Analyze the device or system you will investigate


Problem

You may use either for your investigation. However, be aware of legal issues surrounding your data gathering. If you are using any system you do not personally control and have authority to investigate/discover, please get written permission from the owner/operator of the system or refrain from your forensics analysis of that systems and use a personal system. For a network, you can use your own personal home network. For a smartphone, consider using an image from the Internet or a personal device. There could be issues related to using a live, active, personal device (example: corruption of the device). If using a personal device, consider using an old, outdated phone, if available.

You will review various forensics tools used with your selected system. Select a tool and use that tool to gather forensics data for analysis. You are simulating the process of gathering this data, so you do not need to investigate a compromised device or system. The project deliverables are as follows:

Prepare a 2 pages paper (double-spaced) that describes the device or system you will investigate and the intended tool you plan to use to conduct your forensics investigation. The interim paper should be in the form of an Executive Summary.

The response should include a reference list. Using double-space, Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.

Solution Preview :

Prepared by a verified Expert
Computer Engineering: Analyze the device or system you will investigate
Reference No:- TGS03091701

Now Priced at $20 (50% Discount)

Recommended (99%)

Rated (4.3/5)