Find Jobs
Hire Freelancers

computer forensics by using AccessData FTK imger 3.1.2.0 - or ProDiscover Basic

$30-250 NZD

Закрито
Опублікований over 10 years ago

$30-250 NZD

Оплачується при отриманні
Task 1 Scenario: Investigating ex-employee accessing confidential information As a computer forensics investigator working for a company, you have been approached by the Legal department to examine a USB drive that belongs to an employee who has been made redundant. The Legal department is concerned that the former employee was not happy when she left and suspected she might have accessed sensitive company data about an account number, 461562, belongs to a senior director and is used to access the company’s banking services over the internet. The drive could contain some other confidential documents with the text ‘book’. Legal department wants you to identify any occurrences of the account number and the word ‘book’ located on the drive. You would use ProDiscover Basic/FTK Imager tool as though to obtain a bit stream image, document these steps as part of the data acquisition, however, the image file is provided for you and named CorporateCase1.dd. You could use ProDiscover Basic or FTK Access to analyse the image and obtain any evidence, and generate the report. Task 2 Search and Report Criminal/Civil Case/s Search the Internet for published cases, criminal or civil, that have digital forensics element/s. You may list three cases or more, put that in a table. However, you are required to select one of them and report it in detail, any information you could gather about it from other links, sources. Your report will comprise the following: A case summary, relevant details, computer forensics element, and outcome of the case; then critique the case from computer forensics perspective. For example: how did they acquire the data, did they follow the right procedure, have they obtained the adequate search warrant, how did they validate the data, what were their findings, how did computer forensics contribute, positive or negative way, into the case’s outcome. For example, computer forensics helped find sufficient evidence to incriminate the ‘Person of interest’. Alternatively, computer forensics examiner did not follow adequate procedure in acquiring the data or failed to maintain the evidence ‘chain of custody’ that rendered the evidence inadmissible.
ID проекту: 5281423

Про проект

2 пропозицій(-ї)
Дистанційний проект
Активність 10 yrs ago

Хочете заробити?

Переваги подання заявок на Freelancer

Вкажіть свій бюджет та терміни
Отримайте гроші за свою роботу
Опишіть свою пропозицію
Реєстрація та подання заявок у проекти є безкоштовними
2 фрілансерів(-и) готові виконати цю роботу у середньому за $333 NZD
Аватарка користувача
I can solve this assignment to you, I'm professional in security. can you explain me more details for your project!
$444 NZD за 7 дні(-в)
0,0 (0 відгуки(-ів))
0,0
0,0
Аватарка користувача
hello sir i am very interested in your assignment as it is a very very interesting and complicated topic i would really like to do this project, but i am little confused for some parts we can discuss them later i m sure
$222 NZD за 5 дні(-в)
0,0 (0 відгуки(-ів))
0,0
0,0

Про клієнта

Прапор NEW ZEALAND
Wellington, New Zealand
0,0
0
На сайті з бер. 8, 2012

Верифікація клієнта

Дякуємо! Ми надіслали на вашу електронну пошту посилання для отримання безкоштовного кредиту.
Під час надсилання електронного листа сталася помилка. Будь ласка, спробуйте ще раз.
Зареєстрованих користувачів Загальна кількість опублікованих робіт
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Завантажуємо для перегляду
Дозвіл на визначення геолокації надано.
Ваш сеанс входу закінчився, і сеанс було закрито. Будь ласка, увійдіть знову.