Course: Digital Forensics Tools and Tech

Do a bit of research on-line. Find a criminal case that involved Digital Forensics. 

Using WORD, write an ORIGINAL brief essay of 300 words or more describing the case and the how digital forensics were used  in the investigation. 

7/13/19, 2)35 PMOriginality Report

Page 1 of 4https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/origina…7&course_id=_44462_1&includeDeleted=true&print=true&download=true

%%27

SafeAssign Originality Report Digital Forensics Tools & Tchq – 201950 – CRN139 – … • Week Two Assignment

%%27Total ScoreTotal Score:: Medium risk Sumanth Reddy Gouram

Submission UUID: 61a51fcd-c532-c720-f244-4b736ff0cc89

Total Number of ReTotal Number of Re……

1 Highest MatchHighest Match

27 % DIGITALFORENSICS1.docx

Average MatchAverage Match

27 % Submitted onSubmitted on

07/13/19 1:04 PM CDT

Average Word CountAverage Word Count

433 Highest: DIGITALFORENSI…

%%27Attachment 1

InternetInternet ( (22))

eccounci leccounci l forenseforense

Top sourcesTop sources ( (22))

Excluded sourcesExcluded sources ( (00))

View Originality Report – Old Design

Word Count: 433 DIGITALFORENSICS1.docx

11 22

11 eccounci leccounci l 22 forenseforensehttps://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/originalityReport?attemptId=b2d291d7-47f5-4cfd-956a-6ef01b887477&course_id=_44462_1&download=true&includeDeleted=true&print=true&force=true

7/13/19, 2)35 PMOriginality Report

Page 2 of 4https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/origina…&course_id=_44462_1&includeDeleted=true&print=true&download=true

Source MatchesSource Matches ( (66))

eccouncil 65%

eccouncil 65%

Running Head: DIGITAL FORENSICS 1

DIGITAL FORENSICS 2

DIGITAL FORENSICS

Sumanth Reddy Gouram

07/12/2019

Introduction

Digital forensics is the process accumulating evidence by using digital artifacts such as network, computer, hard drive, server phone, and cloud. This activity also involves the collection of information from images, messages, deleted files, and emails. The main responsibilities of digi-

tal forensics include the recording and preserving the state of digital equipment and analyzing the condition of the digital equipment and re- porting the data retrieved from the devices. In the case of cybercrime, digital forensics will gather and analyze digital data as well as digital devices to find enough evidence and find the attacker, (Taylor, et al., 2017). Most of the people in the United States own smart phones. Al- though, other devices such as laptops, play station, juke box, smart watches, and anything under the internet can be used as part of the evi- dence. The advance in technology and emerge of highly sophisticated devices have stressed the essence of digital forensics. Lusha Krenar was arrested in the United Kingdom based on internet search. When he was investigated, it was evident that he had downloaded the 4300 GM manual of information on how to make explosives and search belts, (Richard III & Roussev, 2016). The police later searched his apartment for evidence, and they found 71.8 litres of petrol, shotgun cartridge, and potassium nitrate. He also used his laptop to communicate with other people via MSN. Also, he presented himself as a person who wanted to see the Americans and Jewish killed. The conversation was gotten from

his computer and used in court as evidence. In this case, digital forensics had to be used to accumulate evidence. Conclusion

Digital forensic is a professional field. The use of computers and the growth of technology has led to an increase in demand for a digital investi- gation. Digital forensics was initially used as a method of fighting financial crime in the 1970s. Cyber-crimes are increasing in number, (Casey, 2019). There are five stages in digital forensics, which include the identification of the source and information. The other stages include preser- vation, collection, analysing, and reporting the evidence. To be a digital forensic one has to be a scientist first, and therefore, he or she has to

be updated with the latest research.

Reference

Casey, E. (2019). Handbook of digital forensics and investigation. Academic Press. Richard III, G. G., & Roussev, V. (2016). Next-generation digital forensics. Communications of the ACM, 49(2), 76-80. Taylor, R. W., Fritsch, E. J., & Liederbach, J. (2017). Digital crime and digital terrorism. Prentice Hall Press.

11

11

11

11

22

1

Student paper

DIGITAL FORENSICS 1 DIGITAL FORENSICS 2

Original source

What Is Digital Forensics What Is Digital Forensics

1

Student paper

This activity also involves the collection of information from images, mes- sages, deleted files, and emails.

7/13/19, 2)35 PMOriginality Report

Page 3 of 4https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/origina…&course_id=_44462_1&includeDeleted=true&print=true&download=true

eccouncil 63%

eccouncil 73%

eccouncil 84%

forense 66%

Original source

The activity also includes collecting information from emails, SMSs, images, deleted files, and much more

1

Student paper

In the case of cybercrime, digital forensics will gather and analyze digital data as well as digital devices to find enough evidence and find the attacker, (Tay- lor, et al., 2017).

Original source

In the case of a cybercrime, a digital forensic examiner analyzes digital de- vices and digital data to gather enough evidence to help track the attacker

1

Student paper

Lusha Krenar was arrested in the United Kingdom based on internet search. When he was investigated, it was evident that he had downloaded the 4300 GM manual of information on how to make explosives and search belts, (Richard III & Roussev, 2016). The police later searched his apartment for evi- dence, and they found 71.8 litres of petrol, shotgun cartridge, and potassium nitrate. He also used his laptop to communicate with other people via MSN.

Original source

Krenar Lusha of the United Kingdom was arrested based on his internet search pattern On investigating his laptop, it was found that he had down- loaded a manual of 4300 GM to make explosives and search belts When they searched his apartment for further investigation, the police also recovered 71.8 l of petrol, potassium nitrate, and a live shotgun cartridge He had also used his laptop to chat with people via MSN, describing himself as a terrorist or a sniper

1

Student paper

Also, he presented himself as a person who wanted to see the Americans and Jewish killed.

Original source

He presented himself as a person who wanted to see Jewish and American people killed

2

Student paper

Handbook of digital forensics and investigation.

Original source

7/13/19, 2)35 PMOriginality Report

Page 4 of 4https://blackboard.nec.edu/webapps/mdb-sa-BB5b75a0e7334a9/origina…&course_id=_44462_1&includeDeleted=true&print=true&download=true

en Digital Forensics and Investigation, 2009

"Get 15% discount on your first 3 orders with us"
Use the following coupon
FIRST15

Order Now