Critical evaluation of computer forensics investigations


Assignment Problem: Computer Forensics Investigation

Assignment Requirements:

This assignment allows you to build your knowledge and critical evaluation of computer forensics investigations. To pass the coursework you must demonstrate your understanding of the practice of digital investigations as they are conducted in an organisation. This is achieved through the investigation of computer-based evidence using tools and techniques that you have been introduced to during the module delivery. You are allowed to make use of any references during your digital investigation but are encouraged to use academic sources such as conference and journal papers. This is an individual coursework.

Assessment Scenario/Problem:

Many organisations have an IT security strategy in place covering the management of IT security facilities and acceptable activities undertaken within the organisation. Computer forensics has long been an activity within the bounds of law enforcement agencies. However, commercial organisations are increasingly making use of computer forensics tools and techniques to investigate system misuse. In addition, corporate digital investigations are also conducted to provide evidence in cases such as fraud, Intellectual Property theft, or harassment.

Another UK university, which does not have expertise in computer forensics, has asked Nottingham Trent University's College of Science and Technology (NTU CST) to conduct a digital investigation into suspected Intellectual Property (IP)'theft' on their behalf. A number of relevant files have been recovered from a staff member's (Dr John Haggerty) shared drive. In addition, a number of emails have been recovered from the mail server and provided as .pst archives. All recovered files have been placed on a flash memory drive and imaged by IT staff at the other university. The image is made available to you via the module room on NOW. You are to investigate the files and provide a report of your findings to NTU CST's School Management Team. The report should include an overview of your methodology and the programs that you used during the investigation. If a case of IP'theft' is founded, you have been asked to recommend to the School Management Team the severity of the offence with supporting evidence. If no evidence of IP'theft' is found, again provide supporting evidence to defend this position. In addition, you are to make recommendations for future investigations based on the handling of the case up to the point at which you have become involved.

Your report should not exceed 2500 words (excluding references and appendices). Particular care should be made to ensure that the report contains correct references to all cited work in an appropriate style, for example, the Harvard Referencing System. You should submit your report to the module Dropbox in NOW before the submission deadline.

Are you not capable to draft a well-written and high-scoring assignment paper? Need an online assistance from the subject matter experts? Computer Forensics Investigation Assignment Help service is the best option to get the solutions of your assignment problems.

Tags: Computer Forensics Investigation Assignment Help, Computer Forensics Investigation Homework Help, Computer Forensics Investigation Coursework, Computer Forensics Investigation Solved Assignments, IT Security Strategy Assignment Help, IT Security Strategy Homework Help, Law Enforcement Assignment Help, Law Enforcement Homework Help, Intellectual Property Theft Assignment Help, Intellectual Property Theft Homework Help

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Critical evaluation of computer forensics investigations
Reference No:- TGS03030322

Expected delivery within 24 Hours