The development of a forensic lab for computers and mobile devices involves numerous specialized tools.
A-Describe both hardware and software tools that might be utilized in such a lab.
Create a portable forensic evidence kit for corporate security investigations. Be sure to include all items that you will need to investigate a computer incident. Create a portable forensic evidence kit for corporate security investigations. Be sure to include all items that you will need to investigate a computer incident. You can use “pre-packaged” kits if they are available on the internet – if you choose to do so, please explain why you chose the kit
Using the internet or online library, find an article, case study, or publication about computer forensics that addresses spam email. Summarize your findings. Be sure to provide a link to the article, case study, or publication.
Develop a two-page brief on email or phishing scams reported within the past six months. Indicate who they were directed to, who might be behind these attacks and why. Also address any similarities/differences between similar previous attacks.
Select ONE type of software tool from the list below. Using the internet or online library, find an article, case study, or publication about computer forensics that addresses the specific software tool you chose.
1) Device Seizure by Paraben2) ForensicSIM by Evidence Talks 3) USIMdetective by Quantaq Solutions 4) SIMCON by Inside Out Forensics
An investigator of an incident scene is looking for physical AND testimonial evidence.
There are a total of six activities that must be addressed. Describe each of these and note the relevance of each.The six activities or more in some literatures are related to the activities performed by the investigator while looking for evidence. Below are examples (select one of them):
Understanding Digital Evidence
A Common Process Model for Incident Response and Computer Forensics