Now that you have learned the basics of digital forensics analyses and methodology, and have
experienced one of the common forensic tools, use the material presented:
https://umuc.equella.ecollege.com/file/6aa8bfb8-7053-4fed-94f6-
2547e454c501/1/web/viewer.html?file=https://umuc.equella.ecollege.com/file/4692003e-12e7-4090-
87c0-25883fbfc77a/1/AvoidingtheTop10SoftwareSecurityDesignFlaws.pdf
https://umuc.equella.ecollege.com/file/6aa8bfb8-7053-4fed-94f6-
2547e454c501/1/web/viewer.html?file=https://umuc.equella.ecollege.com/file/4a847009-fab1-4368-
9392-
5101476cd685/1/AComprehensiveReviewonAdaptabilityofNetworkForensicsFrameworksforMobileClou
dComputing.pdf
https://umuc.equella.ecollege.com/file/6aa8bfb8-7053-4fed-94f6-
2547e454c501/1/web/viewer.html?file=https://umuc.equella.ecollege.com/file/0ccac136-e303-48f1-
895c-920fb35a9739/1/SecuritybyDesignPrinciples.pdf
https://umuc.equella.ecollege.com/file/6aa8bfb8-7053-4fed-94f6-
2547e454c501/1/web/viewer.html?file=https://umuc.equella.ecollege.com/file/9bd094ac-d23e-4272-
a83f-776205eb1a9a/1/VettingtheSecurityofMobileApplications.pdf
As well as research you've conducted outside of the course materials to write a research paper that
addresses the following:
1. Digital forensic methodology
2. The importance of using forensic tools to collect and analyze evidence (e.g., FTK Imager and EnCase)
3. Hashing in the context of digital forensics
4. How do you ensure that the evidence collected has not been tampered with (i.e., after collection)?
and Why and how is this important to prove in a court of law?
The deliverables for this project are as follows:
1. Digital Forensic Research Paper: This should be a five-page double-spaced Word document with
in text citations in APA format. The page count does not include diagrams or tables.
Get Free Quote!
361 Experts Online