Tutor Quora

7906ICT Digital Forensics

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

7906ICT Digital Forensics

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

7906ICT Digital Forensics

0 Download4 Pages / 925 Words

Course Code: 7906ICT
University: Griffith University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Question:
Suppose you were recently hired for a new position as the computer forensics specialist at a medium-sized communications company. You have been asked to prepare a presentation to the Board of Directors on your main duties for the company and how your position could help achieve business goals based on security and confidentiality. You are also aware that the company has just had some issues with employee complaints of ongoing sexual harassment over email and instant messaging systems but has been unable to obtain adequate evidence of any kind. 
Explain the basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist.
Provide an overview of how computing devices are used in crimes of today and how these crimes can affect a company’s data and information.
Discuss how computer forensics investigations pertain to the law and trying of cases. 
 
Explain how you could assist in investigating the potential ongoing sexual harassment complaints and determine how you would communicate this to the Board of Directors. 
Answer:

Basic primary tasks, high-level investigation processes, and challenges of a computer forensics specialist. 
A computer forensic expert is a specialized personal who is associated with the usage of the forensic tools along with investigation method in order to look for specific electronic data which includes the history of internet usage, images and many more. They are also associated with the usage of their technical skills for the purpose of hunting the files or information that are kept hidden deleted or has been deleted (Dang-Nguyen et al., 2015). They are responsible for helping the investigators or the detectives to analyse the data so as to evaluate the relevancy of the data with the case that is under investigation.
The high level investigation process can be categorized into four different sections:

The first stage involves the collection of the information’s along with making of observations. In this stage the forensic data are collected and examined which includes the verification of integrity and authenticity of the evidences.
The second stage involves the formation of a hypothesis so as to explain the observations. During the process of gathering the information the experts are also associated with providing the possible explanations of the information gathered.
The third stage includes the providing of explanations of the hypothesis. This explanations acts as a crucial section of the investigation process as the success of the analysis is dependent on how thoroughly the initial hypothesis is tested (Farid, 2018).
The fourth stage includes the drawing of the conclusions along with communicating of the findings of the investigation.

Overview of how computing devices are used in crimes and affects on a company’s data and information
Making use of the computing devices for crime is a new problem and this type of problem is generally conducted by making use of a computing device and a network. This devices ranges from computers to mobiles. The different type of crimes conducted includes hacking, stealing, misuse of the data, child grooming and many more. Spam is one of the crime which is conducted by sending of spam emails so as to conduct commercial benefits (Watson & Dehghantanha, 2016). Fraud is another crime which is a dishonest way of making someone face losses which might lead to benefits of the attacker. Malware or virus is another kind of crime conducted by making use of computing devices.
The companies are associated with suffering a lot of problems due to this type of crimes as the hackers are associated with steeling of the confidential data along with the future plans of the organization which initially leads to huge losses of the companies. The hacker who is associated with the stealing of the information sells it to the rival companies in order to earn money (Farid, 2018). Hacking of the organizations also leads to customer dissatisfaction as their important data like credit card information and many more are lost. This type of crimes are also responsible for the decrease in productivity of the companies.
Computer forensics investigations 
Computer forensic investigations is associated with following the standard process related to digital forensic and this process mainly involves the acquisition of evidence by making use of a computer platform, subsequent analysis and reporting. Besides this various kind of techniques are used for the purpose of conducting investigations related to computer forensics (Rogers, 2016). This investigation includes the cross-drive analysis, live analysis, and the studying of deleted files. 
Cross-drive analysis is defined as the forensic technique which is associated with correlating the information that are present on multiple hard drives (McCarry & Donaldson, 2017). This process is mainly used for the purpose of identifying the social networks or for the purpose of detecting any kind of anomaly. Live analysis include the examining of the computers within the operating system by making use of the custom tool so as to extract the evidence. 
Investigation of ongoing sexual harassment complaints
The potential ongoing sexual harassment complaints are to be investigate by making use of the four basic steps of digital forensic investigation. That is first of all the required evidences are to be gather by talking with the persons who have lodged the complaint. It is essential to keep the collected data confidential. After the evidences are collected this are to be documented along with the supporting documents so as to explain the evidences that has been gathered. Before presenting this evidences to the Board of directors it is very much essential to analyse the evidence that has been collected in order to make sure that there exists no fake information (Chawki et al., 2015). Forensic imaging of the electronic devices submitted by the victim of sexual harassment can be used in order to gather evidences.
References:
Chawki, M., Darwish, A., Khan, M. A., & Tyagi, S. (2015). Sexual harassment in cyberworld. In Cybercrime, Digital Forensics and Jurisdiction (pp. 65-78). Springer, Cham.
Dang-Nguyen, D. T., Pasquini, C., Conotter, V., & Boato, G. (2015, March). RAISE: a raw images dataset for digital image forensics. In Proceedings of the 6th ACM Multimedia Systems Conference (pp. 219-224). ACM.
Farid, H. (2018). Digital forensics in a post-truth age. Forensic science international, 289, 268-269.
McCarry, M., & Donaldson, A. (2017, September). Gender based violence on UK campus’: intervention, prevention and policy responses. In IInd European Conference on Domestic Violence.
Rogers, M. K. (2016). Psychological profiling as an investigative tool for digital forensics. In Digital Forensics (pp. 45-58).
Watson, S., & Dehghantanha, A. (2016). Digital forensics: the missing piece of the internet of things promise. Computer Fraud & Security, 2016(6), 5-8.

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.

E-mail

Yes, alert me for offers and important updates

Submit 

Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 4 pages

PAY 3 USD TO DOWNLOAD

*The content must not be available online or in our existing Database to qualify as
unique.

Cite This Work
To export a reference to this article please select a referencing stye below:

APA
MLA
Harvard
OSCOLA
Vancouver

My Assignment Help. (2021). Digital Forensics. Retrieved from https://myassignmenthelp.com/free-samples/7906ict-digital-forensics/challenges-of-a-computer-forensics-specialist.html.

“Digital Forensics.” My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/7906ict-digital-forensics/challenges-of-a-computer-forensics-specialist.html.

My Assignment Help (2021) Digital Forensics [Online]. Available from: https://myassignmenthelp.com/free-samples/7906ict-digital-forensics/challenges-of-a-computer-forensics-specialist.html[Accessed 18 December 2021].

My Assignment Help. ‘Digital Forensics’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. Digital Forensics [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/7906ict-digital-forensics/challenges-of-a-computer-forensics-specialist.html.

×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}

×

Thank you for your interest
The respective sample has been mail to your register email id

×

CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.

Account created successfully!
We have sent login details on your registered email.

User:

Password:

For years now, MyAssignmenthelp.com is providing affordable essay help to millions of students worldwide. Our essay assistance services have helped us in assisting students with even the toughest essay assignments. We take pride in the fact that we cater the best assistance to search terms like help me with my essay. We offer affordable services in the fastest way possible. For our fast delivering services, students trust us with their urgent essay assignment needs. Two of our most popular essay writing services are maths essay help and English essay help.

Latest Management Samples

div#loaddata .card img {max-width: 100%;
}

MPM755 Building Success In Commerce
Download :
0 | Pages :
9

Course Code: MPM755
University: Deakin University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More

SNM660 Evidence Based Practice
Download :
0 | Pages :
8

Course Code: SNM660
University: The University Of Sheffield

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20

Course Code: BSBHRM513
University: Tafe NSW

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5

Course Code: MKT2031
University: University Of Northampton

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :
7

Course Code: MN506
University: Melbourne Institute Of Technology

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 

Next

Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

11174 Introduction To Management

Free Samples 11174 Introduction To Management .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} 11174 Introduction

Read More »