You work as a forensic investigator. A recent inquiry from a local company called TriGo has caught your attention. On a routine file audit of their servers, TriGo has found some files that appear to be “corrupt” because each file uses the .xde extension. When TriGo personnel try to access the files, they show as “garbage.” Search the Internet for this file extension and summarise your findings.
Write a one-page report detailing your results. Include at least one tool or best practice you would recommend to this client.
Case Study 1: Forensic Tool Selection
Your supervisor has asked you to research current forensic acquisition tools and to compile a list of recommended tools for the new forensics’ lab. Using the Internet and the tools listed in Chapter 3 as a guideline, create the following:
Your assignment must follow these formatting requirements:
The specific course learning outcomes associated with this assignment are:
Case Study 2: POS Attacks
Suppose you are a security director for a consulting firm that implements, secures, investigates, and supports point-of-sale (POS) for small and medium businesses (SMBs) in the retail industry.
Read the article titled, “If you shopped at these 16 stores in the last year, your data might have been stolen” located athttps://www.businessinsider.com/data-breaches-2018-4 Choose 2 stores from the list and research the specific attack or breach.
Write a paper in which you:
Your assignment must follow these formatting requirements:
Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date.
The specific course learning outcomes associated with this assignment are:
Case Study 3: Apple Vs the FBI
Read the article titled, “The Secret History of the FBI’s Battle Against Apple Reveals the Bureau’s Mistake” located at http://fortune.com/2018/03/27/fbi-apple-iphone-encryption-san-bernardino/
Write a report in which you discuss:
Your assignment must follow these formatting requirements:
The specific course learning outcomes associated with this assignment are:
Assignment 1: Email Harassment
Suppose you are an internal investigator for a large software development company. The Human Resources Department has requested you investigate the accusations that one employee has been harassing another over both the corporate Exchange email system and Internet-based Google Gmail email.
Prepare a report in you:
Create an outline of the steps you would take in examining the email accusations that have been identified. Describe the information that can be discovered in email headers and determine how this information could potentially be used as evidence in the investigation.
Analyze differences between forensic analysis on the corporate Exchange system and the Internet-based Google Gmail email system. Use this analysis to determine the challenges that exist for an investigator when analysing email sent from an Internet-based email system outside of the corporate network.
Select one (1) software-based forensic tool for email analysis that you would utilise in this investigation. Describe its use, features, and how it would assist in this scenario. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date.
Term Paper: Digital Forensic Cases
You have been asked to conduct research on a past forensic case to analyse how digital data was used to solve the case. Choose one of the following digital forensic cases:
Using the Stayer Library or the Internet, search for the case notes and reports for the case and answer the following:
Summarise the case, the pertinent actors, evidence, and facts.
Outline the specific digital evidence that was used in the case.
Describe how the investigators found and documented the evidence, if any.
Describe the procedures and tool(s) used for acquiring potential evidence.
Describe the obstacles faced in the investigation.
Outline the most significant improvement to digital forensic investigations/tools that assisted with efficiency and reliability.
Provide the links to two modern tools that could have assisted with the collection of evidence.
Use at least five (5) quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date.