BOOK- 5th
edition
Nelson, B., Phillips, A., & Steuart, C. (2015). Guide to Computer Forensics and Investigations (5/e). Boston, MA. Course Technology
Task 1: Reflection on Hands-On Projects (5 Marks)
Completethe following Hands-On Projects at the end of Chapter 1 in the textbook (Nelson,Phillips,& Steuart, 2015):
Hands-On Project 1-1
Hands-On Project 1-2
Hands-On Project 1-3
Hands-On Project 1-4
Hands-On Project 1-5
Deliverable:
Write a 300-500 words reflectionon five things learned or discoveredby completing these projects, commenting individually on each project.
Task 2: Case Project (5 Marks)
Complete the Hands-On Project 4-3 the M57 Patents case. (Nelson, Phillips, & Steuart, 2015, p. 177)
Deliverable:
Write a 300-500 wordspaper explaining the importance of the files you examined. How might they affect a patent case. Provide screen shots of the steps completed in the project.
Task 3: Research Project (5 Marks)
As part of the duties of a digital forensics examiner, creating an investigation plan is a standard practice. Write a paper that describes how you would organise an investigation for a potential fraud case. Also, list the methods that you plan to use to validate collected data from storage devices such as MS Word, MS Excel and emails, with hashes. Specify the hash algorithm you plan to use, such as MD5 or SHA1.
Deliverable:
Write a 300-500 word report that outlines standard investigation management and data validation methods.