Describe the phases of the digital forensics

Assignment Help Computer Engineering
Reference no: EM132597462

Question: Digital forensics is often summarized in four phases (e.g. collection, preservation, analysis and reporting). We have learned this already.

However, I think it's important for you to be aware of how there are many different excellent models out there that seek to break down digital forensics in a series of flowcharts / phases / moving parts. Then Chapter 14 talks about the different trends and future directions.

So, I am attaching one research paper that does just that and it is a great read. Please check out the Forensic Models.pdf found in the Supplemental Materials folder.

Some of the models out there are very specific e.g. for network forensics, triage, or cybercrime. It's all fascinating. Then the article proposes a new one Generic Computer Forensic Investigation Model (GCFIM).

I would like you to read this - who knows you may actually see a model that resonates well with you. This can be helpful if you are asked to consult on what is the right model that should be followed in a particular legal matter in today's brave new world.

Instructions: Now that you have reviewed the different models of digital forensics, what are your thoughts about the author's proposed model? Do you agree or disagree? Do you prefer the other models and if so what is your preference and why? Note - there are NO right or wrong answers here. I value your insights. No more than 2 pages please.

Reference no: EM132597462

Questions Cloud

Texas legislature to assemble and make laws : The Texas Constitution strictly limits the amount of time allowed for the Texas Legislature to assemble and make laws.
Research support the notion that criminal profiling : Does current research support the notion that criminal profiling is an art or that it is a science?
What would be gain or loss from sale on January : What would be gain or loss from sale on January 31, Year 6, assuming that the shares are reported using the equity method under IFRS
How much debt the company can handle : Describe how the gross sales you calculated would be useful in determining how much debt the company can handle and stay profitable.
Describe the phases of the digital forensics : Digital forensics is often summarized in four phases (e.g. collection, preservation, analysis and reporting). We have learned this already.
Determine the retained earnings amount to be reported : Determine the retained earnings amount to be reported for the statement of financial position at December 31, Year 10
Calculate the planned and gradual annual depreciation : Calculate the planned and gradual annual depreciation. Describe your calculation process and whether the depreciation would be used in forecasting.
Federalism and public policy lifecycle : Dye (2017) Federalism often creates confusion over which lever of government has the responsibility of handling crises."
Describe one real or potential security moral issue : Identify and describe one real or potential security/ethical/social/moral issue that is raised by Information System/Information Technology in your environment.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd