Do you think you could justify the process

Assignment Help Management Information Sys
Reference no: EM133389278

Question: Since you performed a JTAG image analysis in Week 6 and performed an analysis in this week of a Chip-Off image. Your assignment for this week is to look back at your 2 images and the lab reports you wrote and complete the assignment based on the scenario below.

At Dig4ensics you have completed both a JTAG and Chip-Off image analysis and covered questions pertaining to the analysis of the evidence. You will be presenting to your boss the justification for the company to spend money on one or the other data recovery processes. In your presentation answer the questions below while discussing which process was able to find more information. After answering the questions, make your recommendation to your boss on which process they should spend money on to help in recovering data. After analyzing your results from the lab analysis can you make a justification for using JTAG or Chip-Off for data recovery? If so, make sure to use proof from your lab analysis to justify your answer. In the presentation, make sure to pick one process over the other for your recommendation and why you picked it. Also, if you think you can make an argument to justify your boss spending money on equipment that will allow you to perform both JTAG and Chip-Off analysis, make that argument in the presentation.

Make sure to follow the following questions within your presentation:

  1. The Chip-Off had a different call log number than the JTAG showed. What was the difference between the two? The time is 1/1/2014 12:00:45 AM. Do you think this is an actual call from the user or something from the factory?
  2. Did the Chip-Off and JTAG analysis show the same number of QuickBooks Files found? If not, do you think that could be important?
  3. Looking at the Chip-Off image and the JTAG image, did the same number of audio files show as found between the Audio and Carved Audio?  What is the difference in the audio that was found, just number wise? Then could you find what was different and do you think this could make a difference in a case?
  4. Did the Chip-off processing find the same number of pictures or were they different from the JTAG? If different, what kind of implications could that mean?
  5. Does the Chip-Off image show Android Snapchat stories like the JTAG image does? What is missing that one method shows that the other does not?
  6. Are the results the same?
  7. If you could only do one method, what would it be?
  8. Based on your observations, is it worth attempting to complete both methods of evidence gathering on a mobile device if possible?
  9. Based on what you found, do you think you could justify the process to your boss and be able to explain the reasons?

Reference no: EM133389278

Questions Cloud

What is the sentencing structure for drug offenses : What is the sentencing structure for drug offenses in your state? What types of sanctions are used for drug convictions in your state? Are the sentencing
How many customers were affected : How many customers were affected and what kind of data was lost? If the organization was not sure (or did not say) what was lost, state this in your post
Discuss the way each of these steps enables : Discuss the way each of these steps enables "things" to engage in every part of your life. As humans lose the ability to choose to restrict gathering
What condition would lead the traditional ira to beat : Is it possible for a traditional IRA to generate a higher after-tax return than a Roth IRA, when both are invested in the same assets? If yes, what condition
Do you think you could justify the process : Based on what you found, do you think you could justify the process to your boss and be able to explain the reasons and Based on your observations, is it worth
Execute the command to conduct a default nmap scan : execute the command to conduct a default nmap scan of ports 80 or 443 on any system with an IP address between 172.30.0.0 and 172.30.0.20
Explain why you feel that group of attackers are the worst : Indicate who you feel are type of Cyber Attackers that are the worst offenders. Explain why you feel that group of attackers are the worst
What would be the maximum capital cost allowance : A sole proprietor began a business on July 1, 2022 and purchased the following assets: office furniture for $7,000, computer for $3,000, and application
Write about a specific it improvement : write about a specific IT improvement (implementation) project failure that you have experienced before at your workplace.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Compare the planning and control mechanisms

Compare and contrast the planning and control mechanisms required by one traditional software development process model

  Describe the effect of bring-your-own-device to organization

Describe how you can assess the security of your endpoint communications devices. Specific to these types of devices, describe the effect of bring-your-own-device (BYOD) to organizations.

  Analyze the fundamental impact of enterprise architecture

Analyze the fundamental impact of IT architecture or enterprise architecture on information management for your chosen company or industry.

  Identify and prioritize it security controls

Using the case study and NIST SP 800-53, Identify and prioritize IT Security controls that should be implemented. Discuss any applicable US Government regulations/standards that apply to this organization

  The different iss policies associated with risk management

Analyze the different ISS policies associated with the IT infrastructure. Describe the different ISS policies associated with risk management.

  Draft a logical diagram in visio

Draft a logical diagram in Visio®. Include the IP address schema. Unlike a physical diagram, this diagram should show routing information, traffic flows.

  Explain the technology standards and best practices

Discuss needed revisions to the company's outsourcing plan based on your analysis of technology standards and infrastructure.

  Evaluate the current ethical and legal concerns

Conduct a SWOT analysis by analyzing the strengths, weaknesses, application opportunities, and threats from competitors of the chosen topic.

  What are the basic methods of attacking locks

What are the basic methods of attacking locks and some ways to circumvent locks if they cannot be opened?

  Provide a connection between theory and practice

Write a paper in which you explain your concept map, the components, and relationships. Explain how all of the concepts are related and inter-related.

  Describe the various types of http objects

Describe the various types of HTTP objects that organizations monitor and what challenges organizations face.

  Challenges to design a supply chainif you were to be tasked

challenges to design a supply chainif you were to be tasked to design a supply chain what are some of the challenges

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd