the research assignment requirements can be found in the description section 13

Ace your studies with our custom writing services! We've got your back for top grades and timely submissions, so you can say goodbye to the stress. Trust us to get you there!


Order a Similar Paper Order a Different Paper

Part 1: When a Computer Forensic Examiner has to Testify in Court

Select two of the following questions to answer, find an incident to support your opinion, and expand upon your answer. A minimum of 100 words for each question is required, and they must be your own words. Including figures and quotes is value-added, but they will not count against your 100 word requirement.

  1. What impact might your personal social media site have on your work?
  2. What could be the ramification for failing to use a validated tool?
  3. What is the importance of maintaining certification (for example, CCE or ACE)?
  4. What could be the ramification for not following your organizations standard operating procedures (SOPs)?

Part 2: FILE SYSTEMS, PARTITIONS, AND DISK TYPES

Select two of the following questions below to answer. A minimum of 100 words for each question is required, and they must be your own words. Including figures and quotes is value-added, but they will not count against your 100 word requirement.

  1. Compare and contrast the FAT12, FAT16, FAT32, exFAT, and FATX File Systems
  2. Discuss partition tables and partitioning and explain why disks may often be divided.
  3. Discuss removable Media like USB drives and SD cards. What type of file system is commonly used?
  4. Discuss the NFTS file system and the benefits it has over the FAT file systems. Explain Journaling.
  5. Discuss how the analysis of Solid State devices can differ from that of a traditional spinning disk

Part 3: File Signatures, Data Hiding, and Metadata

Select two of the following questions below to answer. A minimum of 100 words for each question is required, and they must be your own words. Including figures and quotes is value-added, but they will not count against your 100 word requirement.

  1. What is a file signature and why is it important in computer forensics. Give examples of File Signatures.
  2. What is metadata as it relates to files? Can you find a computer forensic case that was discussed in the media where metadata was used to link someone to ownership?
  3. What are some ways that people can hide data on a drive? For example an Alternate Data Stream?

Part 4: System Logs, Browser History, and Timeliness

Research and answer two of the following questions below. A minimum of 100 words is required for each question, and they must be your own words. Including figures and quotes is value-added, but they will not count against your 100 word requirement.

  1. What is system log and how can this be important to a computer forensics examination? For example, what is the Event Viewer? What is an Internet Information System (IIS) log?
  2. Browsers like Edge, Chrome, Firefox, and Internet Explorer leave artifacts on the system that provide information about websites, as well as dates and times that things were accessed. Why is this important to a computer forensics examination?
  3. Speaking of dates and times (in question 2), why is a timeline important to a computer forensics examination? What could happen to a case if a timeline was not accurate? How important is this?

Part 5: System Logs, Browser History, and Timeliness

Research and answer two of the following questions below. A minimum of 100 words for each question is required, and they must be your own words. Including figures and quotes is value-added, but they will not count against your 200 word requirement.

  1. What is system log and how can this be important to a computer forensics examination? For example, what is the Event Viewer? What is an Internet Information System (IIS) log?
  2. Browsers like Edge, Chrome, Firefox, and Internet Explorer leave artifacts on the system that provide information about websites, as well as dates and times that things were accessed. Why is this important to a computer forensics examination?
  3. Speaking of dates and times (in question 2), why is a timeline important to a computer forensics examination? What could happen to a case if a timeline was not accurate? How important is this?

Part 6: Cloud Forensics

Research the problem of performing a forensic investigation involving cloud computing resources. There is dropbox, iCloud, Google Drive, and lots of other ‘cloud’ based applications. Write a two (2) 100+ word summary of the types of problems you can reasonably expect to encounter and the steps required to overcome these limitations or issues. Your summary should be suitable for use in a discussion with a “regular” client who has asked you for your professional opinion regarding the forensics implications of moving sensitive corporate information from a private data center into the cloud.

Part 7: Conclusion

Based on all the research assignments thus far (5 total), What did you find most interesting about them? What tool did you find most interesting? What would you suggest to others interested in taking the class? A minimum of two (2) 100+ words is required, and they must be your own words. Including figures and quotes is value-added, but they will not count against your 100 word requirement.

The rubrics link for all Seven questions: https://learn.umuc.edu/d2l/lms/competencies/rubric…

login ID: eebai

Password: @Pass4sure

Writerbay.net

Looking for top-notch essay writing services? We've got you covered! Connect with our writing experts today. Placing your order is easy, taking less than 5 minutes. Click below to get started.


Order a Similar Paper Order a Different Paper