Reference no: EM133110982 , Length: 3000 words
Assessment Description
Learning outcome 1: Knowledge and Understanding Recognise and define what digital evidence is, and the role it plays in investigations
Learning outcome 2: Knowledge and Understanding Discuss the legislative and regulatory requirements in relation to digital forensics
Learning outcome 3: Intellectual, practical, affective and transferable skills Analyse complex data and Identify key evidential elements, relating to digital forensics
Learning outcome 4: Intellectual, practical, affective and transferable skills Construct results in appropriate formats to be comprehensible to a varied audience
Question 1: Digital law & Security Principles
You have just started a new job at a new high-tech crime unit. Your first job is to brief your colleagues on the laws that could be useful, in the world of digital forensics. Some of your colleagues are not up to date on these laws and regulations. They are also not good with technology, so please explain complex concepts so that information is comprehensible to a varied audience.
Using the ACPO guidelines (or any other standards/laws you believe to be appropriate) Compare and contrast the differences between collecting, copying and securely storing, both live and static evidence.
You should produce a briefing report that:
- Outlines both the laws and regulations you believe to apply
- Describe the differences between live and static evidence
- List the ways (with examples/cases) that live and static evidence should be gathered/copied/securely stored
Question 2: Digital Forensic Artefacts
A suspect known as Mr Whale has been accused of downloading and distributing various illegal materials, on their Windows 10 based PC. These illegal material takes the form of personal information, blackmail photos/videos and accessing illegal websites. On top of this, someone had started deleting many files from the computer's hard drive. Mr Whale has stated "These alleged files are not mine, I did not do this" also "someone must have broken into my computer and used it without me knowing".
- What digital forensic artefacts, techniques and analysis, can be used to prove if illegal material was once or is currently still on this hard drive?
- What digital forensic artefacts, techniques and analysis, can be used to prove, if Mr Whale deleted these files himself or if it was someone else?
Both questions above must be comprehensible to a varied audience, so it can be understood by non-technical people, (laymen) in court.
Both questions above must be comprehensible to a varied audience, so it can be understood by non-technical people, (laymen) in court.
(We work in a society where we are innocent until proven guilty beyond all reasonable doubt). So, researching some case law for these situations could prove valuable to giving strength, to your argument)
Added Value
This section is specifically for what above and beyond additions the student has included in the report. This could take the form of actually showing and testing artefact analysis, rather than just researching it
Report Presentation and Layout
You are expected to compile a well-constructed, formal written report of no more than 3,000 applicable words. The presentation, layout and ease of reading for the report, will be critical in this document. Please make the information comprehensible to a varied audience.
What are three criteria of effective teams
: What are the three criteria of effective teams, as described in the textbook? How are all three evident in each of the five stages of team development?
|
What is the total amount of sunk cost
: Breezy Company is disposing of equipment that was originally purchased for $540,000. What is the total amount of sunk cost
|
What is the consolidated comprehensive income
: On July 1, 2020, S sold to P a used computer at a loss of P12,000. What is the consolidated comprehensive income attributable to parent
|
Calculate the net present value and internal rate of return
: Use Excel to calculate the net present value and internal rate of return in a format similar to the Computer Application spreadsheet shown in the chapter
|
Digital law and security principles
: Compare and contrast the differences between collecting, copying and securely storing, both live and static evidence - What digital forensic artefacts
|
Expected return of the market portfolio
: 1) Which of the following statements ARE correct? There are more than one answers.
|
Research organizational behavior
: If the researcher is the primary instrument for data collection and analysis, how can we be sure the researcher is a valid and reliable instrument?
|
Withdrawing for 30 consecutive years in retirement
: Your friends are planning to work for 20 more years before retiring to a beach somewhere. Their plan is to invest $12,000 at the end of each of the next ten yea
|
Conditions that influence company performance
: Evaluate economic conditions that influence company performance. Consider political, environmental, currency (money), global economics, and government influence
|