Write a report to your supervisor

Assignment Help Computer Networking
Reference no: EM131290877 , Length: 4

Project Descriptions

Project

For the purpose of this Project, you are still the InfoSec Specialist for the Greenwood Company. Consider this project a continuation of the work you performed in Project 1. In this portion of the investigation, you are ONLY collecting the physical evidence. You will NOT be handling the digital data during this stage of the investigation. (This step will be discussed in the Final Project.) You should limit your "care and handling" of each piece of evidence to the physical handling of the digital container.

With the scenario in mind, you are to write a report to your supervisor, thoroughly providing a response to the following questions (in paragraph format, properly citing outside research, where appropriate):

Part 1: Overview/Case Summary

1. Write a short summary of the incident that has occurred and establish what permissions/authorities you have before you search Mr. McBride's former Company work area.

Physical Evidence Acquisition:

2. Look at the photo of Mr. McBride's work area.

(See file attachment Work_Area.jpg) Identify three (3) potential items of digital evidence you see in the photo.

- For EACH item of digital evidence you identified, describe in first person what steps you took to collect the items (with emphasis on your care and handling of that item consistent with digital forensic best practices described in the module content/weekly readings). You should documenting these steps in a detailed way will mitigate questions, concerns, or a basic lack of information that will call your processes into question in court.

- For each item, explain what potential use that item would be to your investigation (e.g., what type of data that item might hold.)

3. Look at the photo of Mr. McBride's work area. (See file attachment Work_Area.jpg) Identify three (3) potential items of non-digital evidence you see in the photo.

- For EACH item of non-digital evidence you identified, describe how you would collected each item, within standards and best practices described in your module content/weekly readings.

- For each item, explain what potential use that item would be to your investigation (e.g., what type of data that item might hold.)

4. Detail in your report how you secured the collection evidence after removing it from the original scene (the desk) and prior to sending it for analysis. Describe the security procedures in place as well as any environmental protections (specific to computer/digital devices) in place within the storage area.

5. Look at the Evidence Custody Document (See file attachment Evidence Custody Document.doc) and item photographs (Items-seized (pics).pptx) Read the Evidence Custody Document prepared by one of your co-workers, in which he is attempting to document the seizure the three items pictured in the accompanying photos. Did your co-worker adequately describe each item? What could you add to the descriptions, and for which items (based on what you see in the photos), to make them more complete and serve as an example to your co-worker of what they SHOULD look like?

Project Requirements:

- Paper should be submitted as a basic report memo HOWEVER, an APA-formatted title page, in-text citations, and reference page is required.

(See the following link for memo writing guidelines: https://www.umuc.edu/writingcenter/writingresources/effective_memos.cfm)

- Each questions should be answered with a minimum of 1-2 paragraphs, so do your research, be specific, be detailed, and demonstrate your knowledge;

- Answers to the above questions should be submitted in a single document (.DOC/.DOCX, .RTF, or .PDF), with answers separated so as to make it clear which question is being answered;

- The submission should have a cover page, including course number, course title, title of paper, student's name, date of submission, and submit to the assignments folder.

- Format: 12-point font, double-space, one-inch margins;

- It is mandatory that you do some research, and utilize outside resources! References page: APA citation style

Reference no: EM131290877

Questions Cloud

Determine the implied repo rate on the contract : Determine the implied repo rate on the contract. Interpret your result. Note that you will need to determine the accrued interest. Assume delivery on June 1
Encountered learning objectives : Describe a scenario in which you encountered learning objectives that were unclear or not aligned with the broader outcomes or goals. How did this lack of clarity and/or alignment impact the learning process?
Conduct a secondary data search on key variables : Conduct a secondary data search on key variables that would allow you to make a logical decision on which area is best suited for your proposed coffee shop.
Calculate the first net payment and identify which party : Calculate the first net payment and identify which party, the party paying fixed or the party paying floating, pays
Write a report to your supervisor : Write a short summary of the incident that has occurred and establish what permissions/authorities you have before you search Mr. McBride's former Company work area.
Quantitative and qualitative research methods : What are the major differences between quantitative and qualitative research methods? What skills must a researcher have to develop and implement each type of design?
Explain what these quotes mean : Assuming the five-year Treasury rate is 7.60 percent, explain what these quotes mean.
How to combine a currency swap paying swiss francs : Show how to combine a currency swap paying Swiss francs at a floating rate and receiving Japanese yen at a floating rate with another currency swap to obtain a plain vanilla swap paying Swiss francs at a floating rate and receiving Swiss francs at..
Role of a swap dealer and present three possible equity swap : Assume the role of a swap dealer and present three possible equity swap proposals, which are based on the three different types of cash flows that could be paid against payment of the return on the stock.

Reviews

len1290877

11/26/2016 12:44:42 AM

1 1 1 -------------- Voice recorder, small, silver, Olympus. Western Digital, 1TB, silver and black with a green label, roughly rectangular, affixed with a torn sticker on the front. Thumb drive, USB, PNY-brand, 64GB in size, unknown serial number, grey and black in color, approximately 1” x 2.5” x 0.5”, metal and plastic-type construction, printed with “PNY… 64GB”, with small hole on the side (which appears to be for a lanyard. --------------------------///LAST ITEM///---------------------------------------------------------------

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd