Question: Please answer all questions for Upvote :) 1. Tracking Hackers through Cyberspace and Blackboard provides a detailed Network Forensic Investigation Methodology using the acronym OSCAR.
Please answer all questions for Upvote :)
1. Tracking Hackers through Cyberspace and Blackboard provides a detailed Network Forensic Investigation Methodology using the acronym OSCAR. List five or more investigation guideline using the following table for each phase of the OSCAR investigation methodology.
| OSCAR Investigation Methodology | Investigation guidelines Summer 2018 |
| Obtain Incident Information |
|
| Obtain Environment Information |
|
| Strategize or plan for the investigation |
|
| Collect Evidence |
|
| Analyze Evidence |
|
| Forensic Report |
|
2.
Define or explain each digital evidence concept and provide one or more examples to apply the concept to Network Forensics using the following table.
| Digital Evidence Concepts | Definition or Explanation | Examples applied to Network Forensics |
| Digital Evidence |
|
|
| Best Evidence Rule |
|
|
| Hearsay Evidence |
|
|
| Business Records |
|
|
| Real Evidence |
|
|
| Circumstantial Evidence |
|
|
| Chain of Custody |
|
|
3. What is the function of Packet Sniffing or Packet Capture?
4. The second requirement to avoid any violation or privacy for employees is to 1) determine the ownership of computer technology resources, 2) to notify employees of any policies for the use of their personal computer and network devices when using the company's network. If an employee uses a personal device to access Google from a company's network can organization sniff TCP/IP packets?
5. Each TCP/IP packets has two major components: the packet header and the packet body. What type of data is store in a TCP/IP packet header?
6. What type of data is stored in a TCP/IP packet body?
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
