Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

PLEASE PROVIDE ME A SHORT AND WEELL EXPLAIN ANSWER OF BOTH CASE STUDIES. THANK YOU. Case 1 A major organization was facing a crisis when

PLEASE PROVIDE ME A SHORT AND WEELL EXPLAIN ANSWER OF BOTH CASE STUDIES. THANK YOU.

Case 1

A major organization was facing a crisis when a very senior member of staff was under suspicion of downloading thousands of pornographic images from the internet. He vehemently denied it all, but the case against him looked very serious.

Our detailed and sustained analysis of internet use and traffic pinpointed a clash of IP addresses on the system. The evidence started to point toward the organizations system administrator, but he denied it.

As we dug deeper, we proved that it was the administrator whod been using his local desktop system to access numerous pornographic websites. Over three months, he visited 1200 pornographic websites and downloaded over 15,000 images. To cover his tracks, and in an attempt to frame a senior manager, he had been altering his local system IP address so the trail led to his senior manager colleague.

Q. What are your options for acquiring the image? Write a brief paper specifying the hardware and software you would use.

Case 2

A person has used a stolen vehicle to plant narcotics in a leading industrialists property so as to incriminate him. He is alleged to have killed the owner of the vehicle. Police have partial view of the alleged criminal on CCTV but it is not suitable to be admissible in a court of law.

Through informers, the police later come to know the alleged criminal has tried to destroy his laptop containing the incriminating evidence by throwing his laptop in a lake. With the help of marine divers the police recover the submerged laptop.

Q. Research methods by which an image could perhaps be created of the laptop recovered from the lake that has the evidence. What are the challenges?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Systems For Advanced Applications 18th International Conference Dasfaa 2013 Wuhan China April 22 25 2013 Proceedings Part 2 Lncs 7826

Authors: Weiyi Meng ,Ling Feng ,Stephane Bressan ,Werner Winiwarter ,Wei Song

2013th Edition

3642374492, 978-3642374494

More Books

Students also viewed these Databases questions

Question

5. Identify three characteristics of the dialectical approach.

Answered: 1 week ago

Question

6. Explain the strengths of a dialectical approach.

Answered: 1 week ago

Question

4. Explain the strengths and weaknesses of each approach.

Answered: 1 week ago