CTEC5806 Digital Forensics Assignment

Assignment Help Computer Networking
Reference no: EM132541565 , Length: word count:4000

CTEC5806 Digital Forensics: Principles and Practice DL - De Montfort University

Learning outcome 1: Discuss the principles underpinning digital forensic practice & their importance;

Learning outcome 2: Explain the main stages & the associated procedures of a digital forensic investigation;

Learning outcome 3: Apply the principles & practices of digital forensics to given scenarios;

Learning outcome 4: Analyse forensic images of different formats using a suitable selection of tools;

Learning outcome 5: Prepare a suitable report to present your findings and professional opinion of a given scenario;

Learning outcome 6: Critically evaluate & reflect upon your own learning in relation to digital forensics & your future learning needs to be successful in the field of digital forensics;

Digital Forensics: Principles & Practice Distance Learning Coursework

Digital Forensics Report

Introduction

1. As a Digital Forensics Investigator, you are expected to follow several principles that are a combination of legal, ethical/moral and general guidelines.
• Discuss what these principles are and why they are important.

2. Explain the main stages of a Digital Forensic investigation, giving examples of what tasks, activities and the tools where appropriate, you would complete or use at each stage.
Background

3. Summarise the case you have been asked to investigate in your own words. State the case hypothesis.

4. What will you be looking for? Where will you expect to find such artefacts?

5. What tools are you going to use? How will they help you investigate? How do you use these tools?
Main Body - Biggest Section

6. Analyse the forensic image and illustrate step by step the process of what you did and what you found.

7. Assemble your findings in relation to what you have been asked to investigate.

8. Based on your findings, does the evidence support or refute the case hypothesis? Why? Back up your answer with demonstrable reasons and evidence.

Conclusions

9. What have you learnt during this assignment?

10. If you had to do the assignment again, what would you do differently? Why would this help you?
Appendices - each appendix should be on a separate page and have a title, plus a paragraph to explain what it is showing (except B and C which should just have a title)
A. References;
B. Spreadsheet and written details about their proposed lab setup and field kit;
C. Incident Response plan;
D. E. F. etc. Screenshots you think will support your report that do not fit in the main body of your assignment.

Attachment:- Digital Forensics Report.rar

Reference no: EM132541565

Questions Cloud

Differences between general civil liability-tort liability : Explain differences between general civil liability, tort liability, and vicarious liability, to include potential civil and criminal ramifications
State the defining characteristics of the concept : Describe the authors' purpose for the concept analysis. State the defining characteristics of the concept. Identify antecedents and consequences of the concept.
Evaluate a company performance as a company manager : Managerial Accounting, Analyze and evaluate a company's performance as a company manager as well as an external user of financial information
Explain how criminal justice administrators : Explain how criminal justice administrators, whether in law enforcement, corrections, or the court system, can hold their employees accountable,
CTEC5806 Digital Forensics Assignment : CTEC5806 Digital Forensics: Principles and Practice DL Assignment Help and Solution, De Montfort University - Assessment Writing Service
Crime statistics tell us about crime picture in america : What can crime statistics tell us about the crime picture in America? What four broad categories of criminal defenses does our legal system recognize?
Describe how dorothea orem theory : Explain how Dorothea Orem's theory can be applied to you daily nursing profession? Minimum of 150 words. The response must be typed.
How budgeting process as employed by springfield corporation : How the budgeting process as employed by Springfield Corporation contributes to thefailure to achieve the president's sales and profit targets
Specify when to refer the patient after therapy and why : Specify when to refer the patient after therapy and why? Provide a rationale. Provide patient education. Keep in mind the past medical history of this patient.

Reviews

Write a Review

Computer Networking Questions & Answers

  What type of queue is implemented at the router

What type of queue is implemented at the router - What is the delay for each class of traffic? Justify by calculations.

  You were tasked to handle the urgent delivery

You were tasked to handle the urgent delivery of 10TB of data from your company in Washington, D.C to a subsidiary in San Francisco, CA (2,815 miles away).

  Arrangement of subnet masks

An organization has a class C network 200.1.1 and wishes to form subnets for four departments, with hosts as follows:

  Content analysis summaries to prepare for tests

Content analysis summaries to prepare for tests, examinations and to help their understanding of theoretical concepts

  The file transfer protocol

The File Transfer Protocol (FTP) uses which transport protocol, TCP or UDP? The PING diagnostic is part of which protocol

  Overvieweach student will create a detailed unified

overvieweach student will create a detailed unified technical design of network services given the scenario. prepare

  How many addresses are left

An organisation has been granted a block of addresses starting with the address 172.154.68.0/22.

  Investigate and report on the activities of cert

Conduct a risk assessment of your organization's networks. Some information may be confidential, so report what you can.- Investigate and report on the activities of CERT (the Computer Emergency Response Team).

  Categorical feature comparison for the products

Prepare a report providing categorical feature comparison for the three products in the chosen category and make recommendations about the products to assist purchasing decision.

  Which implementation of the wireless standards is the best

Which implementation of the 802.11 wireless standards is the best? Select and discuss 3 implementations of the standard (802.11x).

  What is voip and how is it different from pots

Voice over the Internet Protocol (VoIP). What is VoIP and how is it different from the Plain Old Telephone Service (POTS)? What are some issues an organization (not individuals) should analyze when evaluating the move from a traditional phone sy..

  Available support of both the ipad and the galaxy tab

Compare and contrast the available accessories, potential for future upgrades, warranties, and available support of both the iPad and the Galaxy Tab

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd