In this course, you will assume the role of a forensics investigation trainee at Two Way Communications, a telecommunications company. You will conclude your training period by completing projects supporting each of the three forensics specialists, each of whom work on different parts of the investigation process. You will work on this project in phases, beginning in Unit 1 and building on it with each subsequent unit.
Read the following project information, which will give you all the details you need to get started.
- There has been a report of an employee using unauthorized software licenses that may have been illegally downloaded from the Internet. This is a violation of the company's Internet Usage Policy and an ethics violation. In order to investigate this matter, one of the forensics specialists asks you to write a 1-2 page report describing the following.
- What tools you will you use to gather evidence? What kind of evidence will you need?
- Will you use a single evidence form or a multi-evidence form to complete intake of this evidence? Identify the form you will need and prepare the following information: nature of case, location where evidence was obtained, description of evidence, and vendor name. Then describe how you would secure the evidence.
- You have isolated the illegally downloaded software to a legacy operating system that is no longer publicly in use, but no one on the team is familiar enough with this system to begin investigations. List resources you would use to take next steps in this investigation.
Submit the assignment as a Microsoft Word document using the template provided to the Unit 1 Part 3 Dropbox.