question archive 1) Explain  the following,   a

1) Explain  the following,   a

Subject:Computer SciencePrice: Bought3

1) Explain  the following,

 

a. Acquiring digital data 

b. Digital Forensics 

c. Process of Forensic science

d. Process of Forensic Investigation

 

2. A man in his late 60s is murdered in broad daylight at the intersection of Robert Brian Street and Withier Street. There is a Mobile device lying 10 m from the body near a park bench. The Mobile device is an iPhone 4s and it has nearly 10% battery power left. It is not password protected. He was an employee of company Blitz and carried his company provided Mobile device when he would be on Door to Door Sales duty between 7:00 and 4:00 pm every day.

a) What do you think are the current Privacy Laws in Australia?

b) What are the Forensic policies that the authority will take into consideration during investigation?

c) What are the possible Forensic processes that could be implemented in the above case?

 

3. Case Scenario: Employee A, a whistle-blower has passed confidential information about person M saying that M has been constantly trying to record the meeting held to discuss the new Product Launch and apparently has been in constant communication with the Product Owner of the Rival Company MM.

In the above scenario, which Mobile Digital Forensic Policies and Practices should have been already implemented to have prevented this malpractice (2 Policies or practices)

 

4. Write short notes on the following in relation to the Layered Model of Forensic Data Acquisition (Also mention about the context when the following methods would be used individually or in combination)

 

a) Manual Extraction (including User Level Access, accessing information by simply scrolling through)

b) Logical Extraction 

c) Hex Dump

d) Chip-off

e) Micro - read 

 

5. Senro slipped and fell flat on the ground and during that accident, her phone somersaulted twice and crash-landed on the ground splitting up the internal components,

A few minutes ago, Senro was rescuing herself from an intruder when his phone fell, that's when Senro picked up both of those phones and ran for her life.

a) Senro's iPhone is in pieces

b) Intruder's intact phone

What Forensic data tools could be used in the above cases (a,b)?

 

6. Describe the components of the Digital Cellular Network and briefly describe the foundational operation

 

7. In relation to Android platform architecture, briefly describe the following components,

 

a. Linux kernel

b. HAL(Hardware Abstraction Layer)

c. Android runtime

d. Java API framework 

e. System Apps

 

8. Briefly describe the following commonly used directories of an iOS application,

a. AppName.app

b. Documents/

c. Documents/Inbox

d. Library/

e. tmp/

 

9. Describel briefly the following commonly used directories in macOS,

a. /Applications

b. Library

c. /Network

d. /System

d. /Users

 

10. Symbian OS file structure comprises of drives and directory structures.

Please briefly describe these components.

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE