Digital forensic

Assignment Help Basic Computer Science
Reference no: EM132816214

Scenario

You are an employee at D&B Investigations, a firm that contracts with individuals, companies, and government agencies to conduct computer forensics investigations. D&B employees are expected to observe the following tenets, which the company views as the foundation for its success:

Give concerted attention to clients' needs and concerns.

Follow proper procedures and stay informed about legal issues.

Maintain the necessary skill set to apply effective investigative techniques using the latest technologies.

Your manager has just scheduled a meeting with an important prospective client, and she has asked you to be part of the team that is preparing for the meeting. The prospective client is Brendan Oliver, a well-known celebrity. Last night, Mr. Oliver's public relations team discovered that someone obtained three photos that were shot on his smartphone, and tried to sell the photos to the media. Due to the sensitive nature of the photos, Mr. Oliver and his team have not yet contacted law enforcement. They would like to know if D&B can provide any guidance or support related to the investigation-or, at the very least, if D&B can help them prevent similar incidents from occurring in the future. At this time, they do not know how the photos were acquired. The public relations team is wondering if a friend, family member, or employee could have gained direct access to Mr. Oliver's phone and obtained the photos that way, although the phone is usually locked with a passcode when Mr. Oliver is not using it. In addition, Mr. Oliver emailed the photos to one other person several months ago. He has not spoken with that person in the last few weeks, but he does not believe that person would have shared the photos with anyone else.

Your manager plans to use this initial meeting with Mr. Oliver and his public relations team to establish rapport, learn more about the case, and demonstrate the firm's expertise. The company sees this as an opportunity to build the future business, regardless of whether they are retained to help with the investigation of this case.

Tasks

To help the team prepare for the meeting, your manager asks you (and your colleagues) to consider and record your responses to the following questions:

What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation?

Based on the limited information provided in the scenario, what is the rationale for launching an investigation that uses computer forensic activities? Would D&B and/or law enforcement need additional information in order to determine if they should proceed with an investigation? Why or why not?

What would you share with the client about how investigators prepare for and conduct a computer forensics investigation? Identify three to five key points that are most relevant to this case.

What sources of evidence would investigators likely examine in this case? Provide concrete examples and explain your rationale.

What should the client, investigators, and others do-or not do-to ensure that evidence could be used in a court of law? Using layman's terms explains laws and legal concepts that should be taken into account during the collection, analysis, and presentation of evidence.

What questions and concerns do you think the client will have?

What questions should the team ask the client to learn more about the case and determine the next steps?

Reference no: EM132816214

Questions Cloud

Explain the right-to-work law : The National Labor Relations Act of 1935 states that all employees must join the union if a union becomes the collective bargaining representative.
Describe how childrens sense of self develops : How would you describe how childrens sense of self develops from both social interactions with peers and adults? What are some interventions that can be used
What amount of money must be in the retirement fund : What amount of money must be in the retirement fund on John's 65th birthday if he will withdraw $6,000 then and every subsequent month?
What state or governmental programs are available : Write a paper on: is access to dental care really a problem for the elderly? What programs are available in the united states to assist the elderly with access.
Digital forensic : You are an employee at D&B Investigations, a firm that contracts with individuals, companies and government agencies to conduct computer forensics investigation
What increase in average nightly revenue attributable : What increase in average nightly revenue attributable to summer, rather than the menu change, is? A local Birmingham-area restaurant chain introduced
Conduct an internet search to learn more about the program : The Hawaii Opportunity Probation with Enforcement (HOPE) is a community supervision strategy for substance-abusing probationers. The main goals of HOPE are.
Compute the npv for projects : NPV versus IRR Consider the following cash flows on two mutually exclusive projects for the Bahamas Recreation Corporation (BRC). Both projects require an annua
Explain the difference-in-difference estimate of the increas : Explain The difference-in-difference estimate of the increase in average nightly revenue attributable to the menu change is? Birmingham-area restaurant chain

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd