Find Jobs
Hire Freelancers

computer forensics by using AccessData FTK imger 3.1.2.0 - or ProDiscover Basic

$30-250 NZD

Closed
Posted over 10 years ago

$30-250 NZD

Paid on delivery
Task 1 Scenario: Investigating ex-employee accessing confidential information As a computer forensics investigator working for a company, you have been approached by the Legal department to examine a USB drive that belongs to an employee who has been made redundant. The Legal department is concerned that the former employee was not happy when she left and suspected she might have accessed sensitive company data about an account number, 461562, belongs to a senior director and is used to access the company’s banking services over the internet. The drive could contain some other confidential documents with the text ‘book’. Legal department wants you to identify any occurrences of the account number and the word ‘book’ located on the drive. You would use ProDiscover Basic/FTK Imager tool as though to obtain a bit stream image, document these steps as part of the data acquisition, however, the image file is provided for you and named CorporateCase1.dd. You could use ProDiscover Basic or FTK Access to analyse the image and obtain any evidence, and generate the report. Task 2 Search and Report Criminal/Civil Case/s Search the Internet for published cases, criminal or civil, that have digital forensics element/s. You may list three cases or more, put that in a table. However, you are required to select one of them and report it in detail, any information you could gather about it from other links, sources. Your report will comprise the following: A case summary, relevant details, computer forensics element, and outcome of the case; then critique the case from computer forensics perspective. For example: how did they acquire the data, did they follow the right procedure, have they obtained the adequate search warrant, how did they validate the data, what were their findings, how did computer forensics contribute, positive or negative way, into the case’s outcome. For example, computer forensics helped find sufficient evidence to incriminate the ‘Person of interest’. Alternatively, computer forensics examiner did not follow adequate procedure in acquiring the data or failed to maintain the evidence ‘chain of custody’ that rendered the evidence inadmissible.
Project ID: 5281423

About the project

2 proposals
Remote project
Active 10 yrs ago

Looking to make some money?

Benefits of bidding on Freelancer

Set your budget and timeframe
Get paid for your work
Outline your proposal
It's free to sign up and bid on jobs
2 freelancers are bidding on average $333 NZD for this job
User Avatar
I can solve this assignment to you, I'm professional in security. can you explain me more details for your project!
$444 NZD in 7 days
0.0 (0 reviews)
0.0
0.0
User Avatar
hello sir i am very interested in your assignment as it is a very very interesting and complicated topic i would really like to do this project, but i am little confused for some parts we can discuss them later i m sure
$222 NZD in 5 days
0.0 (0 reviews)
0.0
0.0

About the client

Flag of NEW ZEALAND
Wellington, New Zealand
0.0
0
Member since Mar 8, 2012

Client Verification

Thanks! We’ve emailed you a link to claim your free credit.
Something went wrong while sending your email. Please try again.
Registered Users Total Jobs Posted
Freelancer ® is a registered Trademark of Freelancer Technology Pty Limited (ACN 142 189 759)
Copyright © 2024 Freelancer Technology Pty Limited (ACN 142 189 759)
Loading preview
Permission granted for Geolocation.
Your login session has expired and you have been logged out. Please log in again.