question archive InstructionsIn this unit, you were introduced to computer forensics
Subject:Computer SciencePrice: Bought3
InstructionsIn this unit, you were introduced to computer forensics. For this assignment, you will explore your possible future role in this field by researching employment prospects for computer forensics investigators. Compose an essay on this topic. In your essay, be sure to include the following components.
Your essay must be at least two pages in length, and you must use at least two academic sources. You should also include an introduction and conclusion section in your essay. Adhere to APA Style when creating citations and references for this assignment. APA formatting, however, is not necessary.
2. You work for a political research think tank. The job pays well, and you believe you were correct with your decision to take the job. Your organization has just received a large multimillion-dollar fee to conduct political research on a well-known public figure. You have been told to gather forensic evidence in the form of dirt from several digital resources that belonged to this well-known individual. The client is paying for the research for the sole purpose of destroying the individual's political career and reputation. Your instructions specify that you are not to vet or validate any of the evidence, just gather as much dirt as you can from what you have been given. You know that your findings will have far-reaching implications, regardless if the data is true or false. What are your thoughts on having to perform this type of forensic work? Would you do it? Why, or why not?
3. Scenario: An individual has been accused of downloading child pornography, using his ex-girlfriend's computer. The individual claims he is innocent and has not used his ex-girlfriend's computer in months. Even though the evidence seems cut and dry, the wrong interpretation of evidence can have a significant impact on the outcome of the case. You were visited by the lead investigator of the crimes against children unit. The investigator says he can prove the individual is guilty and wants you to verify his findings.Your initial findings help show the individual may be telling the truth, and the evidence may been planted by someone using his unprotected user account on the laptop. What would you do in this situation? Why?