Cis 4203 Forensics Discussion 1 - Overview of Evidence Essay

964 Words Jun 28th, 2016 4 Pages
Discussion 1 - Overview of Evidence Due Sunday by 11:59pm Available after May 16 at 12am
Learning Objectives and Outcomes * Determine the appropriate digital forensic analysis technique for a given scenario.
Assignment Requirements
Review the information in the text sheet entitled “Overview of Evidence and Digital Forensic Analysis Techniques,” which describes different types of digital forensic analysis techniques, such as disk forensics and e-mail forensics.
Based on the information in the text sheet and in your assigned reading for this week, discuss the following scenarios and determine which type of forensic analysis technique(s) should be used, and why: 1. The Federal Trade Commission disclosed a law suit against
…show more content…
Each of these types of forensic analysis requires specialized skills and training. Network forensics—the process of examining network traffic, including transaction logs and real-time monitoring, using sniffers, and tracing, is known as network forensics. Disk forensics—the process of acquiring and analyzing information stored on physical storage media, such as computer hard drives, smartphones, GPS systems, and removable media. Disk forensics includes both the recovery of hidden and deleted information and also the process of identifying who created a file or message.

3. Company Techs had been experiencing fierce competition with a rival firm. The rival firm was consistently offering new software products to customers ahead of Company Techs and the software was almost identical to Company Techs’ pre-release products. Company Techs’ network was highly secure but managers suspected that an internal employee was sharing confidential development plans and code.

E-mail forensics—the study of the source and content of e-mail as evidence. E-mail forensics includes the process of identifying the sender, recipient, date, time, and origination location of an e-mail message. You can use e-mail forensics to identify harassment, discrimination, or unauthorized activities. There is also a body of laws that deal with retention and storage of e-mails that are

Related Documents