Develop a methodology for digital evidence collection

Assignment Help Computer Engineering
Reference no: EM132001391

Question: Objective: Design a digital forensic incident response and analysis toolkit. Describe the preparation, tools, and procedures necessary for responding to an incident. The description should include the purpose of each tool and the role it plays in an investigation. Develop a scenario response that includes both computer and mobile device examination. Describe how your toolkit and procedures would be used during the scenario from initial notification to report delivery and results presentation.

Course Goals:

1. Develop and utilize a methodology for digital evidence collection, preservation, and analysis.

2. Develop incident response plan and procedures for a variety of digital forensic situations.

3. Evaluate environment for global/international influences and determine implications on forensic procedures.

4. Appraise appropriate digital forensic techniques for Network, Internet, and Cloud-based environments.

5. Incorporate validated forensic results into appropriate action plans, reporting, information sharing, and information archiving procedures.

Scenario: Slatestone Land Development contracted Acer Tree Service to clear land for construction of several homes. The home is located on a bluff with a tree obstructed view of a lake. The tree service cut several trees that were on a private landowner's property that were obstructing the lake view for the new homes. The private landowner is upset because she now has a ‘fish bowl' effect where the new homes are looking at her house whereas before the tree cutting episode her home was secluded.

The developer claims he didn't authorize the tree cutting. The new home owners claim that they didn't request the trees to be cut. Acer Tree Service claims that they were instructed cut all the trees that were marked with red spray paint. Slatestone and Acer have worked in the past, and marking trees with red spray paint is standard practice in the industry. All 18 trees were clearly marked with red paint, though no one from Slatestone was on site to supervise, and Slatestone claims they did not mark the 18 trees that were mistakenly cut.

The private landowner has decided to file a lawsuit for criminal trespass and destruction of property against Slatestone, Acer, and the owners of the new homes for the 18 mature maple trees that were cut. The law firm representing the private landowner has successfully argued for electronic discovery of the phones and computer for the home owners, Slatestone, and Acer in order to establish fault and liability. You have been hired to perform the digital forensic examination. The court order stipulates that only email and text messages from one month prior to the incident to the present time may be retrieved. Further stipulations include that the forensic report must first be provided to opposing counsel and is subject to objection. Additionally, the court order indicates that if you disclose information to the private landowner or her legal representative that you could be subject to civil and criminal prosecution. You have ten days to schedule your evidence collection and submit your reports to opposing counsel.

Deliverables: You need to outline the tools and materials you will need to complete this engagement, indicating how each tool will be utilized. Provide a schedule that outlines your plan for completing the investigation, including coordinating evidence seizure and report dissemination. In a distinct section of your assignment, outline the steps that you will take to comply with the court order. The paper should be 5-7 pages, and include at least five sources.

Reference no: EM132001391

Questions Cloud

Makes only systematic risk affect expected returns : What is the mechanism that makes only systematic risk affect expected returns?
Two policies on consumer surplus and welfare : Compare the effect of these two policies on consumer surplus and welfare. Use a graph to show which policy is superior.
How to avoid deadlocks : COMP 20004 - Operating Systems - How to avoid Deadlocks - Basic concepts related to Memory Management
Represent a socially optimal position regarding price : What is the MC = Mr rule and profit maximization and does this rule represent a socially optimal position regarding price and quantity of goods and services?
Develop a methodology for digital evidence collection : Develop and utilize a methodology for digital evidence collection, preservation, and analysis. Develop incident response plan and procedures for a variety.
State whether company decision to not hedge market risk : State whether the company’s decision to not hedge market risk was correct. Justify your answer with one reason.
Impact of inflation also change with time : Also, discuss as we moved from barter to the gold standard to the current fiat money system, how does the impact of inflation also change with time?
What does that tell us about the optimal capital structure : what does that tell us about the optimal capital structure? How realistic is this assumption?
Find the corresponding continuous compounding rate : Find the corresponding continuous compounding rate assuming that the bond is purchased at par.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe the advantages of this method

Early versions of Windows did not support true preemptive multitasking. Instead, designers of Windows provided something they called "cooperative multitasking".

  Display total cost of their selection including sales tax

Create Web site that allows users to enter their first and last names phone number and e-mail. Display the total cost of their selection including 7% sales tax.

  Write per bullet that focuses on security engineering

Write per bullet that focuses on security engineering - The paper must include at least 3 references in addition to the class textbooks and the Bible

  Economic life of technology product

Explain what do you understand by the economic life of a technology product. Discuss how does economic life of the technology product is compared with the technology life and product life?

  Disadvantages of acquiring same hardware for all purchase

What are the advantages and disadvantages of acquiring the same hardware for all purchases versus a mix and match environment.

  Overviewwrite a program to calculate the component voltages

overviewwrite a program to calculate the component voltages for the following series resonant rlc circuit.the input

  Study resources that are available for security professional

Analyze the selected two resources that are available for security professionals to find information about threats and / or malware active today. Justify your belief these resources are helpful for security professionals.

  What indicates the big-o value

What indicates the Big-O value of a given method (or algorithm) - What represent the best-case, average-case and worst-case performance of an algorithm?

  Which will be executed had these names

How would I write down a shell script to locate executable files? This script takes a list of file names from the command line and determines which would be executed had these names been given as commands.

  Investigate what may be a perceived threat to environment

How many devices are connected to the internet - analyzing a users web access or installed applications - information security professional

  Plot the mutual information between the input and output

A binary nonsymmetric channel is characterized by the conditional probabilities p(O I 1) = 0.2 and p(l I 0) = 0.4. Plot the mutual information I(X; Y).

  Describe the mapping of c stream functions

Describe the mapping of C stream functions (fopen, fread, fwrite, fclose) to device driver interfaces?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd