Explain two acquisition methods


Assignment Title: Validating and testing digital forensics tools and evidence

Purpose of the assessment (with ULO Mapping) - This assignment assesses the following Unit Learning Outcomes;

a) Students should be able to demonstrate their achievements in them.

b) Record, administer and document digital forensics in social media.

Assignment Description - Assignment - Leaving Clues to a Crime

In this Assignment you will create a pretended crime scenario that needs computer forensic analysis. Along with the crime scenario, create digital clues that may be left on a small portable storage device.

IMPORTANT: Any names of persons or organizations in the crime scenario should be pretended; DO NOT use the names of real people or businesses. Also, DO NOT develop a crime scenario involving child pornography or anything that can be interpreted as a threat to the public. Acceptable topics include theft, embezzlement, kidnapping a fictitious character, the murder of a fictitious character, etc.

The chosen crime scenario must be discussed according to the following questions:

Problem 1: You will leave your digital "clues" on a flash/thumb drive. Provide your thumb drive (containing your digital clues) for analysis as an image by using software such as ProDiscover.

Include this screenshot in your final report!

Your digital clues must include at least one of each of the following:

- Hidden file

- Deleted file

- Graphic file

- Password-protected file

- Web access (browser history)

- Change extension of one file such as .docs to .pdf

Problem 2: Discuss what should you consider when determining which data acquisition method to use.

Problem 3: Discuss some options that can be used for preserving the data in this situation

Problem 4: Explain two acquisition methods that you should use in this situation.

Note - Word limit Max 2000 words.

Are you one of the students, who often get stuck in your academic tasks and seek for a reliable Digital Forensic Assignment Help service? Then, you have reached at the most correct place!

Tags: Digital Forensic Assignment Help, Digital Forensic Homework Help, Digital Forensic Coursework, Digital Forensic Solved Assignments 

Request for Solution File

Ask an Expert for Answer!!
Computer Network Security: Explain two acquisition methods
Reference No:- TGS03050644

Expected delivery within 24 Hours