Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Case Portfolio

Using the photograph depicting Mr. Didit's work space (posted along with this project description or provided by your instructor), you will develop a case portfolio that will include the following: collection of digital evidence; transfer/handling of digital evidence; differentiation of non-digital evidentiary items collected separately; methodology of preservation; summary of analysis results for the intended audience (prosecution); and final testimonial preparation materials.

Consider this project a continuation of the work performed in Project 2, and assume the same overarching scenario.

You now know that digital forensic examiners found five (5) contraband images on Mr. Didit's computer, and the hash values of those images were matched by the National Center for Missing and Exploited Children (NCMEC) to those of known child pornographic images (previously tied to known underage victims).

You are being called to put together a case portfolio to present to the prosecution for the trial of Mr. Didit. This case portfolio should be written as a professional report (you may select an appropriate format) and will include a summary of your trial testimony. Just as a prosecutor will detail for an investigator what information they need to have included in the case file, your instructor has detailed items he/she would like you to include in your case portfolio:

1. A short, professional summary providing the facts of the scenario;

2. The photograph the workspace; (does not count for your minimum page count)

3. A complete list of the potential digital evidence you found in the workspace (i.e., in the picture), along with an explanation of the significance of each piece (e.g., what type of important data might be found on each piece of evidence collected), how the evidence would be preserved or protected (including technological preservation, such as forensic imaging), and how it would be stored or protected pending analysis or the transfer to a law enforcement agency;

4. A complete list of the non-digital evidence you found in the workspace that you could collect (or at least search), including what significant information might be found in that evidence;

5. A completed Evidence Collection Document (posted along with this project description or provided by your instructor) detailing at least three of the items of digital evidence you would collect and establishing chain of custody; (does not count for your minimum page count)

6. A rough (hand-drawn) sketch of the workspace (you made need to fill in some details you can't see outside the scope of the photo), with the locations of at least major items of digital evidence you would collect; (does not count for your minimum page count)

7. A list of locations outside of Mr. Didit's immediate workspace where pertinent digital evidence might be found;

8. A list of at least three forensic examination/analysis tools that could be used by you or ABC Corporation's other digital forensic analysts to process/analyze items of evidence you collected (be specific), ensuring you include the manufacturer of each tool and each tool's capabilities;

9. A summary of what you would tell the court in testimony responding to the following questions (feel free to compose fictitious details, but please ensure it is plausible based on the scenario):

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91348906
  • Price:- $40

Guranteed 36 Hours Delivery, In Price:- $40

Have any Question?


Related Questions in Computer Engineering

A compute the sumnbsps1nbsp 1 2 3 nbsp nbsp 9999 the sum

(a) Compute the sum S1 = 1 + 2 + 3 + . . . + 9999 (the sum of all integers from 1 to 9999). Do not use a program. (b) Compute the sum S2 = 1+3+5+...+9999 (the sum of all odd integers from 1 to 9999). Do not use a program ...

Quesiton an important principle in information security is

Quesiton: An important principle in information security is the concept of layers of security, which is often referred to as layered security, or defense in depth. 1) Please explain the concept of layers of security. 2) ...

Take the input of numbers and reverse the order of elements

Take the input of numbers and reverse the order of elements in that vector using recursion.

Question suppose that a bayesian spam filter is trained on

Question : Suppose that a Bayesian spam filter is trained on a set of 10000 spam messages and 5000 messages that are not spam. The word "opportunity" appears in 175 spam messages and 20 messages that are not spam. Would ...

Question critical infrastructures -1discuss cybersecurity

Question: Critical Infrastructures - 1. Discuss cybersecurity policy issues affecting SCADA and ICS systems for Critical Infrastructure services for the public, and compare those issues to the policy issues that affect t ...

Stack discussion forum 42 days ago discuss the stack data

Stack Discussion Forum 42 days ago Discuss the stack data structure. What are its unique structural and behavioral concepts? What are its most frequently used methods? What implementations are provided? What practical ap ...

Lucinda buys a new gaming system fornbsp500 she receives

Lucinda buys a new gaming system for? $500. She receives consumer surplus of? $175 from the purchase. How much does Lucinda value her GPS? system? Please provide the explanation

Aa stock will pay dividends of 3 4 and 9 over the next

aA stock will pay dividends of $3, $4, and $9 over the next three years, and then increase dividends at a rate of 3% afterwards. Its required rate of return is 15%. What is the value of the stock? Round to the penny.

Research ways that information systems have been misused

Research ways that Information Systems have been misused. Using the Internet, find an example of an organization that has misused Information Systems. Post your response to the discussion board. Respond to the following ...

A random sample ofnbsp77nbspeighth gradenbspstudents scores

A random sample of 77 eighth grade? students' scores on a national mathematics assessment test has a mean score of 285. This test result prompts a state school administrator to declare that the mean score for the? state' ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As