An in-depth study of the theory and practice of digital forensics. Topics include computer forensics, network forensics, cell phone forensics, and other types of digital forensics. Discussion also covers identification, collection, acquisition, authentication, preservation, examination, analysis, and presentation of evidence for prosecution purposes See all CSEC courses.
Network Traffic………………………8 System Layer: Applications……………………………9 Conclusion…………………………………………………………10 1 Page Abstract This paper will discuss the system layers that should be used in a forensic investigation that is pertaining to cyber - attacks on the network, malicious software installation and insider attacks.
There are many system or network layers an investigator can sort through to gather data for a case but that paper will only focus on four system layers that most operating system and media device a user would use currently today.
When cyber-attacks occur a forensic analysis would have to trace the events of the attack from start to finish, meaning the four system layer categories would come into play in terms of dissecting the operating system, data files on the system, network traffic and the system applications for potential evidence of an attack.
Forensic examiners used only a hand full of digital devices for their investigation cases. In those days only the hard drive of the computer or the floppy disk drive was to be evaluated for potential evidence.
The investigation cases during those times were very simple and straight forward. Now with new technology growing more and more such as the introduction of smartphones, tablets, laptops, etc. Nowadays with new and faster technology being introduce every day. There are a multitude of storage and media devices that will offer forensic examiners a better way of capturing, documenting and storing evidence.
Before the new enhancements in technology examiners would have to use a magnetic storage media device to capture information.
Now there are more options to use instead of the magnetic storage device. Not only does forensic examiners have the options of using different storage media devices but they can also use flash drives as a storage devices like SD cards that are already offered on almost if not all media devices.
An old way of how forensic examiners would gather information from the older computer device would be to pull the information that is stored on the computer drive, bring it to the lab for analysis and further investigating.
The new process of gathering information has become less tedious with more relying solely on the new computer technology for gathering, 3 Page transferring and processing the evidence.
The only drawback from strictly relying on the computer is that the evidence is now being process and transfer via a network which can be vulnerable to be compromise at any given time.
Therefore sending and receiving incriminating information that is needed for evidence now have made the forensic examiner work more complex.
In the new era of technology everyone has a smartphone, tablet or new techie device of some sort. The everyday consumer that buys a computer, laptop, smartphone or tablet is now equipped with a faster hard drive, optical media or a flash drive.
Having those types of drives or media devices allows for data to be downloaded for operational purposes, saved or transferred via other media devices.
With the magnitude of data being able to be stored on different devices and even being able to embed those files within digital images, makes it harder for forensic examiners to retrieve information to be consider criminal evidence if needed.
Media devices now allow for numerous of data to be downloaded or stored on these devices, so now forensic investigators have to question how secure is the data and how to remove that data without compromising the evidence. As well as if the computer or network was hacked an investigator would have to gather information about that crime.
The investigator initial process is to obtain the data that is stored on a specific device and extract the information.
Next an investigator has to determine what tools to use to extract the data from.CSEC Individual Assignment 1. 12 Pages. CSEC Individual Assignment 1.
Uploaded by. Ambika Sample. connect to download. Get docx. CSEC Individual Assignment 1. Download. CSEC Individual Assignment 1.
Uploaded by. Ambika Sample. Cyber Crime Investigation and Digital Forensics CSEC | 6 Credits. Prerequisite: CSEC An in-depth study of the theory and practice of digital forensics.
Topics include computer forensics, network forensics, cell phone forensics, and other types of digital forensics. Explain with evidence CSEC Individual Assignment #1 Assess at least four different sources of data that could be used in a digital forensics investigation.
15 Business Plan for XYZ Inc.’s Digital Forensics Laboratory in Maryland Dr.
Richmond Adebiaye CSEC - Team Assignment University of Maryland University College TEAM BLAZERS. IA2: Business Continuity Plan for Information Technology CSEC University of Maryland University College Abstract Business contingency and continuity of operations plan are vital to business, especially those reliant on digital media.
Csec Individual Assignment 2 Words | 18 Pages IA2: Business Continuity Plan for Information Technology CSEC University of Maryland University College Abstract Business contingency and continuity of operations plan are vital to business, especially those reliant on digital media.
All Course work for cyber Security Lab 1 Lab 2 Individual Assignment 1 Individual Assignment 2 Team Please don’t copy and paste work?
The Dean of UMUC cyber security has already reached out to me and stated the people are using my work.