Determine the negative effects on an investigation

Assignment Help Computer Engineering
Reference no: EM131830014

Assignment: Data Acquisition Lecture

This assignment consists of two (2) parts: a written paper and a PowerPoint presentation. You must submit both parts as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

Imagine you've been sought out as a guest lecturer at a local university for a computer forensics course. You have been asked to prepare a paper for the students, as well as a PowerPoint presentation, regarding data acquisition in a forensics investigation.

Part 1: Written Paper

1. Write a four to five (4-5) page paper in which you:

a) Analyze the four (4) methods of data acquisition to determine how an investigator selects the appropriate method to use in a given situation.

b) Determine how an investigator can plan for hardware, software, and / or general failures during data acquisition.

c) Justify the necessity of validating data acquisition and determine the negative effects on an investigation if this step is not performed.

d) Describe the acquisition procedures and tools for Windows and Linux data acquisitions.

e) Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA format.

Part 2: PowerPoint Presentation

Use Microsoft PowerPoint or an open source alternative, such as OpenOffice, to:

2. Create a five to ten (5-10) slide PowerPoint presentation in which you:

a) Summarize the concepts from your written paper in Part 1 of this assignment for the lecture you would give to the class regarding data acquisition in a forensics investigation.

b) Use a professional technically written style to graphically convey the information.

The specific course learning outcomes associated with this assignment are:

• Describe and analyze practices in obtaining digital evidence.

• Describe operating system configurations and techniques in a forensic investigation.

• Use technology and information resources to research advanced issues in computer forensics.

• Write clearly and concisely about topics related to computer forensics planning using proper writing mechanics and technical style conventions.

Reference no: EM131830014

Questions Cloud

Estimate the proportion of opposition : Using a 95% confidence interval, estimate the proportion of opposition throughout the population of potential voters.
Advise client a suitable project management methodology : PPMP20009 Project Management Methodology - Do you agree or disagree with Adam's statement that Agile Methodology is specifically designed for IT projects
Number of auto thefts per neighborhood per year : The police department of a major city reports that the mean number of auto thefts per neighborhood per year is (µ) 6.88 with a standard deviation
Provide a historic summary of where the star ratings system : Provide a historic summary of where the star ratings system evolved from, as well as a brief history of how Tripadvisor came about.
Determine the negative effects on an investigation : Justify the necessity of validating data acquisition and determine the negative effects on an investigation if this step is not performed.
Possible tax implications when selling fixed asset : For which values of marginal tax rates would you prefer to buy the municipal bond? Describe the possible tax implications when selling a fixed asset.
Standard error of the mean calculated : When constructing a confidence interval for the mean with s known, how is the standard error of the mean calculated?
Compute the return on stockholders equity : Sepracor, Inc., a drug company, reported the following information. Compute the Return on stockholders equity
How is the standard error of the mean estimated : When constructing a confidence interval for the mean with s unknown, how is the standard error of the mean estimated?

Reviews

Write a Review

Computer Engineering Questions & Answers

  What are techniques for addressing security requirements

What are techniques for addressing security requirements? Which have a business relationship with the company?

  Designing a write buffer and explain how to design

You are designing a write buffer between a write through L1 cache and a write back L2 cache.

  Expand or contract the number of phases

What is the Software/System Development Life Cycle (SDLC) and can we expand or contract the number of phases depending on the particular project?

  Write a statement that will draw a circle centered on point

Assuming you have a Graphics object called shape, write a statement that will draw a square with a height of 100, such that its upper-left corner is at point.

  Discuss the optimality of the dynamic programming solution

Discuss the optimality of the dynamic programming solution. Discuss the time complexity of this algorithm in terms of the size of the inputs X and Y.

  What is the output of the given programs

What is the output of the following programs? (Please try to solve the problem without compiling and running the program.)

  What types of technology will be involve in the architecture

Identify what types of technology will be involved in the architecture and explain the purpose of each technology. Create a graphical representation of your recommended architecture.

  Make program that take in a date in the format yyyymmdd

make program that take in a date in the format YYYYMMDD and output it as MM/DD/YYYY, where YYYY stands for year, MM stands for month, and DD stands for day.

  Questiondodocs contains tasks 1-7perform task 1-7 from

questiondo.docs contains tasks 1-7perform task 1-7 from backup services database -create the clients by service rep

  Construct a bcd-to-excess-three-code converter

Construct a BCD-to-excess-3-code converter with a 4-bit adder. Remember that the ex-cess-3 code digit is obtained by adding three to the corresponding BCD digit. What must be done to change the circuit to an excess-3-to-BCD-code converter?

  Pros and cons of different security techniques

Why is it important for an organization to follow the standard systems acquisition method?pros and cons of different security techniques.

  Write down a not so bad cardiac simulator

The user has to be prompted to type in a 3 digit number, and then the program should print to the screen whatever the CARDIAC Instruction Decoder box would show had that been the instruction.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd