investigator

Submit a report describing their forensics process and include any necessary screen shots or report to support this and to answer questions related to the scenario.  

ECA137 – Computer Crime & Investigation   Objective: The student is supplied with a device image, and they will need to image the image file, validate the image, mount the image file, and examine the image to determine its  contents. The student should identify the file that corresponds with the supplied file  hash and examine […]

Define that type of evidence (including a citation) and then discuss what you believe is a challenging aspect of that type of evidence for the investigator.

ASSIGNMENT In this lesson, we have looked at the following types of evidence: direct, circumstantial, inculpatory, exculpatory, corroborative, witness, and hearsay evidence. Pick one (1) type of evidence for your discussion post. Define that type of evidence (including a citation) and then discuss what you believe is a challenging aspect of that type of evidence […]

Using the internet or online library, find an article, case study, or publication about computer forensics that addresses this specific software too. Summarize your findings.

Computer Forensics: Physical and Testimonial Evidence You are an computer forensics investigator of an incident scene and looking for physical AND testimonial evidence. There are a total of 8 activities that must be addressed. I. Describe each of these and note the relevance of each. Discovery/Accusation Seizure Preservation Examination Analysis Reporting Adjudication Execution of the […]

Scroll to top