Cis 4203 Forensics Discussion 1 - Overview of Evidence

In: Computers and Technology

Submitted By tomb1967
Words 951
Pages 4
Discussion 1 - Overview of Evidence Due Sunday by 11:59pm Available after May 16 at 12am
Learning Objectives and Outcomes * Determine the appropriate digital forensic analysis technique for a given scenario.
Assignment Requirements
Review the information in the text sheet entitled “Overview of Evidence and Digital Forensic Analysis Techniques,” which describes different types of digital forensic analysis techniques, such as disk forensics and e-mail forensics.
Based on the information in the text sheet and in your assigned reading for this week, discuss the following scenarios and determine which type of forensic analysis technique(s) should be used, and why: 1. The Federal Trade Commission disclosed a law suit against unknown credit card fraudsters. Over 15 companies were being run by "money mules," people who transfer stolen goods or money from one country to another. The money mules were recruited via a spam e-mail message. E-mail forensics—The study of the source and content of e-mail as evidence. E-mail forensics includes the process of identifying the sender, recipient, date, time, and origination location of an e-mail message. You can use e-mail forensics to identify harassment, discrimination, or unauthorized activities. There is also a body of laws that deal with retention and storage of e-mails that are specific to certain fields, such as financial and medical.

Disk forensics—The process of acquiring and analyzing information stored on physical storage media, such as computer hard drives, smartphones, GPS systems, and removable media. Disk forensics includes both the recovery of hidden and deleted information and also the process of identifying who created a file or message. Memory & Cache, Temporary File System (i.e., swap & .tmp files) Disks and local logs (i.e., event logs), Remote log, Archived data (i.e., disks, USB drives,…...

Similar Documents

Forensic Evidence

...Forensic Science is the application of science to the law. In recent years the use of forensic science has become increasingly necessary to help with criminal and civil investigations. Although forensic evidence is admissible in court one must keep in mind how that evidence made its way to the court system. I will take you through the process. For there to be admissible evidence for a court case there must be physical evidence which would have been collected at a crime scene therefore there must have been some kind of crime committed. A crime with physical evidence doesn’t necessarily mean something violent but it can be. Theft, arson, car accident and murder are just a few examples of what a crime can be. The process begins when the crime has been committed, to the officers arriving on the scene, to surveying the scene, collecting the evidence, submitting it to the lab, submitting it as evidence and finally the acceptance of the evidence. When a call is sent out regarding a possible crime and the first officer arrives on scene it is that officer’s obligation to do a few things as precise as possible: 1. seek medical attention for those who may need it, 2. arrest or detain any perpetrators, and 3. secure the crime scene. Securing the crime scene is extremely important because you want to be able to retrieve as much evidence as possible. By securing the crime scene you are blocking off the area from unauthorized personnel. You want to keep the foot traffic......

Words: 1263 - Pages: 6

Cis 518 Discussion Questions Week 1-11

...CIS 518 Discussion Questions Week 1-11 Follow www.hwmojo.com link below to purchase solutions http://www.hwmojo.com/products/cis518-discussions We have all assignments, case studies and term paper for CIS 518. Email us support@hwmojo.com CIS518 Week 1-11 Discussion Questions with Solutions Week 1 DQ 1 "When Problem Decomposition is not Easy" Please respond to the following: • Consider the development of a simple mobile application that displays personal financial management video clips selected from a central repository. Discuss how you would systematically analyze the requirements of this application and identify its problem components. • Explain how software engineering would help you identify the components and their interconnections. Week 1 DQ 2 "Commercial off the Shelf (COTS)" Please respond to the following: • From the e-Activity, describe at least two COTS packages that you identified through your research. Explain their purposes, the components they contain, and the kind of applications that could be developed using these COTS packages. • Consider a situation where you are working in the gaming industry as a software engineer and your company is pushing toward utilizing COTS software components. Your supervisor has asked you to develop a counter proposal outlining the reasons why all software development should stay in-house. Explain how you would justify using an in-house software development strategy over using COTS commercial......

Words: 1809 - Pages: 8

Cis 517 Week 1 Discussion Cis517 Week 1 Discussion

...CIS 517 Complete Course Click below link for Answer Visit www.workbank247.com http://workbank247.com/q/cis-517-complete-course-cis517-complete-course-cis/11277 http://workbank247.com/q/cis-517-complete-course-cis517-complete-course-cis/11277 CIS 517 Week 1 Discussion Click the link above to respond to the discussion. If you need help with completing discussions please click here for more information. "The Triple Constraint of Project Management"  * Briefly explain in your own words the relationship between each element of the triple constraint of project management. Then, determine whether or not you believe it is important to understand the triple constraint to be an efficient project manager. Justify your response. CIS 517 Week 2 Discussion Click the link above to respond to the discussion. If you need help with completing discussions please click here for more information. "Project Management Process Groups" * Give your opinion on which process group is most often ignored, which group requires the most work by the project manager, and which group puts a higher workload on the development team. Provide a rational for your response. CIS 517 Week 2 Assignment 1 The Role of Project Managers Due Week 2 and worth 80 points Research job boards for project manager positions. Take note of the various industries that hire project managers. Then, research statistics from the project management institute on the rate of success of projects in different......

Words: 3295 - Pages: 14

Cis 555 Week 1 Discussion 1 Cis555 Week 1 Discussion 1

...CIS 555 CIS555 Complete Course Click below link for Answer visit www.workbank247.com http://workbank247.com/q/cis-555-cis555-complete-course/11695 http://workbank247.com/q/cis-555-cis555-complete-course/11695 CIS 555 Week 1 Discussion 1 "The Four-Variable Model and Requirements" Please respond to the following: * From the e-Activity, speculate as to what the system requirement variables (monitored and controlled) and software requirements (input and output) are for the Nokia portable computer. Determine whether or not you believe that system requirements outweigh software requirements when it comes to usability of this computer. Support your position by writing the functional and non-functional requirement for this. * Suppose that during the modification of an existing system, the group of the parties concerned include five individuals. Two out of the five members do not agree with the system requirements. Provide a suggestion on what techniques you would use to get members to agree with the system requirements. CIS 555 Week 1 Discussion 2 "Requirements Elicitation" Please respond to the following: * Suppose that you have been hired by a company that is prepared to spend five million dollars to revamp an online insurance claims processing system that has continuously been ranked last by policyholders compared to the competitions’ systems. Determine whether you would use the artifact-driven or stakeholder-driven elicitation technique to gather......

Words: 4656 - Pages: 19

Cis 555 Week 1 Discussion 2 Cis555 Week 1 Discussion 2

...CIS 555 CIS555 Complete Course Click below link for Answer visit www.workbank247.com http://workbank247.com/q/cis-555-cis555-complete-course/11695 http://workbank247.com/q/cis-555-cis555-complete-course/11695 CIS 555 Week 1 Discussion 1 "The Four-Variable Model and Requirements" Please respond to the following: * From the e-Activity, speculate as to what the system requirement variables (monitored and controlled) and software requirements (input and output) are for the Nokia portable computer. Determine whether or not you believe that system requirements outweigh software requirements when it comes to usability of this computer. Support your position by writing the functional and non-functional requirement for this. * Suppose that during the modification of an existing system, the group of the parties concerned include five individuals. Two out of the five members do not agree with the system requirements. Provide a suggestion on what techniques you would use to get members to agree with the system requirements. CIS 555 Week 1 Discussion 2 "Requirements Elicitation" Please respond to the following: * Suppose that you have been hired by a company that is prepared to spend five million dollars to revamp an online insurance claims processing system that has continuously been ranked last by policyholders compared to the competitions’ systems. Determine whether you would use the artifact-driven or stakeholder-driven elicitation technique to gather requirements for the......

Words: 4656 - Pages: 19

Cis 555 Week 1 Discussion 2 Cis555 Week 1 Discussion 2

...CIS 555 CIS555 Complete Course Click below link for Answer visit www.workbank247.com http://workbank247.com/q/cis-555-cis555-complete-course/11695 http://workbank247.com/q/cis-555-cis555-complete-course/11695 CIS 555 Week 1 Discussion 1 "The Four-Variable Model and Requirements" Please respond to the following: * From the e-Activity, speculate as to what the system requirement variables (monitored and controlled) and software requirements (input and output) are for the Nokia portable computer. Determine whether or not you believe that system requirements outweigh software requirements when it comes to usability of this computer. Support your position by writing the functional and non-functional requirement for this. * Suppose that during the modification of an existing system, the group of the parties concerned include five individuals. Two out of the five members do not agree with the system requirements. Provide a suggestion on what techniques you would use to get members to agree with the system requirements. CIS 555 Week 1 Discussion 2 "Requirements Elicitation" Please respond to the following: * Suppose that you have been hired by a company that is prepared to spend five million dollars to revamp an online insurance claims processing system that has continuously been ranked last by policyholders compared to the competitions’ systems. Determine whether you would use the artifact-driven or stakeholder-driven elicitation technique to gather requirements for the......

Words: 4656 - Pages: 19

Cis 555 Cis555 Week 2 Discussion 1week 2 Discussion 1

...CIS 555 CIS555 Complete Course Click below link for Answer visit www.workbank247.com http://workbank247.com/q/cis-555-cis555-complete-course/11695 http://workbank247.com/q/cis-555-cis555-complete-course/11695 CIS 555 Week 1 Discussion 1 "The Four-Variable Model and Requirements" Please respond to the following: * From the e-Activity, speculate as to what the system requirement variables (monitored and controlled) and software requirements (input and output) are for the Nokia portable computer. Determine whether or not you believe that system requirements outweigh software requirements when it comes to usability of this computer. Support your position by writing the functional and non-functional requirement for this. * Suppose that during the modification of an existing system, the group of the parties concerned include five individuals. Two out of the five members do not agree with the system requirements. Provide a suggestion on what techniques you would use to get members to agree with the system requirements. CIS 555 Week 1 Discussion 2 "Requirements Elicitation" Please respond to the following: * Suppose that you have been hired by a company that is prepared to spend five million dollars to revamp an online insurance claims processing system that has continuously been ranked last by policyholders compared to the competitions’ systems. Determine whether you would use the artifact-driven or stakeholder-driven elicitation technique to gather requirements for the......

Words: 4656 - Pages: 19

Cis 359 Week 2 Assignment 1 Continuity Planning Overview

...CIS 359 Week 2 Assignment 1 Continuity Planning Overview Click Link Below To Buy: http://hwcampus.com/shop/cis-359-week-2-assignment-1-continuity-planning-overview/ Or Visit www.hwcampus.com Assignment 1: Continuity Planning Overview Week 2 Suppose you were recently hired for a new initiative as a business continuity lead / manager at a medium-sized healthcare company. You have been asked to prepare a presentation to the Board of Directors on your main duties for the company and how your position could help protect the business in case of a large-scale incident or disaster. You have been alerted that since this is a new initiative and could come with a potentially large price tag, there is skepticism from some of the Board members. Write a three to four (3-4) page paper in which you: 1. Explain the basic primary tasks, ongoing evaluations, and major policy and procedural changes that would be needed to perform as the BC lead / manager. 2. Provide insight on how to plan the presentation to garner management and Board buy-in for those who are skeptical. 3. Discuss the first four (4) high-level activities that would be necessary in starting this initiative in the right direction and describe the potential pitfalls of each. 4. Speculate on the most comprehensive and / or critical challenge(s) in the infancy of this initiative and explain how to overcome that challenge(s). 5. Use at least three (3) quality resources in this assignment.Note: Wikipedia and......

Words: 318 - Pages: 2

Cis 359 Week 2 Assignment 1 Continuity Planning Overview

...CIS 359 Week 2 Assignment 1 Continuity Planning Overview Click Link Below To Buy: http://hwcampus.com/shop/cis-359-week-2-assignment-1-continuity-planning-overview/ Or Visit www.hwcampus.com Assignment 1: Continuity Planning Overview Week 2 Suppose you were recently hired for a new initiative as a business continuity lead / manager at a medium-sized healthcare company. You have been asked to prepare a presentation to the Board of Directors on your main duties for the company and how your position could help protect the business in case of a large-scale incident or disaster. You have been alerted that since this is a new initiative and could come with a potentially large price tag, there is skepticism from some of the Board members. Write a three to four (3-4) page paper in which you: 1. Explain the basic primary tasks, ongoing evaluations, and major policy and procedural changes that would be needed to perform as the BC lead / manager. 2. Provide insight on how to plan the presentation to garner management and Board buy-in for those who are skeptical. 3. Discuss the first four (4) high-level activities that would be necessary in starting this initiative in the right direction and describe the potential pitfalls of each. 4. Speculate on the most comprehensive and / or critical challenge(s) in the infancy of this initiative and explain how to overcome that challenge(s). 5. Use at least three (3) quality resources in this assignment.Note: Wikipedia and......

Words: 318 - Pages: 2

Cis 417 Week 2 Assignment 1

...CIS 417 WEEK 2 ASSIGNMENT 1 To purchase this visit here: http://www.activitymode.com/product/cis-417-week-2-assignment-1/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 417 WEEK 2 ASSIGNMENT 1 – COMPUTER FORENSIC OVERVIEW Suppose you were recently hired for a new position as the computer forensics specialist at a mediumsized communications company. You have been asked to prepare a presentation to the Board of Directors on your main duties for the company and how your position could help achieve business goals based on security and confidentiality. You are also aware that the company has just had some issues with employee complaints of ongoing sexual harassment over email and instant messaging systems but has been unable to obtain adequate evidence of any kind. Write a two to three (2-3) page paper in which you: 1. Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist. 2. Provide an overview of how computing devices are used in crimes of today and how these crimes can affect a company’s data and information. 3. Discuss how computer forensics investigations pertain to the law and trying of cases. More Details hidden… Activity mode aims to provide quality study notes and tutorials to the students of CIS 417 Week 2 Assignment 1 – Computer Forensic Overview in order to ace their studies. CIS 417 WEEK 2 ASSIGNMENT 1 To purchase this visit......

Words: 679 - Pages: 3

Assignment 1: Computer Forensics Overview

...Assignment 1: Computer Forensics Overview CIS 417 Computer Forensics Computer forensics is the process of investigating and analyzing techniques to gather and preserve information and evidence from a particular computing device in a way it can be presented in a court of law. The main role of computer analyst is to recover data including photos, files/documents, and e-mails from computer storage devices that were deleted, damaged and otherwise manipulated. The forensics expert’s work on cases involving crimes associated with internet based concerns and the investigations of other potential possibilities on other computer systems that may have been related or involved in the crime to find enough evidence of illegal activities. Computer experts can also use their professional knowledge to protect corporate computers/servers from infiltration, determine how the computer was broken into, and recover lost files in the company. Processes are used to obtain this information and some of the processes are as follows; * Investigation process: Computer forensics investigations will typically be done as part of a crime that allegedly occurred. The first step of the investigation should be to verify that a crime took place. Understand what occurred of the incident, assess the case, and see if the crime leads back to the individual. * System Description: Next step, once you verified the crime did occur, you then begin gathering as much information and data about the specific...

Words: 1397 - Pages: 6

Cis 359 Week 2 Assignment 1 Continuity Planning Overview

...CIS 359 Week 2 Assignment 1 Continuity Planning Overview Click Link Below To Buy: http://hwcampus.com/shop/cis-359-week-2-assignment-1-continuity-planning-overview/ Or Visit www.hwcampus.com Assignment 1: Continuity Planning Overview Week 2 Suppose you were recently hired for a new initiative as a business continuity lead / manager at a medium-sized healthcare company. You have been asked to prepare a presentation to the Board of Directors on your main duties for the company and how your position could help protect the business in case of a large-scale incident or disaster. You have been alerted that since this is a new initiative and could come with a potentially large price tag, there is skepticism from some of the Board members. Write a three to four (3-4) page paper in which you: 1. Explain the basic primary tasks, ongoing evaluations, and major policy and procedural changes that would be needed to perform as the BC lead / manager. 2. Provide insight on how to plan the presentation to garner management and Board buy-in for those who are skeptical. 3. Discuss the first four (4) high-level activities that would be necessary in starting this initiative in the right direction and describe the potential pitfalls of each. 4. Speculate on the most comprehensive and / or critical challenge(s) in the infancy of this initiative and explain how to overcome that challenge(s). 5. Use at least three (3) quality resources in this assignment.Note: Wikipedia and......

Words: 318 - Pages: 2

Cis 359 Week 2 Assignment 1 Continuity Planning Overview

...CIS 359 Week 2 Assignment 1 Continuity Planning Overview Click Link Below To Buy: http://hwcampus.com/shop/cis-359-week-2-assignment-1-continuity-planning-overview/ Or Visit www.hwcampus.com Assignment 1: Continuity Planning Overview Week 2 Suppose you were recently hired for a new initiative as a business continuity lead / manager at a medium-sized healthcare company. You have been asked to prepare a presentation to the Board of Directors on your main duties for the company and how your position could help protect the business in case of a large-scale incident or disaster. You have been alerted that since this is a new initiative and could come with a potentially large price tag, there is skepticism from some of the Board members. Write a three to four (3-4) page paper in which you: 1. Explain the basic primary tasks, ongoing evaluations, and major policy and procedural changes that would be needed to perform as the BC lead / manager. 2. Provide insight on how to plan the presentation to garner management and Board buy-in for those who are skeptical. 3. Discuss the first four (4) high-level activities that would be necessary in starting this initiative in the right direction and describe the potential pitfalls of each. 4. Speculate on the most comprehensive and / or critical challenge(s) in the infancy of this initiative and explain how to overcome that challenge(s). 5. Use at least three (3) quality resources in this assignment.Note: Wikipedia and......

Words: 318 - Pages: 2

Cis 359 Week 2 Assignment 1 Continuity Planning Overview

...CIS 359 Week 2 Assignment 1 Continuity Planning Overview Click Link Below To Buy: http://hwcampus.com/shop/cis-359-week-2-assignment-1-continuity-planning-overview/ Or Visit www.hwcampus.com Assignment 1: Continuity Planning Overview Week 2 Suppose you were recently hired for a new initiative as a business continuity lead / manager at a medium-sized healthcare company. You have been asked to prepare a presentation to the Board of Directors on your main duties for the company and how your position could help protect the business in case of a large-scale incident or disaster. You have been alerted that since this is a new initiative and could come with a potentially large price tag, there is skepticism from some of the Board members. Write a three to four (3-4) page paper in which you: 1. Explain the basic primary tasks, ongoing evaluations, and major policy and procedural changes that would be needed to perform as the BC lead / manager. 2. Provide insight on how to plan the presentation to garner management and Board buy-in for those who are skeptical. 3. Discuss the first four (4) high-level activities that would be necessary in starting this initiative in the right direction and describe the potential pitfalls of each. 4. Speculate on the most comprehensive and / or critical challenge(s) in the infancy of this initiative and explain how to overcome that challenge(s). 5. Use at least three (3) quality resources in this assignment.Note: Wikipedia and......

Words: 318 - Pages: 2

Forensic Evidence in It

...U.S. Department of Justice Office of Justice Programs National Institute of Justice APR. 04 Special REPORT Forensic Examination of Digital Evidence: A Guide for Law Enforcement U.S. Department of Justice Office of Justice Programs 810 Seventh Street N.W. Washington, DC 20531 John Ashcroft Attorney General Deborah J. Daniels Assistant Attorney General Sarah V. Hart Director, National Institute of Justice This and other publications and products of the U.S. Department of Justice, Office of Justice Programs, National Institute of Justice can be found on the World Wide Web at the following site: Office of Justice Programs National Institute of Justice http://www.ojp.usdoj.gov/nij APR. 04 Forensic Examination of Digital Evidence: A Guide for Law Enforcement NCJ 199408 Sarah V. Hart Director This document is not intended to create, does not create, and may not be relied upon to create any rights, substantive or procedural, enforceable at law by any party in any matter civil or criminal. Opinions or points of view expressed in this document represent a consensus of the authors and do not represent the official position or policies of the U.S. Department of Justice. The products, manufacturers, and organizations discussed in this document are presented for informational purposes only and do not constitute product approval or endorsement by the U.S. Department of Justice. This document was prepared under Interagency Agreement #1999–IJ–R–094......

Words: 22743 - Pages: 91