Assignment and Discussions

Anonymous
timer Asked: Oct 20th, 2018
account_balance_wallet $9.99

Question Description

Assignment 2: Forensic Lab Design
Due Week 3 and worth 100 points



Imagine the university that employs you as an information security professional has recently identified the need to design and build a digital forensic laboratory. You have been tasked with designing the lab for the organization.



Write a four to five (4-5) page paper in which you:



Explicate the steps you would take to plan a budget for the lab, keeping in mind the general business objective to avoid unneeded costs.
Recommend the physical requirements and controls that you would consider implementing in order to keep the lab safe and secure.
Identify at least three (3) hardware and software tools that you would include in the design of the lab and explain your reasons behind your choices.
Identify the high-level criteria that would be considered when selecting the forensic workstations to be utilized.
Describe the mandatory policies, processes, and procedures you would implement in order to maintain the lab environment and preserve evidence.
Design a floor plan for the lab using a diagramming application such as Visio or Dia. Note: The graphically depicted solution is not included in the required page length.
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.




Your assignment must follow these formatting requirements:



Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Include charts or diagrams created in Visio or one of their equivalents such as Open Project Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.




The specific course learning outcomes associated with this assignment are:



Describe the purpose and structure of a digital forensics lab.
Examine and explain the evidence life cycle.
Describe the constraints on digital forensic investigations.
Develop a computer forensics deployment plan that addresses and solves a proposed business problem.
Use technology and information resources to research issues in computer forensics.
Write clearly and concisely about computer forensics topics using proper writing mechanics and technical style conventions.




Discssion 1





"Investigation Nuances" Please respond to the following:



Consider the two goals of data collection – maximizing the usefulness of the evidence and minimizing the cost of collecting it. Analyze why these goals can create significant challenges for an investigator. Determine what potential downfalls may arise in an investigation when limiting evidence collection operations purely based on cost.
Examine the nuances of evidence collection when dealing with volatile and temporary data and provide an example. Suggest at least three procedures, tools, and / or techniques at the disposal of an investigator that could assist him / her in evidence collection of this potentially critical evidence.
Please provide your opinion with regard to the following scenario:
You are a forensics investigator. You arrive at a crime scene that has both physical evidence and digital evidence collection in progress. You come upon a computer with blood evidence, finger prints, etc. and you are responsible for collecting the volatile digital evidence which may be compromised if anything is done with the computer. Who has the first priority for investigation, you or the physical evidence collector and why?



Dicusson 2





"The New Age of Digital Forensics" Please respond to the following:



Compare and contrast the procedures of “typical” digital forensics on servers, desktops and laptops vs. the digital forensics performed on mobile devices and in the cloud. Justify which of these categories is procedurally more difficult and why you believe that to be the case.
From the e-Activity, explicate in your own words what you believe is the greatest challenge for employers in regards to digital forensics on mobile devices, in bring-your-own-device (BYOD) deployments and in the cloud. Additionally, determine what you believe is the greatest challenge for digital forensics professionals with these increasingly prevalent technologies. Justify your response.



Tutor Answer

smithwiliams
School: University of Maryland

Attached.

Discussion 1: Investigation Nuances
Maximizing usefulness of evidence and minimizing the cost of collecting it and
the limitations that may arise when limiting evidence collection based on prices
The primary goal of any investigation is to draw as much information as possible
from a scene. Often, technological and skillful information drawing techniques are expensive, as
much as they are efficient. As such, a balance needs to be drawn about the nature of the
information sought and the cost of obtaining such information. This balance is often hard to
achieve owing to the growing sophistication of crime that warrants the use of highly
technologically advanced methods (Hess & Haas, 2016).
If costs are the primary consideration in investigations, then the effectiveness of
any investigative operation will be significantly affected regarding valuable evidence, since most
evidence-based forensic procedures in the modern world are expensive (Hess & Haas, 2016).
Nuances of evidence collection in volatile and temporary data and techniques
that may be used
The central shade of unstable and temporary data is the fact that these data sets
can be easily manipulated and destroyed over a short period. If the investigator does not act fast
and effectively, the evidence may be lost. Also, there are instances where analysis takes more
time than is available (Hess & Haas, 2016).
In such situations, it is imperative for investigators to use efficient recording and
analytics techniques. For example, in highly volatile biological evidence such as semen in rape,
an investigator may use refrigeration and preservation of fresh semen for future analysis of
DNA. Photography and casting may be incorporated in evidence situations like fingerprints and
the like where the evidence may be easily manipulated, for future analysis (Hess & Haas, 2016).

Why the physical evidence collector should be given priority in the scenario
The physical evidence collector should be given priority because fingerprints,
blood evidence and the like are volatile by their nature. The evidence eradicates itself through
natural decomposition if not collected in time. Digital evidence may only be destroyed under
human influence. Even if it is eliminated, various data recovery techniques are applicable in such
situations.

Reference
Journal with 2 authors
Hess, S., & Haas, C. (2016). Recovery of Trace DNA on Clothing: A Comparison of Mini-tape
Lifting and Three Other Forensic Evidence Collection Techniques. Journal Of Forensic
Sciences, 62(1), 187-191. doi: 10.1111/1556-4029.13246


Discussion 2: New age digital forensics
Procedures for typical digital forensics and digital forensics performed on
mobile devices
Although...

flag Report DMCA
Review

Anonymous
Tutor went the extra mile to help me with this essay. Citations were a bit shaky but I appreciated how well he handled APA styles and how ok he was to change them even though I didnt specify. Got a B+ which is believable and acceptable.

Similar Questions
Related Tags

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors