the sheriff (your instructor) for review and ungraded feedback. Incorporate any suggested changes. Your overview will serve as the introduction to the 13- to 21-page white paper for this project.
Since mobile technologies are constantly changing, you decide to address trends in mobile technology in the next section of your paper. You know that NIST 800-101, Revision 1, will provide a good starting point on all these topics.

Step 2: Describe Trends in Mobile Technology
With the overview drafted, you now need to describe trends in mobile technology. For this step, you will address handset transmission types, mobile operating systems, challenges with mobile technology, and mobile device threats. The "trends" section would not be complete without addressing the latest in embedded device forensics.
Review this three- to five-page section of your paper for accuracy and completeness; it will serve as the second section of the final white paper.
Once you have developed this section, you are ready to move on to considerations for the forensic handling of mobile devices.

Step 3: Discuss Laws, Regulations, and the Forensic Handling of Mobile Devices
After detailing trends in mobile technology, your next step is to discuss laws and regulations governing the search and seizure of mobile devices under the Fourth Amendment to the US Constitution, including describing the mobile device forensics process, considerations for effectively handling mobile devices during an investigation, use of proper investigative techniques, types of mobile forensics tools available, and identifying where digital forensics evidence may be found on mobile devices.
It is important for you to research electronic seizure practices for complying with the Fourth Amendment when searching and seizing mobile devices. Cite reference sources in your final white paper discussion.
These subjects are important because mobile devices present unique challenges when it comes to handling and analysis, and court cases are won or lost based on the arresting officer's understanding of legal technicalities. Review this three- to five-page section of your paper for accuracy and completeness; it will serve as the third section of the final white paper.
Upon completion of this section, you will be ready to move on to the next section of your paper: forensic tools and investigative techniques.

Step 4: Describe How to Analyze and Present Forensic Information
You have discussed your research on laws, regulations, and forensic handling. You are now ready to create the fourth section of the white paper, where you describe the analysis and presentation of forensic information.
Based on your training, you know you will need to include mobile file system analysis, techniques for bypassing security measures, and third-party applications in this section. In addition, you will address data carving, file system, and compound file analysis and the presentation of a case report.
Review this three- to five-page section of your paper for accuracy and completeness; it will serve as the fourth section of the final white paper.
You are ready to move on to a final, less-objective summary of your research on the evolving field of mobile forensics.

Step 5: List the Biggest Threat and Most Promising Technology

In the previous four steps, you have reported on a variety of topics relating to mobile forensics. You have read and reported on technologies, trends, laws, and regulations, handling, and analysis of mobile data. For the final section of your paper, the sheriff has asked for your perspective on the biggest threat posed by cyber criminals using mobile technology, and a technology that promises a solution.

Reflect on your in-class and outside readings, as well as your personal and professional experience, to respond to these questions. There are no right or wrong answers, but you should provide references for your observations. You will be attaching this one-page section to the white paper.

You have collected the information needed to inform your department's future decisions regarding mobile forensics. In this step, you will combine the five sections that you've written into a single, cohesive white paper. Your 13- to 21-page paper should be double-spaced, excluding images and references. Use 12-point font and APA format.
Include the following five sections:

1. Overview of mobile technology, including network operations and mobile technologies

2. Description of trends in mobile technology, including handset transmission types and embedded device forensics, as well as operating systems, applications, and challenges and threats to forensic investigations

3. Laws, regulations, and considerations for the forensic handling of mobile devices

4. Analysis and presentation of forensic information including file system analysis, techniques for working through security measures, third-party applications, and other forms of mobile data analysis

5. Personal perspective on the greatest biggest threat and greatest opportunity/most promising technology in mobile forensics, based on in-class and outside readings, as well as personal/professional experience

Attachment:- Digital Forensics Technology.rar

Reference no: EM132830998

Questions Cloud

How much is the estimated price of the illiquid bond k : How much is the estimated price of the illiquid bond K per P100 of each par value. Bond-L: 3-year, 5.5% annual coupon payment bond at a price of 108
Differences between ethics-organizational policies and laws : The Cruisin' Fusion taco trucks are gaining popularity, Explain the differences between ethics, organizational policies, and laws.
Prepare IBMs December entry to record the lease transaction : Assume that IBM leased equipment that was carried at a cost of $97,000 to Crane Company. Prepare IBMs December entry to record the lease transaction
Calculate net profit margin for the year for muggie pty ltd : Calculate net profit margin for the year 2019. The information has been extracted from the financial statements of Muggie Pty. Ltd., a mug wholesaler.
CST 640 9040 Digital Forensics Technology and Practices : CST 640 9040 Digital Forensics Technology and Practices Assignment Help and Solution, University of Maryland Global Campus - Assessment Writing Service
Construct a work-back schedule : For this assignment, you will create an implementation project plan, which outlines the steps involved in implementing your project. This document is sometimes.
Big data analytics : Which highlights how businesses have integrated Big Data Analytics with their Business Intelligence to gain dominance within their respective industry.
What are formulas for inventory turnover critical asset : How are items translated into days and what does a movement in each tell you about the asset category and applicable risk management?
Describe the importance of data transformation : Write a short paragraph (

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd