Describe the phases of the digital forensics

Assignment Help Computer Engineering
Reference no: EM132597462

Question: Digital forensics is often summarized in four phases (e.g. collection, preservation, analysis and reporting). We have learned this already.

However, I think it's important for you to be aware of how there are many different excellent models out there that seek to break down digital forensics in a series of flowcharts / phases / moving parts. Then Chapter 14 talks about the different trends and future directions.

So, I am attaching one research paper that does just that and it is a great read. Please check out the Forensic Models.pdf found in the Supplemental Materials folder.

Some of the models out there are very specific e.g. for network forensics, triage, or cybercrime. It's all fascinating. Then the article proposes a new one Generic Computer Forensic Investigation Model (GCFIM).

I would like you to read this - who knows you may actually see a model that resonates well with you. This can be helpful if you are asked to consult on what is the right model that should be followed in a particular legal matter in today's brave new world.

Instructions: Now that you have reviewed the different models of digital forensics, what are your thoughts about the author's proposed model? Do you agree or disagree? Do you prefer the other models and if so what is your preference and why? Note - there are NO right or wrong answers here. I value your insights. No more than 2 pages please.

Reference no: EM132597462

Questions Cloud

Texas legislature to assemble and make laws : The Texas Constitution strictly limits the amount of time allowed for the Texas Legislature to assemble and make laws.
Research support the notion that criminal profiling : Does current research support the notion that criminal profiling is an art or that it is a science?
What would be gain or loss from sale on January : What would be gain or loss from sale on January 31, Year 6, assuming that the shares are reported using the equity method under IFRS
How much debt the company can handle : Describe how the gross sales you calculated would be useful in determining how much debt the company can handle and stay profitable.
Describe the phases of the digital forensics : Digital forensics is often summarized in four phases (e.g. collection, preservation, analysis and reporting). We have learned this already.
Determine the retained earnings amount to be reported : Determine the retained earnings amount to be reported for the statement of financial position at December 31, Year 10
Calculate the planned and gradual annual depreciation : Calculate the planned and gradual annual depreciation. Describe your calculation process and whether the depreciation would be used in forecasting.
Federalism and public policy lifecycle : Dye (2017) Federalism often creates confusion over which lever of government has the responsibility of handling crises."
Describe one real or potential security moral issue : Identify and describe one real or potential security/ethical/social/moral issue that is raised by Information System/Information Technology in your environment.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What will be the exercise ratio of men and women

What will be the exercise ratio of men and women? Results indicated that women averaged 2 hours per week and men averaged 1.25 hour per week.

  Discuss about various law enforcement agencies

the different IT management roles, various law enforcement agencies, emergency agencies/organizations

  Specific exit off the pennsylvania turnpike

The number of passenger cars taking a specific exit off the Pennsylvania Turnpike on Thanksgiving weekend averages 5 per minute. Of those 50% have only the driver; 30% have 2 people in the car

  Write a program that prints the 128-character ascii table

Write a program that prints the 128-character ASCII table. It should print the table in eight tab-separated columns.

  Write an essay about the presentation

Write an 800 word essay about the presentation "Navigating the Journey of Technology Transformation. The response must be typed.

  What are specialized meteorological models

Why do different meteorologists give different forecasts if they are using the same models? What are specialized meteorological models and how are they used?

  How to explain capacity of the queue

How to explain capacity of the queue

  Sketch a totem pole output stage and explain its operation

Sketch a totem-pole output stage and explain its operation and the advantages of incorporating this circuit in the TTL circuit.

  What services are provided by the tls record protocol

List and briefly define the parameters that define a TLS session connection. What services are provided by the TLS Record Protocol?

  Make a binary tree using an underlying linked-list approach

Write down a C++ program to build a binary tree using an underlying linked-list approach. Include capability to traverse the tree and print out the nodes in a format which makes it readily clear how the tree is organized.

  Create a boxplot of high temperature using month

Create a boxplot of ‘high temperature' using ‘month' as a factor variable.

  Explain the typical operation of a data warehouse

Explains the typical operation of a data warehouse and data marts, along with operational considerations and constraints. Discusses how DreamHome could benefit.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd