Ask Business Economics Expert

Based on your approved case ***(SEE LINK BELOW), create fictitious digital evidence. You may use logs from your own computer (no personal information) as a guide or search the internet for samples. These samples do not have to be technically correct, but there must be a reasonable presumption that this information would exist, supported by a reference.

Document who, when, and how the evidence was obtained. Remember, you are creating fictitious examples, so refer to prior reading or examples of how digital evidence was collected. If necessary, refer to the "who" as a "systems administrator" and ensure the fictitious person is identified and referenced in your investigation.

Digital evidence must meet each of the following criteria:

  • Some of your digital evidence must be retrieved by computer forensics.
  • Some of your digital evidence must be retrieved from log files.
  • Digital evidence must contain information to support who, what, when, where, and how the cyber-crime was committed.

Present digital copies of your evidence in text files, screen shots, or PDFs.

***Link to case study - http://www.computerworld.com/article/2542763/security0/database-admin-at-fidelity-national-stole-more-data-than-thought.html

You are being asked to produce fictitious digital evidence for the case you selected for your project. You will assume that you are an investigator, and that you need to identify and gather palpable evidence to help establish that the crime occurred. For this assignment, you just need to make up some evidence for the case you selected. For instance, use Excel file with data about financial discrepancies and produce information from a computer's temporary folder. Also, you may create text of logs using Note Pad or MS Word. Note that you can use your own fictitious log of activities in Word, Notepad, or WordPad. For each log (line by line), show at least user or computer IP address/name, date, time, activity (e.g. read, write, update, etc) and possibly the system or application accessed. You may assume a computer was used to access a server, and the server recorded the activities.

First, think about the evidence you will need to charge the criminal. You may be lucky to find it in court evidence for your case. If not available, use your own. For instance, if a perpetrator used a computer to access a company's database, show the access logs (for example). Your operating system has access logs. I can find some of my computer logs in C>Windows>Security>Logs and C>Windows>Logs>DISM. You may take copies and modify in NotePad or a text application. Alternatively, you may use Google to find sample evidence (access logs, computer codes, transaction changes, etc) and modify or use as templates for your evidence.

Additionally, you may create some fictitious transactions in Excel or Word, take screen shots, and include in your evidence. For this assignment, just create some evidence to support the case. For instance, if someone used a computer to steal his company's money, some of the digital evidence will include user access and activities (date, time, user, activities). One may use a log of computer activities (make it up) as digital evidence.

Please merge all your work in one document

Business Economics, Economics

  • Category:- Business Economics
  • Reference No.:- M92330081
  • Price:- $25

Priced at Now at $25, Verified Solution

Have any Question?


Related Questions in Business Economics

Standards drive instruction therefore how do standards

Standards "drive instruction," therefore, how do standards influence curriculum planning?

Explain how the application of the pdca cycle can support a

Explain how the application of the PDCA cycle can support a competitive strategy of low cost leadership.

Ford motors expects a new hybrid-engine project to produce

Ford Motors expects a new? Hybrid-engine project to produce incremental cash flows of $ 95 million each year and expects these to grow at 4?% each year. The upfront project costs are? $900 million and? Ford's weighted av ...

A five-year bond with a yield of 11 continuously compounded

A five-year bond with a yield of 11% (continuously compounded) pays an 8% coupon at the end of each year. a) What is the bond's price? b) What is the bond's duration? c) Use the duration to calculate the effect on the bo ...

Image manufacturing is an electronics manufacturer and

IMAGE Manufacturing is an electronics manufacturer and retailer. Its main products are Ultrabook computers, PCs and calculators. The current price of the Ultrabook is $ 600, the PC is $700 and the calculator is $30. This ...

According to kulish what is about the design of the euro

According to Kulish, what is about the design of the euro currency that lessens its appeal compared to prior national currencies?

How has the value of the euro changed compared to other

How has the value of the Euro changed, compared to other countries, over the past 10 years (since the Great Recession began)?

In lecture we discussed why the production possibilities

In lecture we discussed why the production possibilities frontier (the boundary of the production possibilities set) is bowed 'outwards'. When might the production possibilities set be bowed 'inwards'? Give an example of ...

In 2013 gallup conducted a poll and found a 95 confidence

In 2013, Gallup conducted a poll and found a 95% confidence interval of the proportion of Americans who believe it is the government's responsibility for health care. Give the statistical interpretation. I do not underst ...

The standard deviation of the number of video game as

The standard deviation of the number of video game A's outcomes is 0.5479, while the standard deviation of the number of video game B's outcomes is 0.2498. Which game would you be likely to choose if you wanted players t ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As