Norfolk State University Socio-CybersecurityNorfolk State University Socio-Cybersecurity
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    • HOME
      • Project Team
      • Faculty Publications
      • Student Testimonials
      • Faculty Associates
      • Module Videos: How to Use
    • About Us
    • Courses
      • American Court System
      • Elementary Social Statistics
      • Intro to Criminal Justice
      • Research Methods
      • Social Organizational Theory
      • Social Problems
    • COURSE: SOC 401
    • Contact
    Register Login

    Lab & Discussion Questions

    • Home
    • Modules
    • American Court System
    • Digital Forensics
    • Lab & Discussion Questions
    1. Based on the clip from the Law & Order episode, create a checklist for the forensic investigation process. Demonstrate how these steps align (or do not align) with the steps for forensic methodologies outline in the Background sub-section, Sec. 3.3.
    1. Design a warning banner for fictional organization …
    2. Use MD5 to find the hash value for the file, evidence.txt.
    3. The following is a detailed version of the digital forensic investigation process (p. 20-21, EC-Council, 2017):
      • The investigation is initiated the moment the computer crime is suspected.
      • The immediate response is to collect preliminary evidence. This includes photographing the scene and marking the evidence.
      • A court warrant for seizure (if required) is obtained.
      • First responder procedures are performed.
      • Evidence is seized at the crime scene. After seizure, the evidence is numbered and safely secured.
      • The evidence is securely transported to the forensic laboratory.
      • Two bit-stream copies of the evidence are created. The original disk must not be tampered with as it might change the time stamps.
      • An MD5 checksum is generated on the images.
      • A chain of custody is prepared. Any change to this chain calls into question the admissibility of the evidence.
      • The original evidence is stored in a secure location, preferably away from an easily accessible location. 11.
      • The image copy is analyzed for evidence.
      • A forensic report is prepared. It describes the forensic method and recovery tools used.
      • The report is submitted to the client.
      • If required, the investigator may attend court and testify as an expert witness.
    1. Research computer crimes:
      • Review the section, “Types of Computer Crimes” in the chapter 1, p. 16-19 of EC-Council (2017).
      • Using your preferred Internet browser, go to Digital Forensics Investigator News at http://www.forensicmag.com/topics/digital -forensics.
      • Select three computer crimes and locate a current event or case pertaining to each.
      • For each article, provide a link and a one-paragraph summary of your findings.
    2. Did you observe an example of Locard’s principle in the movie clip? Explain (minimum of 150 words).

    Search

    Department of Sociology
    Norfolk State University
    700 Park Avenue,
    Norfolk,
    Virginia 23504
    USA
    Tel: 757-823-8436

    This Project is funded by the National Science Foundation

    © 2019. NSU Socio-Cybersecurity Project. All Rights Reserved