Determine the legal and ethical considerations

Assignment Help Other Engineering
Reference no: EM131607249 , Length: word count:1000

Task

Task 1: Hands-On Projects
Complete the following Hands-On Projects from the textbook (Nelson, Phillips, & Steuart 2015):

Hands-On Project 1-4
Hands-On Project 1-6

Deliverable: For project 1-4 and 1-6 provide screenshots of all steps taken to complete the project along with a description of each step.

Complete the following Hands-On Projects from the textbook (Nelson, Phillips, & Steuart 2015):
Hands-On Project 4.3
Hands-On Project 4-4

Deliverable: For project 4-3 and 4-4 provide screenshots of all steps taken to complete the project along with a description of each step.

Task 2: Case Project

You need to acquire an image of a disk on a computer that can't be removed from the scene, and you discover that it's a Linux computer. What are your options for acquiring the image? Write a brief instruction specifying the hardware and software you would use.

Write a 300-500 word instruction outlining the software name and hardware that you may use in the scenario to archive the Linux image acquisition task.

Task 3: Research Project

Several graphics files were transmitted via e-mail from an unknown source to a suspect in an ongoing investigation. The lead investigator gives you these graphics files and tells you that at least four messages should be embedded in them. Use your problem-solving and brainstorming skills to determine a procedure to follow. Write a short report outlining what to do.

Deliverable: Write a 300-500 word report that outlines the investigation and forensic on graphic files.

Rationale

This assessment task covers digital crime, forensic process and procedures, data acquisition and validation, e-evidence, e-discovery tools and equipment, operating systems and file systems. This assessment has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to:

determine the legal and ethical considerations for investigating and prosecuting digital crimes
formulate a digital forensics process
evaluate the technology in digital forensics to detect, prevent and recover from digital crimes
analyse data on storage media and various file systems
collect electronic evidence without compromising the original data;
evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab;
compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation;
prepare and defend reports on the results of an investigation.

Reference no: EM131607249

Questions Cloud

Discuss the financial reasons of business associate : A business associate who owes you $3000 offers to pay you $2800 now, or else pay you three yearly installments of $1000 each, with the first installment paid.
How can governments of countries improve inhabitants : As we move even more to a global economy, will the wealth of individuals rise or fall? How can governments of countries improve inhabitants' lives and standards
Find the continuous interest rate that yields a future value : Find the continuous interest rate that yields a future value of $18,000 in 20 years for each $9000 investment.
What is the relationship between dna methylation and cancer : Scroll down the page. What is the relationship between DNA methylation and cancer? HINT TO GET FULL POINTS: Read this entire section, not just the top.
Determine the legal and ethical considerations : determine the legal and ethical considerations for investigating and prosecuting digital crimes and formulate a digital forensics process
What is the optimal level of capital for the firm : Suppose the corporate tax rate on accounting profits is 40%. The firm can include depreciation at the rate d per year in its accounting costs
Continuous yearly interest rate is needed in savings account : A family wants to save for college tuition for their daughter. What continuous yearly interest rate r% is needed in their savings account if their deposits.
Discuss what avenues are now open to trent : What avenues are now open to Trent. What does this case say to you about the need for supervisors to act morally
Explain the theory relates to crime in general : Explain the manner in which the theory relates to crime in general

Reviews

len1607249

8/21/2017 6:28:53 AM

Task 3: Research Project (5 Marks) Criteria HD 100% - 85% DI 84% - 75% CR 74% - 65% PS 64% - 50% FL 49% - 0 300-500 words Report on investigation and forensic methods Standard practice for investigation and forensic methods excellence explanation, justification with example(s) on actual graphic files. Standard practice for investigation and forensic methods reasonable explanation, justification with example(s) on actual graphic files. Standard practice for investigation and forensic methods some minor errors in explanation, justification with example(s) on actual graphic files. Standard practice for investigation and forensic methods provided but it lacks reasoning for the with example(s) on actual graphic files. Little or no evidence of research conducted. Possible marks 5.0 – 4.25 4.24 – 3.75 3.74 – 3.25 3.24 – 2.5 2.4 – 0 Presentation Ensure all tasks are identified with headings. Use single reference list at the end of document. Submit the assignment in ONE word or pdf file on Turnitin. Please do not submit *.zip or *.rar or multiple files

len1607249

8/21/2017 6:28:46 AM

Task 2: Case Project (5 Marks) Criteria HD 100% - 85% DI 84% - 75% CR 74% - 65% PS 64% - 50% FL 49% - 0 300-500 word instruction Hardware and software instruction with excellent explanations and justifications. Hardware and software instruction with reasonable explanations and justifications. Hardware and software instruction with some minor errors in explanations and justifications. Hardware and software instruction provided but it lacks reasoning for the explanations and justifications. Hardware and software instruction is provided but it didn’t address the questions asked. Possible marks 5.0 – 4.25 4.24 – 3.75 3.74 – 3.25 3.24 – 2.5 2.4 – 0

len1607249

8/21/2017 6:28:36 AM

Possible marks 4.0 – 3.4 3.3 – 3.0 2.29 – 2.6 2.5 – 2.0 1.9 – 0 Hands-On Projects 4.3 and 4.4 (6 marks) Projects are completed, evidence of all steps is provided, Complete report is inserted in the assignment. Projects are completed, evidence of most steps is provided, report is inserted in the assignment. Projects are mostly completed, some minor errors in report. Projects mostly completed but with errors, some steps are missing, report is missing some details. Evidence of some steps is provided, reports are missing most details. Possible marks 6.0 – 5.1 5.0 – 4.5 4.4 – 3.9 3.8 – 3.0 2.9 – 0 Compulsory: Ability to demonstrate and explain this task to your lecturer/instructor in class prior to submitting your assignment. No mark will be awarded if the required task has not been demonstrated and/or explained in class.

len1607249

8/21/2017 6:28:26 AM

Marking criteria Task 1: Hands-On Projects (10 Marks) Criteria HD 100% - 85% DI 84% - 75% CR 74% - 65% PS 64% - 50% FL 49% - 0 Hands-On Projects 1.4 and 1.6 (4 marks) Projects are completed, evidence of all steps is provided, complete report is inserted in the assignment. Projects are completed, evidence of most steps is provided, report is inserted in the assignment. Projects are mostly completed, some minor errors in report. Projects mostly completed but with errors, some steps are missing, report is missing some details. Evidence of some steps is provided, reports are missing most details. Compulsory: Ability to demonstrate and explain this task to your lecturer/instructor in class prior to submitting your assignment. No mark will be awarded if the required task has not been demonstrated and/or explained in class.

len1607249

8/21/2017 6:28:00 AM

This assessment task covers digital crime, forensic process and procedures, data acquisition and validation, e-evidence, e-discovery tools and equipment, operating systems and file systems. This assessment has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to: determine the legal and ethical considerations for investigating and prosecuting digital crimes formulate a digital forensics process evaluate the technology in digital forensics to detect, prevent and recover from digital crimes analyse data on storage media and various file systems collect electronic evidence without compromising the original data; evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab; compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation; prepare and defend reports on the results of an investigation.

Write a Review

Other Engineering Questions & Answers

  How many binary bits does it take to represent given number

How many binary bits does it take to represent 100,000,000,000? Using P-type and N-type transistors, design an implementation of the exclusive OR gate.

  What type of externality arises from studying

Earning more will enable them to spend more on their future families for things such as orthodontia, nice clothes, admission to expensive colleges, and travel. Tom thinks about the potential benefits to his potential children when he decides how ..

  Determine the model closure time if the length ratio

If the closure time for the prototype gates is 20 min, determine the model closure time if the length ratio is (1) 1:50 and (2) 1:100.

  What additional capacitance must be connected to drain node

A common-source amplifier fed with a low-resistance signal source and operating with gm = 2mA/V has a unity-gain frequency of 2 GHz. What additional capacitance must be connected to the drain node to reduce ft to 1 GHz?

  Utilized for the configuration of the event counter

1. What commands are utilized for the configuration of the Event Counter? How does each affect the operation of the Event Counter? 2. What signal was observed at the output of DACA? What is the signal frequency of the DACA wave? What is ..

  Describe four major groups of controls on the oscilloscope

Describe the four major groups of controls on the oscilloscope and the purpose of each group. If you are having difficulty obtaining a stable display, which group of controls should you adjust?

  Designs of the past and present

Identify which style of housing borrows from many housing designs of the past and present:-

  Why is failure rate important for system engineering

Why is failure rate important for system engineering reliability? Can you elaborate the impact of failure rates on system engineering reliability

  Create a presentation on linkages and application to society

Update and create 3 powerpoint slides for the attached slides and aquaponics system project "Linkages and Applications to Society". Also, create a word document explaining each slide explaining in detail as a presentation.

  Describe diagrams operation of a safety relay system used

A new robot cell has been installed to operate along with the conveyor system above. You have been asked to: Describe with the aid of diagrams, the operation of a safety relay system used on a robot cell.

  What is required for thermal desalination

EME 4013 - Heat Transfer - Design Project. Preliminary Reply Investigation: some (not all) considerations during the first week: What is required for thermal desalination? What are the possible energy sources you may use to boil the seawater

  Explain roofs of houses using bernoullis principle

Roofs of houses are sometimes "blown off" during a tornado or hurricanes. Explain this using Bernoulli's principle. Can you think of other examples where this effect is observed or used?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd