ASSIGNMENT2: Computer Architecture and Imaging So youre telling me an exact replica of ZeroBits concept drawing has shown up on the cover of Apexs product development brochure? What are the chances of that? Unless somebody here at ZeroBit is leaking information . Ill get my best investigator on it. Thanks for coming by. I wanted to talk with you face to face. I just spoke with our VP for External Relations, and it looks like we may have a major security breach on our hands. How quickly can you image this USB stick? Our suspect has access to a live system here at Headquarters, as well as a networked computer at our remote location . Well need to examine both of them. You should be able to slip into his office and acquire his RAM and swap space while he’s at training this afternoon. But while youre waiting, check your email for a message from Legal. When you open the message from the ZeroBit Counsel, you see four questions that need to be answered in preparation for any possible legal challenge. As youre answering the fourth one, a notification pops up reminding you that the suspects training session is about to start…thats your cue that it will soon be safe to log in to the suspects computer. You run your program, acquiring the RAM and swap space from the live system. Then you log out, leaving the suspects office and computer as you found them. Your colleagues have left for the day, but youve stayed behind to image the suspects remote computer after hours. You log on to the system and have no problem using netcat to transfer a copy of his remote hard drive to your workstation at Headquarters. You lean back in your chair and smile. Youve imaged all of the suspects known devices. Tomorrow youll compile your analyses into a final forensic report. Who knows? You may even be asked to present your report in court! Digital forensics involves processing data from many different types of devices, ranging from desktops to laptops, tablets to smartphones, servers to cloud storage, and even devices embedded in automobiles, aircraft, and other technologies. In this project you will focus on the architecture and imaging of desktop and laptop computers. You will be working in the VM to image and verify the contents of the following: 1. a USB stick 2. the RAM and swap space of a live computer 3. a networked computer hard drive In the final step, you compile all of the previous lab notes and reports into one comprehensive report. The final assignment in this project is a forensic imaging lab report that can be presented in a court of law. Before you can begin imaging the USB drive provided by your supervisor, you need to review your technical manual in order to prepare a statement of work to give to your company’s legal team. Are you ready to get started? When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission. · 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment. · 1.4: Tailor communications to the audience. · 1.5: Use sentence structure appropriate to the task, message and audience. · 1.6: Follow conventions of Standard Written English. · 2.2: Locate and access sufficient information to investigate the issue or problem. · 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem. · 4.1: Lead and/or participate in a diverse group to accomplish projects and assignments. · 10.3: Demonstrate the appropriate use of multiple digital forensic tools and techniques for imaging and verification. · 10.4: Demonstrate an understanding of the different parts of a computer. · 11.1: Perform report creation, affidavit creation, and preparation to testify. Step 1: Conduct a Background Review Before you have a chance to begin the imaging process, your supervisor calls to t…
Looking for a solution written from scratch with No plagiarism and No AI?
WHY CHOOSE US?
We deliver quality original papers |
Our experts write quality original papers using academic databases.We dont use AI in our work. We refund your money if AI is detected |
Free revisions |
We offer our clients multiple free revisions just to ensure you get what you want. |
Discounted prices |
All our prices are discounted which makes it affordable to you. Use code FIRST15 to get your discount |
100% originality |
We deliver papers that are written from scratch to deliver 100% originality. Our papers are free from plagiarism and NO similarity.We have ZERO TOLERANCE TO USE OF AI |
On-time delivery |
We will deliver your paper on time even on short notice or short deadline, overnight essay or even an urgent essay |