Forensics Challenge

User Generated

Zrev5

Computer Science

Description

Send your challenge to your professor prior to posting. Include your solution, that is, what you expect the outcome to be. Once you get approval, post ONLY the challenge to the Challenges forum, do not post the solution. I need this sent to me to get it approved please.

The first part of the assignment is for you to create a forensics challenge for your classmates. Create an original scenario and include as much information as you can, including graphics, header information, DNS information, etc. You must have these accompanying 'artifacts' as clues for the investigators to follow. This is not necessarily an Internet forensics challenge, you may use any of the topics presented in this course. You must provide enough information for your fellow classmates to come up with a solution. Part of the grade for this assignment is that the challenge must be 'do-able'. You can reference the assignment case studies as examples.

Send your challenge to your professor prior to posting. Include your solution, that is, what you expect the outcome to be. Once you get approval, post ONLY the challenge to the Challenges forum, do not post the solution.

Post your challenge to the Forensics Challenge Forum by the last day of Week 11 (earlier is better) in order to give your fellow classmates plenty of time to figure out a solution!

The second part is for you to respond to the other students' challenge scenarios. See week 12 for details.


User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Here you go. In case of any further inputs, please let me know.All the best!I appreciate working with you

Running head: FORENSICS CHALLENGE

1

FORENSICS CHALLENGE
Name
Course
Tutor
Date

FORENSICS CHALLENGE

2

Introduction
Threats to the security in forensic study play a significant role in the formation and the creation of
a challenge that brings out the best in a case study. Forensics must come up with skills and knowledge
used for the application of procedures and create case study challenges. Malicious software attack forms
part of the problems that need urgent solutions to the existing challenge. The case challenge looks into the
matters of phishing and hacking thus require keen analo...


Anonymous
Excellent resource! Really helped me get the gist of things.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags