Investigate specific technology-advanced digital forensics


Case Scenario:

The rapid increase of personal and industrial computers has been subject to sophisticated cyber-crimes. This has led to development of various laws and standards that define cyber-crimes, digital evidence, search and seizure methodology, evidence recovery and investigation process. This means a forensic expert should adhered to a set of processes/framework to comply with local laws and established precedents; any deviation from the standard process may jeopardize the complete investigation which could result in digital evidence inadmissible in front of court. As digital evidence are flimsy in nature, this requires a proper and thorough forensic investigation process to follow which can safeguard the integrity of evidence, which is critical to prove a case in a court of law. The forensic investigators must follow a repeatable and well documented set of steps such that every iteration of analysis gives the same findings, else the findings of the investigation can be invalidated during the cross examination in a court of law.

Your team is working for an elite digital forensics company in the UK, usually invited to investigate major security incidents involving suspected criminal activities.

To remain competitive, the company has a strategy to produce reviews covering state-of-the-art research in the field of Digital Forensics and Incident Response.

Assignment tasks:

You have been given an assignment to produce a literature review paper. The paper should cover recent methods, procedures and tools to investigate a specific technology. To clarify further, the following topics are few examples to what you could consider:

- Hard Disks and File Systems

- Operating Systems Forensics

- Browsers Forensics

- Cloud Forensics e.g. Google Drive and Dropbox

- Electronic emails

- Email clients e.g. MS Outlook and Mozilla Thunderbird

- Mobile Phones

- Android-based devices

- Internet-of-Things (IoT)

- Electronic wearables

- GPS systems

- Wi-Fi data

- Cryptocurrency e.g. Bitcoin

It is also expected that you address any ethical or legal implications related to investigating the technology you have selected. The paper should not exceed 6 pages (excluding references and appendices). The following is an outline of what should be covered:

I) Abstract: a summary of the paper's context, objective, methodology, results and conclusion.

II) Introduction: this is where you can introduce your work and discuss the problem statement e.g. a full justification behind reviewing incident response methods to the technology of your choice.

III) Background: a literature review of related research.[300 words]

IV) Methodology: scope and a discussion on procedure, instruments, and data collection methods (etc.) used to accomplish this work. [600 words]

V) Results and discussion: critical discussion and analysis [no more than 800 words]

VI) Conclusion: a summary of your key findings and what they mean to the field of Digital Forensics and Incident Response. [300 words]

We, at Advanced Digital Forensics Assignment Help service come up with the proficient and skilled subject matter experts, in order to precisely finish your term papers, thesis, coursework, research paper, dissertation, assignments, homework and all other academic tasks with precision.

Tags: Advanced Digital Forensics Assignment Help, Advanced Digital Forensics Homework Help, Advanced Digital Forensics Coursework, Advanced Digital Forensics Solved Assignments, Hard Disks and File Systems Assignment Help, Hard Disks and File Systems Homework Help, Operating Systems Forensics Assignment Help, Operating Systems Forensics Homework Help, Browsers Forensics Assignment Help, Browsers Forensics Homework Help, Cloud Forensics Assignment Help, Cloud Forensics Homework Help

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: Investigate specific technology-advanced digital forensics
Reference No:- TGS03025760

Expected delivery within 24 Hours