Answer should be original, and similarity (plagiarism) not more than 10% this is very very very important otherwise I will be in trouble. Answer should be a clear explanation and should be clear...

1 answer below »


Answer should be original, and similarity (plagiarism) not more than 10% this is very very very important otherwise I will be in trouble.



Answer should be a clear explanation and should be clear understand (600 words enough).



Answer should be references on Harvard style (Not use Wikipedia) should be Academic Articles or books.



When use citation from any reference please keep it between "citation" (Author,Year),please citation should be not more than 5%



As reference you can use the following book:



Casey, E., (2011)
Digital evidence and computer crime: forensic science, computers and the internet. 3rd ed. New York: Elsevier Academic Press.



Assignment is:


Assume that you feel that your (or your boss’s) email content was always leaked (e.g., some confidential information in your email was known to many others). You decide to carry out an investigation. Write a plan for this investigation. The plan should include: digital evidence source identification, recovery, collection, documentation, and report. The required tools should also be included.




Document Preview:

Seminar 6: Network Forensics I Laureate Online Education Computer Forensics © All rights reserved 2005-2012. The Computer Forensics module, in all its parts: syllabus, guidelines, lectures, discussion questions, technical notes, images, projects and any additional material is copyrighted by Laureate Online Education B.V. Computer Forensics Seminar for Week 6: Network Forensics I In this and the next seminars, we will learn the network basics and techniques for digital investigations. Our society has become network centered, and more and more people rely on emails, ecommerce, and other networked services in their daily lives. Meanwhile, computer crimes are also becoming more network centered and internationalized. Thus, digital evidence investigators must master skills to follow cyber-trails and to find digital evidence on the public Internet, private networks, and other commercial systems. In addition to the traces that criminals leave on the host computers, as discussed previous seminars, other sources of digital evidence on networks include contents on network devices and traffic on both wired and wireless networks. Knowledge of networking technology helps network investigations in the network forensic AAA process. Though it is impractical to expect all network forensic professionals to be network experts, digital investigators need a basic understanding of networks in order to interpret digital evidence found on networked computers. In this seminar, we assume that you are familiar with basics of the TCP/IP protocols (e.g., you may have acquired this background from the CC module) and basic network applications such as telnet, ftp, World Wide Web, and emails. Applying AAA Principles to Networks Network forensic investigation must also follow the AAA procedures that we discussed in earlier weeks. It is relatively more challenging to deal with network evidence compared with processing a single computer or a single hard drive. In...



Answered Same DayDec 21, 2021

Answer To: Answer should be original, and similarity (plagiarism) not more than 10% this is very very very...

David answered on Dec 21 2021
119 Votes
Plan of Investigation
Digital Evidence Source Identification
The evidence has to be examined. Th
is involves identifying if the email being business or even
personal. Apart from that several factors such as retention policy followed by the company for e-mails
and other such activities have to be observed.
Recovery
The recovery process is going to be tough a lot of factors have been considered. One common cause
of delay is dependence on back-up systems instead of archive systems. Backup of the system and
web documents is highly optimized that the business stream line is not affected but the email backup
procedures are not streamlined. (Inboxer.com, n.d).
The problem of retrieving a sequence of precise messages from back-ups is lengthy. It takes series of
backup from days to weeks and weeks to months in order to fully examine the entire case under
investigation. It would have to be checked to find...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here