Question: After the first lecture on Computer Forensics, as described in your textbook and explained by the instructor; Identify the type of digital system forensics analysis

After the first lecture on Computer Forensics, as described in your textbook and explained by the instructor; Identify the type of digital system forensics analysis technique you will use in the following scenarios below. Techniques include disk forensics, email forensics, network forensics, internet forensics, software forensics, live system forensics, and cell phone/mobile forensics. Your initial write-up, which should be at least 250-500 words, should be completed and submitted during the class activity on Saturday, October 23, 2021. Also, you must come back and interact with your peers during the week. You should complete two peer responses by the end of the week. Always use the American Psychological Association (APA) 7th edition style guide for citations and references.

Scenario 1: The Federal Trade Commission disclosed a lawsuit against unknown credit card fraudsters. Over 15 companies were being run by "money mules," people who transfer stolen goods or money from one country to another. The money mules were recruited via a spam email message.

Scenario 2: A hacker broke into the primary web server of a major e-commerce website and planted a logic bomb that would cause a web server to power down. It was programmed to go off at noon the day after Thanksgiving, at the height of the holiday shopping season. Security employees at the e-commerce company were alerted to the possibility of the logic bomb but hadn't yet located it.

Scenario 3: Company Techs had been experiencing fierce competition with a rival firm. The rival firm was consistently offering new software products to customers ahead of Company Techs, and the software was almost identical to Company Techs' pre-release products. Company Techs' network was highly secure, but managers suspected that an internal employee shared confidential development plans and code.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!