To remain competitive the company has a strategy to produce


Research Paper

Scenario Your team is working for an elite digital forensics company in the UK, usually invited to investigate major security incidents involving suspected criminal activities. To remain competitive, the company has a strategy to produce reviews covering state-of-the-art research in the field of Digital Forensics and Incident Response.

Assignment tasks and deliverables You have been given an assignment to produce a literature review paper. The paper should cover recent methods, procedures and tools to investigate a specific technology. To clarify further, the following topics are few examples to what you could consider:

- Electronic emails

- Email clients e.g. MS Outlook and Mozilla Thunderbird

- Mobile Phones

- Android-based devices

- Internet-of-Things (IoT)

- Electronic wearables

- GPS systems

- Wi-Fi data

- Cloud computing clients e.g. Google Drive and Dropbox

- Cryptocurrency e.g. Bitcoin

Your paper should use the IEEE template and guidelines for transactions: https://www.ieee.org/publications_standards/publications/authors/author_templates.html It is also expected that you address any ethical or legal implications related to investigating the technology you have selected. The paper should not exceed 6 pages (excluding references and appendices) The following is an outline of what should be covered:

1. Abstract: a summary of the paper's context, objective, methodology, results and conclusion.

2. Introduction: this is where you can introduce your work and discuss the problem statement e.g. a full justification behind reviewing incident response methods to the technology of your choice.

3. Background: a literature review of related research.

4. Methodology: scope and a discussion on procedure, instruments, data collection methods (etc.) used to accomplish this work.

5. Results and discussion: critical discussion and analysis [no more than 1300 words]

6. Conclusion: a summary of your key findings and what they mean to the field of Digital Forensics and Incident Response.

7. Appendix 1 - PowerPoint Presentation: clear and concise presentation on the key findings and methodology followed. [suitable for a 5 min presentation]

Solution Preview :

Prepared by a verified Expert
Computer Network Security: To remain competitive the company has a strategy to produce
Reference No:- TGS01676098

Now Priced at $50 (50% Discount)

Recommended (96%)

Rated (4.8/5)