Develop a methodology for digital evidence collection

Assignment Help Computer Engineering
Reference no: EM132001391

Question: Objective: Design a digital forensic incident response and analysis toolkit. Describe the preparation, tools, and procedures necessary for responding to an incident. The description should include the purpose of each tool and the role it plays in an investigation. Develop a scenario response that includes both computer and mobile device examination. Describe how your toolkit and procedures would be used during the scenario from initial notification to report delivery and results presentation.

Course Goals:

1. Develop and utilize a methodology for digital evidence collection, preservation, and analysis.

2. Develop incident response plan and procedures for a variety of digital forensic situations.

3. Evaluate environment for global/international influences and determine implications on forensic procedures.

4. Appraise appropriate digital forensic techniques for Network, Internet, and Cloud-based environments.

5. Incorporate validated forensic results into appropriate action plans, reporting, information sharing, and information archiving procedures.

Scenario: Slatestone Land Development contracted Acer Tree Service to clear land for construction of several homes. The home is located on a bluff with a tree obstructed view of a lake. The tree service cut several trees that were on a private landowner's property that were obstructing the lake view for the new homes. The private landowner is upset because she now has a ‘fish bowl' effect where the new homes are looking at her house whereas before the tree cutting episode her home was secluded.

The developer claims he didn't authorize the tree cutting. The new home owners claim that they didn't request the trees to be cut. Acer Tree Service claims that they were instructed cut all the trees that were marked with red spray paint. Slatestone and Acer have worked in the past, and marking trees with red spray paint is standard practice in the industry. All 18 trees were clearly marked with red paint, though no one from Slatestone was on site to supervise, and Slatestone claims they did not mark the 18 trees that were mistakenly cut.

The private landowner has decided to file a lawsuit for criminal trespass and destruction of property against Slatestone, Acer, and the owners of the new homes for the 18 mature maple trees that were cut. The law firm representing the private landowner has successfully argued for electronic discovery of the phones and computer for the home owners, Slatestone, and Acer in order to establish fault and liability. You have been hired to perform the digital forensic examination. The court order stipulates that only email and text messages from one month prior to the incident to the present time may be retrieved. Further stipulations include that the forensic report must first be provided to opposing counsel and is subject to objection. Additionally, the court order indicates that if you disclose information to the private landowner or her legal representative that you could be subject to civil and criminal prosecution. You have ten days to schedule your evidence collection and submit your reports to opposing counsel.

Deliverables: You need to outline the tools and materials you will need to complete this engagement, indicating how each tool will be utilized. Provide a schedule that outlines your plan for completing the investigation, including coordinating evidence seizure and report dissemination. In a distinct section of your assignment, outline the steps that you will take to comply with the court order. The paper should be 5-7 pages, and include at least five sources.

Reference no: EM132001391

Questions Cloud

Makes only systematic risk affect expected returns : What is the mechanism that makes only systematic risk affect expected returns?
Two policies on consumer surplus and welfare : Compare the effect of these two policies on consumer surplus and welfare. Use a graph to show which policy is superior.
How to avoid deadlocks : COMP 20004 - Operating Systems - How to avoid Deadlocks - Basic concepts related to Memory Management
Represent a socially optimal position regarding price : What is the MC = Mr rule and profit maximization and does this rule represent a socially optimal position regarding price and quantity of goods and services?
Develop a methodology for digital evidence collection : Develop and utilize a methodology for digital evidence collection, preservation, and analysis. Develop incident response plan and procedures for a variety.
State whether company decision to not hedge market risk : State whether the company’s decision to not hedge market risk was correct. Justify your answer with one reason.
Impact of inflation also change with time : Also, discuss as we moved from barter to the gold standard to the current fiat money system, how does the impact of inflation also change with time?
What does that tell us about the optimal capital structure : what does that tell us about the optimal capital structure? How realistic is this assumption?
Find the corresponding continuous compounding rate : Find the corresponding continuous compounding rate assuming that the bond is purchased at par.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd