Expert Homework Help Online & Write My Essay Service

Hire best homework helpers for online homework help 24/7. Are you looking for online homework help? Try our excellent homework help who can help you get A+ grade in your assignment.

Order my paper
Calculate your essay price
(550 words)

Approximate price: $22

19 k happy customers
9.5 out of 10 satisfaction rate
527 writers active

University of Alabama at Birmingham Digital Forensics

FILLER TEXT
FILLER TEXT
Project1. Basic technical information  about passwords and encryption, and how to recover data protected by these mechanisms. There is also a section on Steganography, which literally translated means “covered writing.” When some people think of steganography, or “stego,” they think of documents or other data files being hidden in other file types (usually image/picture files). This is something that is used frequently in secreting child pornography to avert detection. Interestingly, the use of stego goes much farther back than the use of computers.
Like cryptology, steganography is used to hide something in something else. So, even though a code breaker can detect the hidden code, they may not be aware that the code actually contains a different message. Cryptography scrambles a message so that it is unreadable, but still visible, while stego camouflages data to hide it or make it undetectable. This course is not meant to teach you about the technical details of encryption or passwords or steganography (entire books are written on each of those subjects), but rather to help you understand their place in the criminal justice process.
Does a warrant give you the authority to break passwords protecting information or to decipher encrypted data? This is a very important question. As many of you have discussed in our previous week’s discussions, it is important to make sure you know the limits of your warrant. But while you are conducting a search with a properly executed warrant, you may come across other information that is not included in your scope, but is still evidence of a crime. For example, imagine you are searching a hard drive for information related to a fraud scheme. While you are looking through the files you come across a picture that is obviously child pornography, but you do not have child pornography addressed in any way within your warrant. What do you do? The proper response is to stop the search and obtain another warrant for evidence related to child pornography. The same thing applies to discovering encrypted data. In your affidavit you should explain that criminals sometimes encrypt files that contain evidence. Some may even use steganography techniques to hide other files.
For this week’s discussion, complete the following questions below in detail.  Please discuss FILLER TEXTrespond in a thorough, substantive, intelligent way to your fellow classmates will add to our discussion and learning of this week’s topic!
1) List and explain five (5) examples of how steganography were used FILLER TEXT the advent of computers.
3) Discuss how steganography and encryption could be used legitimately, and why this could cause you a problem as a computer forensic examiner.
FILLER TEXT
Project 2
2.Project #2 – Investigative Collection of Evidence

No directly quoted material may be used in this project paper.
Resources should be summarized or paraphrased with appropriate in-text and Resource page

For the purpose of this second Project, you are still the Information Security Analyst for Provincial Worldwide.  Consider this project a continuation of the work you performed in Project #1.  In this portion of the investigation, you are ONLY collecting the physical evidence, packaging it, and documenting and reporting it. You will NOT be handling the digital data during this stage of the investigation. (This step will be discussed in the Final Project.) You should limit your “care and handling” of each piece of evidence to the physical handling of the digital item/container.
With the scenario in mind, you are to report to your supervisor, thoroughly providing a response to the following questions (in paragraph format, properly citing outside research, where appropriate) to both Part I and Part II of the project:
Part I: Overview/Case Summary
1. Write a short summary of the incident to Director McPherson concerning was has occurred, and establish what permissions/authorities you have before you search Mr. Belcamp’s former Company work area.  This includes your legal authority as a Company representative as a private company.
Part II: Physical Evidence Acquisition:
2. Look at the photo of Mr. Belcamp’s work area. (See file attachment Work_Area.jpg) Identify four (4) potential items of digital evidence you see in the photo.  For those four items, describe EACH item you identified and explain what potential use the item would be within the investigation (e.g., what type of data that item might hold, why it is important, and what type of evidence it represents for prosecution.)

Select two (2) of the items you identified and describe the steps that would be taken to collect the items (with emphasis on the care and handling, and packaging of each item consistent with digital forensic best practices described in the module content/weekly readings) at the scene. You should document these steps in a detailed way that will mitigate questions, concerns, or a basic lack of information that will call your processes into question in court.

3. Look again at the photo of Mr. Belcamp’s work area. (See file attachment Work_Area.jpg) Identify four (4) potential items of non-digital evidence you see in the photo.  For those four items, describe EACH item you identified and explain what potential use the item would be within the investigation (e.g., what type of data that item might hold, why it is important, and what type of evidence it represents for prosecution.)

Select two (2) of the items you identified and describe the steps that would be taken to collect the items (with emphasis on the care and handling, and packaging of each item consistent with digital forensic best practices described in the module content/weekly readings) at the scene. You should document these steps in a detailed way that will mitigate questions, concerns, or a basic lack of information that will call your processes into question in court.

4. The evidence you seized in Questions two (2) and three (3) must be transported, secured and stored after removing it from the original scene (the work area) and prior to sending it for analysis. Describe the security procedures in place as well as any environmental considerations or protections (specific to computer/digital devices) that are in place within the storage area, and why they are important.
5. Look at the Evidence Custody Document (See file attachment Evidence Custody Document.doc) and item photographs (Items-seized (pics).pptx). Read the Evidence Custody Document prepared by your co-worker, Brian Duggars in which he was attempting to document the seizure of three (3) items pictured in the accompanying photos. Did Brian adequately describe each item? What could be added to the descriptions, and for which items (based on what you see in the photos) to make them more complete and serve as an example to your co-worker of what they SHOULD look like (how they should be described)?  Or, did he do a good job and no modifications need to be made.
Project Requirements:
• Each question should be answered thoroughly looking at all the issues presented, so do your research, be specific, be detailed, and demonstrate your knowledge; submitting your project through the appropriate assignment folder.
• This project should be submitted in a single Microsoft Word document (.DOC/.DOCX), with answers separated and/or numbered in respect to the question, so as to make it clear which question is being answered. It may be in a question and answer format, or as described with answers to the associated question numbers;
• The paper should be written in third-person grammar, not first person (which means – I, me, myself, etc.);
• The submission is to have a cover page that includes course number, course title, title of paper, student’s name, and the date of submission per APA writing format;
• Format: 12-point font, double-space, one-inch margins;
• It is mandatory that you do some research, and utilize outside resources! You must have a reference page at the end of your project that is consistent with APA citation style and format (see https://owl.english.purdue.edu/owl/resource/560/01/ for help).
FILLER TEXT
FILLER TEXT
3. the attachment will help with both  Project s

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
error: