Reference no: EM131063289
Forensic Investigation Case Study
Background
Linda is suspected of accessing and possessing digital content pertaining to ‘clowns', and being in possession of, and using encryption software. Accessing, possessing, or distributing of any digital content pertain to ‘clowns' is considered illegal and may carry severe penalties. Private communication, including the use of encryption software or techniques is strictly forbidden in the country.
You are a consultant who specialises in Digital Forensic investigations. You have been assigned the task of examining an image of Linda'slaptop which was seized with the appropriate warrants and imaged using forensically sound practices.Unfortunately, the junior investigator who obtained a ‘forensic image' of Linda's laptop only performed a logical acquisition. To make matters worse, the junior investigator then went on to forensically wipe Linda's hard drive. The logical acquisition was undertaken in a forensically sound manner and the md5 value is "5046fdcc23d05e7535801353bf832a7d".
At this point in time it is unknown if Linda was also distributing the digital content of ‘clowns'. Linda denies accessing and possessing any content pertaining to the ‘clowns', or possessing and using encryption software. Linda has stated that she believes she is simply the victim of cyber crime, and doesn't understand why anyone would want to target her. Linda claims that she may have been targeted after a recent online interaction with an unknown individual who was supposed to help secure her computer.
Task
Your task is to investigate the supplied image using appropriate tools and forensic process and to develop and submit a written report on your findings. You may use any tools to undertake the investigation but you must justify all of your actions!
Report Structure
Your reportmust be structured as follows:
• Cover Page
• Table of Contents
• Overview of Tasks
o What were you looking for?
o How did you approach the investigation?
o What did you do?
o What did you find?
o In YOUR expert opinion what is the outcome of the investigation?
• Issue #1 Presentation of content relating to offence
• Issue #2 Identification
• Issue #3 Intent
• Issue #4 Quantity of Files
• Issue #5 Installed Software
• Appendix A
o Running Sheet
-This section should contain a well-structured running sheet (in table form) showing what do you did, how you did it, and what was the outcome. This should be very detailed and show clear use of the forensic process.
-The process must be detailed enough so that the procedures can be repeated and results reproduced.
-You must clearly state the date/time you undertook the action in the running sheet.
• Appendix B
o Timeline of events (chronological order of events on Linda's laptop).
The vice-president for human resources in learning
: 1. Sandra Pilsden, the Vice-President for Human Resources in Learning, Inc. was concerned about a recent memo she had recently received from the CEO's office regarding the possibility of outsourcing the payroll function to Salary Experts, a growin..
|
Denote the linear function ofz
: Write the same relationship whend51, where you should usef1(z) on the left-hand side to denote the linear function ofz
|
Why critical thinking is important
: Last week, you were asked to consider which stage of critical thinking you felt that you were in. This week, building off last week's assignment and lecture, we know that employers are wanting more critical thinking from their employees.
|
Find outstanding load balance after five years of payment
: How much should you pay monthly for a loan of $1,000,000 for 15 years at a rate of 9% per annual. Find Monthly load payment. How much is the outsanding loan balance after 5 years of payment? Find outstanding load balance after 5 years of payment.
|
Forensic investigation case study
: Forensic Investigation Case Study - Linda is suspected of accessing and possessing digital content pertaining to ‘clowns', and being in possession of, and using encryption software
|
Closing case negotiating salaries on the web
: Once upon a time, negotiations about individual wages and salaries were typically handled in a meeting between the employee and his or her manager.
|
How many hours will it take thebullock cart to travel 20 km
: A bullock cart can travel at the rate of 4 kmph for the first two hours of a trip. After the firsttwo hours, the bullock cart's speed drops to 3 kmph. How many hours will it take thebullock cart to travel 20 km?
|
What is the implied overall capitalization rate
: A property is being appraised assuming NOI will be $250,000 per year over the 25-year remaining economic life of the building. Using the sales comparison approach, land is found to be worth $500,000 today. What is the total property value? What is th..
|
Impact of transferring demand information
: 1. What is the impact of transferring demand information across the supply chain? 2. How can supply chains meet the conflicting goals of different partners and facilities?
|