Order For Similar Custom Papers & Assignment Help Services

Fill the order form details - writing instructions guides, and get your paper done.

Posted: July 12th, 2022

Digital Forensics Class

Instructions
Digital Forensics Class
No directly quoted material may be used in this project paper.

Resources should be summarized or paraphrased with appropriate in-text and Resource page

Assignment info:

1. Explain what a search warrant is, why it is necessary, and how it it used to obtain digital evidence.

2. From the following list of digital items that would hold data.
-Cellphone,
-Laptop
-USB memory stick

For each item listed above:

Describe the item and explain what potential use the item would be within an investigation (e.g., what type of data that item might hold and where it may be stored on the device, and why the data may be important)
How would you package the items, each individually as evidence being specific as to the materials used and the process of documentation. With each, describe the steps that would be taken to collect the items (with emphasis on the care and handling, and packaging of each item consistent with digital forensic best practices described in the module content/weekly readings) at the scene. You should document these steps in a detailed way that will mitigate questions, concerns, or a basic lack of information that will call your processes into question in court.

3. What are the differences in acquisition of data from a live (turned on) system, compared to one that not on (turned off) at the time you encounter it.

Assignment Requirements:

Each question should be answered thoroughly looking at all the issues presented, so do your research, be specific, be detailed, and demonstrate your knowledge; submitting your assignment through the appropriate assignment folder.
This project should be submitted in a single Microsoft Word document (.DOC/.DOCX), with answers separated and/or numbered in respect to the question, so as to make it clear which question is being answered. It may be in a question and answer format, or as described with answers to the associated question numbers;
The paper should be written in third-person grammar, not first person (which means – I, me, myself, etc.);
The submission should include the course number, course title, title of paper, student’s name, and the date of submission in the upper left hand corner;
Format: 12-point font, double-space, one-inch margins;
It is mandatory that you do some research, and utilize outside resources! You must have a reference page at the end of your assignment that is consistent with Help write my thesis – APA 7th edition citation style and format
Digital Forensics Class
Name
Institution

Digital Forensics Class
Explain what a search warrant is, why it is necessary, and how is it used to obtain digital evidence.
A search warrant is a signed document by a competent authority, such as a magistrate authorizing or giving a law enforcement officer the authority to search a specified place for specific items described in the warrant even without the occupant’s or owner’s consent (Legal Information Institute, n.d.). However, for the warrant to be lawfully valid, it must be based on an affidavit. An affidavit is a document signed under oath by a law enforcement officer or another person indicating that they have a certain belief the specified items or information will be acquired at the location or in the item to be searched and giving facts to support their belief. A search warrant is necessary to ensure the digital evidence acquired can be submissive in court without the considered to be outside the judicial process or having infringed the Fourth Amendment (Welty, 2014). With individuals having a reasonable expectation of privacy in the digital device’s content, a warrant will ensure the search considers individual privacy. The warrant is used in obtaining digital evidence by allowing the officers to copy seized material either on-site or off-site for analysis.
From the following list of digital items that would hold data.
Cellphone
A cellphone is a communication device with access to a cellular radio system without a physical connection to a network. The types of digital data a cellphone might hold used for investigation include call history, audio and video files, contact list, messaging content, internet access history, geolocation data, and system files. The cellphone should be packaged in a faraday box or bag and be in airplane mode, disabled Wi-Fi and hotspots, or cloning the SIM card.
Laptop
A laptop is a portable computer, which is essential in the digital forensic investigation as it can be used to retrieve various data stored in the laptop hard drive, including audio and video files, documents, and geolocation data. The laptop should be packaged in a sealed and labeled box or bag and kept away from possible collisions.
USB memory stick
The USB memory stick is a type of electrically storage commonly used to store files and other objects. The digital forensic investigation can obtain various evidence, including audio, video, and document files from the USB memory (Sansurooah, 2009). The USB memory stick packaging should be conducted in an appropriate sleeve or case and sealed in a labeled paper envelope or bag.
What are the differences in the acquisition of data from a live (turned on) system, compared to one that not on (turned off) at the time you encounter it.
Evidence acquisition is a vital process in digital forensic investigation. The technological development has seen new methods of acquisition of data in digital forensic investigation. However, the most commonly used methodologies for acquiring digital evidence include live acquisition and offline or dead acquisition. The differences between acquisitions of data from turned on systems and turned off systems when encountering the systems are based on the two methodologies. Data acquisition from live acquisition involves systems that are up and running where information might be altered since data is continuously processed. Data acquisition from turned-off systems involves removing the disk and connecting it to a forensic workstation to obtain the data (Kolhe & Ahirao, 2017). The other difference between the data from a live system and that from a turned-off system is the data modification, whereby the turned off system involves a slim chance of data modification since the system is non-functional at the time. However, the chances of data modification in the live system are high, considering the ongoing connectivity used to compromise the data.
References
Infosec Resources. (2020). The Mobile Forensics Process: Steps & Types. Retrieved from https://resources.infosecinstitute.com/category/computerforensics/introduction/mobile-forensics/the-mobile-forensics-process-steps-types/#:~:text=The%20mobile%20forensics%20process%20aims,in%20a%20forensically%20sound%20condition.&text=Usually%2C%20the%20mobile%20forensics%20process,other%20branches%20of%20digital%20forensics.
Kolhe, M., & Ahirao, P. (2017). Live Vs Dead Computer Forensic Image Acquisition. International Journal of Computer Science and Information Technologies, Vol. 8 (3), 455-457. http://www.ijcsit.com/docs/Volume%208/vol8issue3/ijcsit2017080331.pdf
Legal Information Institute. (n.d.). Search Warrant. Retrieved from https://www.law.cornell.edu/wex/search_warrant
Sansurooah, K. (2009). A forensics overview and analysis of USB flash memory view and analysis of USB flash memory devices. Proceedings of the 7th Australian Digital Forensics Conference. doi: https://doi.org/10.4225/75/57b28b7240cd3
Welty, J. (2014). Search Warrants for Digital Devices. UNC School of Government. Retrieved from https://www.sog.unc.edu/sites/www.sog.unc.edu/files/additional_files/2.0%20Handout%20re%20Search%20Warrants%20for%20Digital%20Devices%20–%20version%20for%20Court%20of%20Appeals%20Judges.pdf

Order | Check Discount

Tags: Digital Forensics Class

Assignment Help For You!

Special Offer! Get 20-25% Off On your Order!

Why choose us

You Want Quality and That’s What We Deliver

Top Skilled Writers

To ensure professionalism, we carefully curate our team by handpicking highly skilled writers and editors, each possessing specialized knowledge in distinct subject areas and a strong background in academic writing. This selection process guarantees that our writers are well-equipped to write on a variety of topics with expertise. Whether it's help writing an essay in nursing, medical, healthcare, management, psychology, and other related subjects, we have the right expert for you. Our diverse team 24/7 ensures that we can meet the specific needs of students across the various learning instututions.

Affordable Prices

The Essay Bishops 'write my paper' online service strives to provide the best writers at the most competitive rates—student-friendly cost, ensuring affordability without compromising on quality. We understand the financial constraints students face and aim to offer exceptional value. Our pricing is both fair and reasonable to college/university students in comparison to other paper writing services in the academic market. This commitment to affordability sets us apart and makes our services accessible to a wider range of students.

100% Plagiarism-Free

Minimal Similarity Index Score on our content. Rest assured, you'll never receive a product with any traces of plagiarism, AI, GenAI, or ChatGPT, as our team is dedicated to ensuring the highest standards of originality. We rigorously scan each final draft before it's sent to you, guaranteeing originality and maintaining our commitment to delivering plagiarism-free content. Your satisfaction and trust are our top priorities.

How it works

When you decide to place an order with Dissertation App, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much detail as possible.

Assignment of Writer

We analyze your order and match it with a writer who has the unique qualifications to complete it, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.