Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

QUESTION 1:

(a) A financial fraud has happened in BABA Bank. Your services have been retained as forensic examiner to investigate the above case.

While investigating you receive a mail whereby the chairman of the board mentioned, 'it would have been great if we could get the report as soon as possible so that we can take a quick decision'.

i. 'it would have been great if we could get the report as soon as possible so that we can take a quick decision'. As forensic examiner how would you reactto this mail?

ii. While investigating the objective must be clear to you.

What could it be?

iii. What could be your priority in BABA's case?

iv. Give the steps you would be following to investigate this case.

QUESTION 2:

Chain of custody in evidence collection is a very important document when it comes to presenting a computer forensic case in the court of law.

i. Explain the term chain of custody

ii. Why according to you is the chain of custody so important?

iii. In a chain of custody form there are four important information that need to be present.

a) Name the four important points.

b) Design a chain of custody form and fill in appropriately dummy information.

iv. To ensure integrity of evidence collected from a crime scene, there are two main method of doing so. Describe them

QUESTION 3:

(a) Being just employed as junior forensic examiner at SAI computer forensic Ltd, your supervisor told you, 'hey MoonaTambi, we have received a hard disk for examination, I would like you to analyze the areas on this hard disk where we can get hidden information and document your findings'.

Stunned I looked at his face. I said to myself, 'how the hell will i do it'.

Surprisingly the supervisor starts asking:

i. Where data could be hidden? Give two places and explain them in detailed.

ii. What command would you use to take a backup and restore the first sector of the hard disk in Linux?

(b) After that your supervisor has asked the above questions, he realized that you have just been recruited and hence he himself did the analysis. Whenretrieving 'a.ii' he could only get the below information about the hard disk.'MoonaTambi, I have already retrieved the required information, we needthe hard disk size to finalize our report, please calculate the size of it andlet me know', instructed my supervisor with a smile on his face and againadded, 'hope this time I will not have to come and do it. Don't forget it's aWindows machine with FAT 32.'

1. 16,384 cylinders

2. 80 heads

3. 63 sectors per track

(c) Briefly explain the different types of file systems that you as forensic expert would be experiencing.

QUESTION 4:

a)

i. No doubt Air Force Computer Forensics Laboratory must be having a very good Lab setup to perform the tasks mentioned in the case study.

What are the basic configurations that computers Forensics

Lab need to have?

ii. What are the structural design considerations that Air Force Computer Forensics Laboratory must have considered?

b) You have been called to go on a crime scene to see whether there is any digital evidence that must be collected. You noticed a cell phone lying down at the crime scene. You collected the may-be evidence and transport it to your office.

i. Explain the five major points that a forensic examiner needs to observe before embarking on the collection of the cell phone lying down at the crime scene.

ii. Before transporting the evidence to your office, you must have followed certain principle so as not to tamper with the may-be evidence collected. Name the six principles that you followed.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91261250

Have any Question?


Related Questions in Computer Engineering

You randomly sample 50 theaters in the united states you

You randomly sample 50 theaters in the United States. You ask those theaters how much they charge for a large popcorn, and you get a sample mean of $6. Then, you make confidence interval using this data with the lower li ...

How do you make a java program that reads two diagonal

How do you make a Java program that reads two diagonal points, say p1 and p2, of an up-right rectangle and finds both the smallest circle containing the rectangle and the largest circle that can be contained in the recta ...

Question do you support the development and implementation

Question : Do you support the development and implementation of biometric optical surveillance system (BOSS) as a crowd surveillance tool for police departments? The response must be typed, single spaced, must be in time ...

Patients are randomly assigned to one of the four treatment

Patients are randomly assigned to one of the four treatment groups to cure a disease: 1) Control 2) Experimental 1 3) Experimental 2 4) Experimental 3 There are 200 patients in the trial; 20 are randomly assigned to the ...

Software engineeringyou are a webapp designer for

Software Engineering You are a WebApp designer for FutureLearning Corporation, a distance learning company. You intend to implement an Internet-based "learning engine" that will enable you to deliver course content to a ...

What will a firewall not protect from why implement a

What will a firewall not protect from? Why implement a firewall?

Question unless otherwise stated answer in complete

Question: Unless otherwise stated, answer in complete sentences, and be sure to use correct English spelling and grammar. Sources must be cited in APA format. Your response should be four (4) pages in length; refer to th ...

This is a software testing techniques class so i want to

This is a software testing techniques class so I want to write about test paths using node/edge or edge-pair coverage using a real or fictitous software project. Compose a short email to the decision-maker in your organi ...

Question 1 complete the lab 9-5 programming challenge 1 --

Question: 1. Complete the Lab 9-5, "Programming Challenge 1 -- Going Green," of Starting Out with Programming Logic and Design. Note: You are only required to create the flowchart for this activity; however, notice how t ...

Analyse two of the three technologies provided focus

Analyse two of the three technologies provided (focus virtualisation, cloud computing and green computing). Summarise what each of your two selected technologies is, and what the technology does. Explain what improvement ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As