Project #13355 - Project 1

Project 1


Related Book: “Computer Forensics Principle and Practices”. Download link:


Question 1

From watching police investigation shows or reading detective stories, you are aware of the specially trained forensics experts who search crime scenes looking for clues. In real life, computer forensics specialists use the same skills to look for e-evidence on hard drives and digital devices.

Search online news-media Web sites, such as or, and advisory resources, such as or, for information about how the creators of the Netsky worm, Sasser worm, and Goner were tracked down. Write a report that explains how the creators of these pests were identified using e-evidence. Identify the similarities and differences in the capture and conviction of the suspects. For this case study you might also consult any of the following resources to find information:

How Goner suspects were tracked down: content/ 56/23292.html

http://news bot


Question 2

The sheer scale and pervasiveness of technology throughout the world is truly staggering. Most of us are oblivious to the evidence our activities leave on our computers, phones, and handheld devices or how we can be profiled using credit card and toll debit cards.

1. Using an online database or an Internet search engine, search for a situation in which an electronic device or recorder implicated someone of a crime or wrongdoing.

2. Write a report on thee-evidence admissibility issues in the case.

3. In your report, describe how that evidence was discovered and retrieved by law officers or computer forensics experts.

For this case study you might also consult any of the following resources to find information: ccunits.html


Question 3

Several recent cases included e-evidence. Three examples are:

·         Juru Jiang was sentenced to 27 months in prison after being convicted for installing keystroke loggers on computers at Kinko’s throughout Manhattan. He illegally collected confidential information that gave him access to individuals’ confidential bank account data. (February 2005)

·         Allan Eric Carlson was convicted of 79 counts of computer and identity fraud and sentenced to 48 months in jail. Because he was unhappy with the poor performance of Philadelphia Phillies, he sent spoofed e-mails complaining about the team. His spoofed e-mails indicated that they were from newspaper writers at Fox Sports, ESPN, and other media outlets. (July 2005)

·         Scott Levine was found guilty of 120 counts of unauthorized access of a protected computer, two counts of access device fraud, and one count of obstruction of justice. He and several co-workers at Snipermail, an e-mail distributor, stole more than a billion records containing personal data from Acxiom, a business partner firm. (August 2005)

Source: Adapted from Harris, Shon, “To Catch a Thief”.  Information Security. December, 2005.

1. In each of these situations, consider the potential types and locations where e-evidence might have been left by these computer crimes. Create a list of those potential types and locations.

2. How might the criminals have attempted to cover up their trails of e-evidence of their crimes?

3. Draft a plan for finding and collecting the e-evidence of each crime.  


Question 4

You are a senior forensics investigator in a corporate firm that handles large financial transactions for a variety of customers. The head of internal auditing has called to request that you perform a forensic analysis of an employee's computer. The auditor has found evidence of financial discrepancies but needs you to confirm how the financial transactions were done on the computer. The employee is very knowledgeable in both the financial and computer areas and has been with the company for many years.

1. Determine what steps you will follow to begin the investigation and what questions you might ask the internal auditor.

2. Considering the expertise of this user, explain how you believe the user may have hidden or masked her actions. Describe what actions you might take to investigate the user's methods.

3. Assuming you find evidence, describe the steps you would then take to formulate a report and what specific items need to be included in this report.


Question 5

You work for a regional computer forensic lab and have been tasked with recovering all data from a suspect's cellular phone, which is also a PDA. The case revolves around cyberstalking, and evidence is needed to prove these allegations. Use the Internet to research the different ways in which a person can be stalked in cyberspace. Discuss in detail your steps in recovering any and all information from the device and how cyberstalking can be proved via this evidence.




Question 6

The International Organization for Standardization (ISO) developed a model to help standardize and understand computer networks. Before this model was introduced, networks for the most part could not communicate with one another easily and became islands within organizations. The OSI model is widely used in industry as a way to ensure compatibility with other vendors' network equipment and in the education setting to teach the complex nature of computer networking in a layered approach.

1. Using the Internet, find an instance where the OSI model has been used to ensure the compatibility of network architecture.

2. Write a report based on your findings.

3. In your report, describe how the OSI model helped two separate vendors design equipment that would communicate well.

Subject Computer
Due By (Pacific Time) 10/03/2013 12:00 am
Report DMCA

Chat Now!

out of 1971 reviews

Chat Now!

out of 766 reviews

Chat Now!

out of 1164 reviews

Chat Now!

out of 721 reviews

Chat Now!

out of 1600 reviews

Chat Now!

out of 770 reviews

Chat Now!

out of 766 reviews

Chat Now!

out of 680 reviews
All Rights Reserved. Copyright by - Copyright Policy