Role of a forensics investigation trainee

Assignment Help Basic Computer Science
Reference no: EM131348926

In this course, you will assume the role of a forensics investigation trainee at Two Way Communications, a telecommunications company. You will conclude your training period by completing projects supporting each of the three forensics specialists, each of whom work on different parts of the investigation process. You will work on this project in phases, beginning in Unit 1 and building on it with each subsequent unit.

Read the following project information, which will give you all the details you need to get started.

  • There has been a report of an employee using unauthorized software licenses that may have been illegally downloaded from the Internet. This is a violation of the company's Internet Usage Policy and an ethics violation. In order to investigate this matter, one of the forensics specialists asks you to write a 1-2 page report describing the following.
  • What tools you will you use to gather evidence? What kind of evidence will you need?
  • Will you use a single evidence form or a multi-evidence form to complete intake of this evidence? Identify the form you will need and prepare the following information: nature of case, location where evidence was obtained, description of evidence, and vendor name. Then describe how you would secure the evidence.
  • You have isolated the illegally downloaded software to a legacy operating system that is no longer publicly in use, but no one on the team is familiar enough with this system to begin investigations. List resources you would use to take next steps in this investigation.

Submit the assignment as a Microsoft Word document using the template provided to the Unit 1 Part 3 Dropbox.

Reference no: EM131348926

Questions Cloud

Calculate the monthly returns for your company : FIN10708 Session 3 2016 Assignment. Calculate the monthly returns for your (first assigned) company's shares for the 12 months ending 31st December 2016. You should calculate the capital gain/loss yield only; that is, ignore dividends. Get the nec..
Preparation required for an effective virtual meeting : Write an essay that describes the preparation required for an effective virtual meeting. What are the key things that a facilitator need to do to keep the meeting on track. Your essay must also address V-meeting checklist, V-meeting agenda, Sched..
Why you interested in bachelor of interdisciplinary studies : Tell us why you are interested in the Bachelor of Interdisciplinary Studies and what interdisciplinary means to you.
Describe any difficulties you have had finding information : As your first message, send your annotated bibliography and also include a 150-200 word introduction describing any difficulties you've had finding information and requesting help from your classmates.
Role of a forensics investigation trainee : In this course, you will assume the role of a forensics investigation trainee at Two Way Communications, a telecommunications company. You will conclude your training period by completing projects supporting each of the three forensics specialists..
Develop and present to dr clark a detailed progress report : Develop and present to Dr. Clark a detailed 500-word progress report (in business memo format)describing (1) the progress you have made, (2) challenges yet to be overcome.
Add the opposition mla and refutation mla : Add the Opposition MLA and Refutation MLA to the Argument essay. - The topic is : "Importance of College Education".
Learning about security policies and implantation : We have now spent several weeks learning about security policies and implantation. Discuss the importance of having security policies in place. Be sure to provide thorough, detailed and well supported answers.
Write a paper about poverty is getting worse in the us : Write a paper about POVERTY IS GETTING WORSE IN THE US. FOCUS ON THE THESIS TO HAVE THE MAIN CLAIM. REMEBER IT'S JUST A PART OF THE ASSIGNMENT , SO YOU SHOULD HAVE.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Any help with stark law is much appreciated

Two physicians, Dr. S. and Dr. V., leased a nuclear camera so they would no longer have to refer their patients to the local hospital for nuclear imaging.

  First describe the mission of each organization

First describe the mission of each organization, as found on their web site.  Discuss how each organization has been targeted in the recent past for cyberattack(s), as reported in news or journal articles.  Describe the suspected threat actors.  Disc..

  Find the optimal location of a single concentrator

Modified concentrator location problem. Show how to formulate each of the following variants of the concentrator location problem that we consider in Exercise 4.7 as a shortest path problem. Assume in each case that all the customer lie on a path.

  Assignment on computer memory hacking

Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action.

  Types of wireless attacks

Create a spreadsheet using MS Excel or another spreadsheet software that lists the types of wireless attacks, how they are carried out, and what is the best way to guard against them.

  What was the percentage of excess air used

what was the percentage of excess air used?

  Explain how the web design department

Explain how the web design department will adhere to a code of ethics available for stakeholders.

  Relationship between orders and products

If you were given an ERD that contained a M:N relationship between orders and products, what would you need to do in order to create the tables and relationship in Access?

  Find the volume of the solid

Find the volume of the solid whose base is the circlex^2+y^2=36and the cross sections perpendicular to thex-axis are triangles whose height and base are equal.

  Change to one of the cloud computing service

In your current business environment, or one you were in at one time, which of the four cloud computing service models do you think might be good for that company to consider? How would a change to one of the cloud computing service models change ..

  For colorado customers compute the number of unique

For Colorado customers compute the number of unique products ordered. If a product is purchased on multiple orders, it should be counted only one time. The result should include customer number, customer last name and the number..

  Construct a simple xml schema

Construct a simple XML schema that describes a tutor. Include the tutor's last name, first name, phone, email address, and the certification date as child elements of the TUTOR element.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd