Week 14 – Discussion
Week 14 – DiscussionA digital forensics professional must know basic IT skills, understand computer architecture and networking, and have analytical and investigative skills, as well as strong attention to detail. Why do think all of these skills are necessary? Please explain.(In 250 Words)
Law enforcement professionals and investigators use digital forensic methods to solve crimes every day. Locate one current news article that explains how investigators may have used these techniques to solve a crime. Explain the crime that was solved and the methods used to determine how the crime was committed. Some examples of crimes solved may include locating missing children, finding criminals who have fled the scene of a crime, or unsolved crimes from the past that have been solved due to the use of new techniques (such as DNA testing).
Your written assignment should be 3-4 paragraphs in your own words, and should include a reference citation for your source of information.
2/13/2021 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=271de701-fe14-4348-97dd-1f231fce01bc&course_i… 1/
3
%1
6
%1
4
%6
SafeAssign Originality Report
Cybersecurity Planning & Mgmt – 202051 – CRN186 – Price • Research Assignment – Wk 14
%36Total Score: Medium risk
Nagendra Babu Chinnam
Submission UUID: edd45f6a-a924-1eda-c98d-25e1b5bc514
1
Total Number of Reports
1
Highest Match
36 %
Week-14 Research Assignment x
Average Match
36 %
Submitted on
02/11/21
07:24 PM EST
Average Word Count
453
Highest: Week-14 Research Assignment.d…
%36Attachment 1
Institutional database (2)
Student paper
Internet (3)
eccouncil diva-portal firstclassessaywriters
Global database (1)
Student paper
Top sources (3)
Excluded sources (0)
View Originality Report – Old Design
Word Count: 453
Week-14 Research Assignment x
5 1
2 6 3
4
5 Student paper 1 Student paper 2 eccouncil
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport?attemptId=271de701-fe14-4348-97dd-1f231fce01bc&course_id=_50441_1&download=true&includeDeleted=true&print=true&force=true
2/13/2021 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=271de701-fe14-4348-97dd-1f231fce01bc&course_i… 2/3
Source Matches (9)
Student paper 65%
eccouncil 63%
firstclassessaywriters 69%
Student paper 69%
Week-14 Research Assignment
By
Nagendra Babu Chinnam
Digital forensics is the process of investigating by accumulating evidence from digital equipment like computers, networks, cloud, hard drive, and any endpoint
system connected to the technological infrastructure. Digital forensics involves retrieving evidence by preserving or recording the digital devices’ state, analyzing
them, and reporting the information recovered. In instances of cyber-attack crimes, a digital forensics examiner analyzes the digital attack to retrieve evidence to help
track the attackers. In today’s world, with more than 95% of people having cellphones, the data existence is staggering. The mobile phones involved in the investiga-
tion and devices like laptops, desktops, smart watches, and all other devices that fall under the internet are capable of data exchange. Data forensics has been
particularly stressed by the emergence of higher sophisticated devices (Kävrestad, 2018). Digital forensic methods are used to solve the crime by law enforcers
and investigators every day. For example, there was this case in the United Kingdom back in 2009 of a particular guy, Krenar Lusha, who was an illegal immigrant to
the UK. He was arrested based on his internet search engine pattern. He was found guilty due to the help of digital forensics. Once the computer forensics
experts investigated his laptop, they discovered that he had downloaded a manual of 4300GM that contained information to make search belts and explosives. This
opened up the case, giving them the warrant for further investigation to search his house, where they found 71.8liters of petrol, potassium nitrate, and a live shotgun
cartridge. Digital forensics also showed other evidence that he had used his laptop to message people via MSN, where he described himself as a terrorist and a
sniper. In the messages, he portrayed himself as someone who hated Jewish and American people and wanted to see them dead. All this information was re-
trieved from his laptop using digital forensics and used as digital evidence in court (Roussev, 2016). Several criminal cases have used digital evidence to uncover hid-
den scams. In most criminal cases, whenever there is not enough evidence gathered from all the sources acquired, digital forensics will often provide adequate evid-
ence to convict the person. Most of these digital devices that we use can store 99%of the information that we feed them, and in case of a criminal investigation, they
come in handy. Digital forensics is an effective method to solve crimes commonly used today by investigators (Husain & Khan, 2019).
References
Husain, M., & Khan, M. (2019). Critical concepts, standards, and techniques in cyber forensics. IGI Global. Kävrestad, J. (2018). Fundamentals of digital forensics:
Theory, methods, and real-life applications. Springer. Roussev, V. (2016). Digital forensic science: Issues, methods, and challenges. Morgan & Claypool Publishers.
1
2
3
4
5
2
4
6
4
1
Student paper
Digital forensics is the process of invest-
igating by accumulating evidence from
digital equipment like computers,
networks, cloud, hard drive, and any end-
point system connected to the technolo-
gical infrastructure.
Original source
Digital forensics is the act of helping an
investigation by accumulating evidence
from digita devices .The digital artifacts
include computer desktop,mobile,
network, cloud, hard drive, server , any
endpoint system connected to the
infrastructure
2
Student paper
Data forensics has been particularly
stressed by the emergence of higher
sophisticated devices (Kävrestad, 2018).
Original source
The emergence of higher sophisticated
devices has stressed on the importance
of digital forensics too
3
Student paper
Digital forensic methods are used to
solve the crime by law enforcers and in-
vestigators every day.
Original source
Law enforcement professionals and in-
vestigators use digital forensic methods
to solve crimes every day
4
Student paper
He was arrested based on his internet
search engine pattern.
Original source
Krenar Lusha of the United Kingdom was
arrested based on his internet search
pattern
2/13/2021 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport/ultra?attemptId=271de701-fe14-4348-97dd-1f231fce01bc&course_i… 3/3
Student paper 63%
eccouncil 68%
Student paper 64%
diva-portal 94%
Student paper 66%
5
Student paper
Once the computer forensics experts in-
vestigated his laptop, they discovered
that he had downloaded a manual of
4300GM that contained information to
make search belts and explosives. This
opened up the case, giving them the war-
rant for further investigation to search
his house, where they found 71.8liters of
petrol, potassium nitrate, and a live shot-
gun cartridge.
Original source
Examining his laptop, he found that he
had downloaded the 4300GM manual for
the manufacture of explosives and
search belts When they searched his
apartment for further investigation, po-
lice seized 71.8 L of petrol, potassium
nitrate, and a live shotgun cartridge
2
Student paper
Digital forensics also showed other evid-
ence that he had used his laptop to mes-
sage people via MSN, where he de-
scribed himself as a terrorist and a
sniper.
Original source
He had also used his laptop to chat with
people via MSN, describing himself as a
terrorist or a sniper
4
Student paper
In the messages, he portrayed himself as
someone who hated Jewish and Amer-
ican people and wanted to see them
dead.
Original source
He presented himself as a person who
wanted to see Jewish and American
people
6
Student paper
Fundamentals of digital forensics:
Theory, methods, and real-life
applications.
Original source
Fundamentals of Digital Forensics
Theory, Methods, and Real-Life Applica-
tions (2ed.)
4
Student paper
Digital forensic science:
Original source
Digital Forensic investigation
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.