computer forensics by using AccessData FTK imger 3.1.2.0 - or ProDiscover Basic
$30-250 NZD
Closed
Posted almost 9 years ago
$30-250 NZD
Paid on delivery
Task 1 Scenario: Investigating ex-employee accessing confidential information
As a computer forensics investigator working for a company, you have been approached by the Legal department to examine a USB drive that belongs to an employee who has been made redundant. The Legal department is concerned that the former employee was not happy when she left and suspected she might have accessed sensitive company data about an account number, 461562, belongs to a senior director and is used to access the company’s banking services over the internet. The drive could contain some other confidential documents with the text ‘book’. Legal department wants you to identify any occurrences of the account number and the word ‘book’ located on the drive. You would use ProDiscover Basic/FTK Imager tool as though to obtain a bit stream image, document these steps as part of the data acquisition, however, the image file is provided for you and named CorporateCase1.dd.
You could use ProDiscover Basic or FTK Access to analyse the image and obtain any evidence, and generate the report.
Task 2
Search and Report Criminal/Civil Case/s
Search the Internet for published cases, criminal or civil, that have digital forensics element/s. You may list three cases or more, put that in a table. However, you are required to select one of them and report it in detail, any information you could gather about it from other links, sources. Your report will comprise the following:
A case summary, relevant details, computer forensics element, and outcome of the case; then critique the case from computer forensics perspective. For example: how did they acquire the data, did they follow the right procedure, have they obtained the adequate search warrant, how did they validate the data, what were their findings, how did computer forensics contribute, positive or negative way, into the case’s outcome. For example, computer forensics helped find sufficient evidence to incriminate the ‘Person of interest’. Alternatively, computer forensics examiner did not follow adequate procedure in acquiring the data or failed to maintain the evidence ‘chain of custody’ that rendered the evidence inadmissible.
Hi.. I am an experienced technical writer and network/system/security/forensic experts with an MS in Computer Science. Check my work history. I have completed 175+ projects on several IT topics. I am a forensic expert. I am expert in Access Data's FTK, Autopsy, FTK Analyzer and several other forensic tools. I have completed more than 5 forensic projects recently. Here are the links for proof -
https://www.freelancer.com/projects/Academic-Writing/Academic-Writing-Research-Paper-Thesis/
https://www.freelancer.com/projects/Computer-Security/Forensic-Digital-Evidence.html
https://www.freelancer.com/projects/project-7114777/
https://www.freelancer.com/projects/Web-Security-Computer-Security/security-computer-forensics.html
Come to chat for details.
Thanks
Hi, I have been working as Computer Forensic Analyst more than 10 years. I became CCNP, RHCE 3 years back. Earlier I completed B.Sc. Enng and M.Sc. Engg both in computer engineering.
Hire Network professional not only writers. I'm both
Check my works here
https://www.freelancer.com/projects/Security-Forensics.html
https://www.freelancer.com/projects/Technical-Writing-Cisco/Design-Computer-Network.html
https://www.freelancer.com/projects/Social-Networking-Cisco/Design-OPNET.5744653.html
https://www.freelancer.com/projects/Web-Security-Computer-Security/Web-Security.5469931.html
I'm assuring you the best quality.
I'm looking forward to hearing from you very soon
Hi, I have professional experience in the field of Forensic investigation. I prefer FTK Imager. I even worked with law enforcement in few forensic projects as an intern. Please come in chat for more info. Thanks you.
I DID MANY WORKS IN THIS AREA GOT MANY SAMPLES. CHECK THOSE SAMPLES AND DECIDE.
========================
I am an IT professional having 15 years of experience. I am an IT Architect working for HCL Technologies . My Previous Companies are TCS , CTS , Wipro and HP. I Passed 28 Technical Exams and Achieved 30 Technical Certifications.
MCSA : Microsoft Windows 2003 / MCSA : SECURITY on Win2k3 MCSA : MESSAGING on Win2k3 / MCSE : Microsoft Windows 2003 MCSE : SECURITY on Win2k3 / MCSE : MESSAGING on Win2k3
Windows Server 2008 : Server Administrator , Enterprise Administrator
MCTS : Windows Server 2008 Network Infrastructure, Configuration MCTS : Windows Server 2008 Applications Infrastructure, Configuration MCTS : Windows Server 2008 Active Directory, Configuration
MCTS: MS SCOM 2007 Configuring / MCTS: MS SCCM 2007Configuring
MCTS : Windows 7, Exchange Server 2007 , Exchange Server 2010
VCP-510 VMware Certified Professional on vSphere 5
EX0-101 Information Technology Infrastructure Library Foundation v3 ( ITIL v3 )
Greetings,
I am BS-CS graduate having majors in Software Engineering. I have knowledge of IT and its application thus can write excellent report fulfilling the requirements of this report. All work will be done in time by submitting updates periodically and be plagiarism free as all work will be referenced authentically as aware of all referencing styles.
Hoping to hear soon from you to discuss more details.
I have done masters in Digital Investigation and Forensic Computing from UCD Dublin, I have expertise in Digital Investigation and Information Security. I have done various projects related to Digital Investigations as well as I have expertise in various forensic tools like- Encase, Autopsy, DFF, FTK toolkit, IEF etc.