Summary: Explain how you would conduct the investigative preview, (3 - 4 pages), computer science homework help

Anonymous
timer Asked: Jun 3rd, 2016
account_balance_wallet $10

Question Description

The assignment is to write a 3 - 4 page paper explaining how you would conduct the investigative preview, and what you would hope to gather from the preview.  Include a brief summary from the case.  Your paper needs to explain the preview process in some detail and shouldn't be a reiteration of the case.  You're preview should answer who, what, when, where, why, and how.  The last one, "how" is vitally important and should explain your recommended procedures in detail.  Your report should also outline what you would do if evidence was found that supported the allegations against the suspect.  You also need to discuss what to do if no evidence is found that supports the allegation.

Video link :http://content.bellevue.edu/cst/cis/607/pa/computer-preview/

NOTE: 100% UNIQUE CONTENT AND APA CITATION MUST 

Unformatted Attachment Preview

CIS 607 – Case #3 Your assignment is to write a 3-4 page paper explaining how you would conduct the investigative preview, and what you would hope to gather from the preview. Include a brief summary from the case. Your paper needs to explain the preview process in some detail and shouldn't only be a reiteration of the case. You're preview should answer who, what, when, where, why, and how. The last one, "how" is vitally important and should explain your recommended procedures in detail. Your report should also outline what you would do if evidence was found that supported the allegations against the suspect. You also need to discuss what to do if no evidence is found that supports the allegation. Provide your answers in a Word document and title it with your name, course, and Case Study 3. Remember that your written work must follow APA or MLA formatting for the paper, citations, and any references. Make sure you are fully answering the questions using proper grammar and spelling. Case Additional Details:         Zane Wilkens teaches history at Fuller Middle School in West Des Moines, IA. The Principal is Samuel Brady. There is one IT person (Allen Jones) between the different schools in the district. Zane also coaches girls’ soccer and runs their practice after school for an hour. There is one IT person (Allen Jones) who takes care of the different schools in the district. The servers are located in the school district headquarters building. In addition to his school email account, he also has a Hotmail account that he accesses from his classroom computer. From his IE7 browser history, you can also tell he uses Facebook, Craigslist, and Dropbox. Equipment found in the classroom includes: o PC – IBM Lenovo 8808 Pentium D 3.4GHz 80Gb XP Desktop Computer with 1Gb of RAM and 4 USB ports and a 10/100Mb network card. o Camera – Camom PowerShoot A1300 16MP Digital Camera with a 16GB SDHC card, of which 10Gb is used. o USB Memory Stick – 8GB SanDisk Pro Duo, of which 6GB is used. In reviewing the PC’s hard drive, you notice that you can only “see” 60GB and you suspect that it may contain a hidden drive/partition since it has TrueCrypt installed. The post-it notes on his monitor contain the following: o Cindy: 555-2367 & Joann 555-8265 o HM: Porsche06, CL: Ferrari08, FB: Camaro04, TC: Mustang02 The email you found on the screen is for his school account and appears to be solely school based communications with colleagues and parents. ...
Purchase answer to see full attachment

Tutor Answer

paula9
School: University of Virginia

Hello there, thanks for the opportunity you have given me to work with you..kindly find the attached complete work..feel free to come back again..bye

Running head: COMPUTER FORENSICS

1

Computer Forensics
Name
Institution

COMPUTER FORENSICS

2

Executive summary
Fuller Middle School is located in West Des Moines. Recently the school has started to
discover some anomalies in its school management system. The school has only one IT
person known as Allen Jones who is in this case the first suspect of the action. Trying o find
out the causes of those anomalies, the school has undertaken a thorough check of the system
log files and has reflected some suspicious IP addresses. They have also identified that there
are some data that has been sent outside the school firewall. Also, the school has received
various complaints and concerns from parents and some colleagues saying that of late they
have been receiving strange messages informing them that the school fees has been increased
by some amount. Therefore, for them to pay the remaining balances, they are being redirected to a particular payment page which seems to be not legit. With a lot of concern, the
school has undertaken an investigation to find out the authorized intrusion of the school
management system. Carrying out such an investigation, it requires the Computer Forensics
four stages to be followed. These include; Acquisition stage, Identification stage, Evaluation
stage and lastly the presentation stage. Th...

flag Report DMCA
Review

Anonymous
Tutor went the extra mile to help me with this essay. Citations were a bit shaky but I appreciated how well he handled APA styles and how ok he was to change them even though I didnt specify. Got a B+ which is believable and acceptable.

Similar Questions
Hot Questions
Related Tags
Study Guides

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors