Based on your approved case see link below create


Based on your approved case ***(SEE LINK BELOW), create fictitious digital evidence. You may use logs from your own computer (no personal information) as a guide or search the internet for samples. These samples do not have to be technically correct, but there must be a reasonable presumption that this information would exist, supported by a reference.

Document who, when, and how the evidence was obtained. Remember, you are creating fictitious examples, so refer to prior reading or examples of how digital evidence was collected. If necessary, refer to the "who" as a "systems administrator" and ensure the fictitious person is identified and referenced in your investigation.

Digital evidence must meet each of the following criteria:

  • Some of your digital evidence must be retrieved by computer forensics.
  • Some of your digital evidence must be retrieved from log files.
  • Digital evidence must contain information to support who, what, when, where, and how the cyber-crime was committed.

Present digital copies of your evidence in text files, screen shots, or PDFs.

***Link to case study - https://www.computerworld.com/article/2542763/security0/database-admin-at-fidelity-national-stole-more-data-than-thought.html

You are being asked to produce fictitious digital evidence for the case you selected for your project. You will assume that you are an investigator, and that you need to identify and gather palpable evidence to help establish that the crime occurred. For this assignment, you just need to make up some evidence for the case you selected. For instance, use Excel file with data about financial discrepancies and produce information from a computer's temporary folder. Also, you may create text of logs using Note Pad or MS Word. Note that you can use your own fictitious log of activities in Word, Notepad, or WordPad. For each log (line by line), show at least user or computer IP address/name, date, time, activity (e.g. read, write, update, etc) and possibly the system or application accessed. You may assume a computer was used to access a server, and the server recorded the activities.

First, think about the evidence you will need to charge the criminal. You may be lucky to find it in court evidence for your case. If not available, use your own. For instance, if a perpetrator used a computer to access a company's database, show the access logs (for example). Your operating system has access logs. I can find some of my computer logs in C>Windows>Security>Logs and C>Windows>Logs>DISM. You may take copies and modify in NotePad or a text application. Alternatively, you may use Google to find sample evidence (access logs, computer codes, transaction changes, etc) and modify or use as templates for your evidence.

Additionally, you may create some fictitious transactions in Excel or Word, take screen shots, and include in your evidence. For this assignment, just create some evidence to support the case. For instance, if someone used a computer to steal his company's money, some of the digital evidence will include user access and activities (date, time, user, activities). One may use a log of computer activities (make it up) as digital evidence.

Please merge all your work in one document

Solution Preview :

Prepared by a verified Expert
Business Economics: Based on your approved case see link below create
Reference No:- TGS02316910

Now Priced at $25 (50% Discount)

Recommended (98%)

Rated (4.3/5)