Preview

Forensics2E Lab02 AW

Satisfactory Essays
Open Document
Open Document
256 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Forensics2E Lab02 AW
Assessment Worksheet
Applying the Daubert Standard to Forensic Evidence
Course Name and Number: _____________________________________________________
Student Name: ________________________________________________________________
Instructor Name: ______________________________________________________________
Lab Due Date: ________________________________________________________________

Overview
In this lab, you acted as a forensic specialist assisting the lead forensics investigator at the Cyber
Crimes Division (CCD) for the Fremont Police Department. You were given a hard drive image taken from a seized computer suspected of containing stolen credit card numbers. You reviewed the search warrant and completed the Chain of Custody form that accompanied the evidence drive. You prepared the contents of the seized hard drive using a variety of forensic tools as evidence in accordance with the Daubert standard. You used FTK Imager to create hashes for key evidence files. You then validated the hash code using EnCase Imager and P2 Commander, two common forensic analysis tools.

Lab Assessment Questions & Answers
1. Why is the unallocated space of a Windows system so important to a forensic investigator? 2. From where were the badnotes1.txt and badnotes2.txt files recovered?

3. What is the INFO2 file used for?

4. How do you generate a hash file in FTK Imager?

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com

Student Lab Manual

5. What was the MD5 hash value in 043458.csv, the deleted e-mail file?

6. What is the Daubert standard?

7. Why must a forensic investigator be familiar with emerging technologies?

Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com

Student Lab Manual

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Tonight we watched an episode of The Rookies named Neon Skies. The episode was about getting a couple of cops in a bad neighborhood to get to know the community and try to deter crime. The chief believes that Terry, a young African American rookie cop, would be great for the task. When rookie Terry passed on the offer, clean cut white Willie stepped up. The first day Willie encounters one of the neighborhood’s crew at the gym and invites them to a game of basketball. He gets beat up when he gets too close. He was also wearing police gear. Willie is a nice guy and is determined to come back. Terry ends up accompanying…

    • 316 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Com Prob 3

    • 226 Words
    • 5 Pages

    Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of…

    • 226 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Winsec2E Lab02 AW

    • 294 Words
    • 2 Pages

    Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.…

    • 294 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.…

    • 246 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Assesment 1

    • 477 Words
    • 3 Pages

    Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.…

    • 477 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    As a system forensics specialist I am here to help your business achieve goals based on security and confidentiality. Some of my basic tasks and high level investigation process is to use evidence to reconstruct past events and activities. Forensic specialist also use evidence to gain a better understanding of a crime (John R. Vacca & K Rudolph, 2011). I will also use this evidence to show possession and handling of digital data.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Case Project 5-3 & 5-5

    • 865 Words
    • 4 Pages

    Under the silver platter doctrine, evidence obtained by state agents in an unreasonable search and seizure was admissible in a federal criminal trial, where no federal agent participated in a search and seizure and the state officers did not act solely on behalf of the United States (Hills, 1999). Simply put, federal officers cannot allow state police to do the dirty work, and then claim that they did not violate search and seizure rights. By analogy, no government agent can stand by, allow a private citizen to violate search and seizure strictures on the government 's behalf, and then claim innocence as to the violation (Hills, 1999).…

    • 865 Words
    • 4 Pages
    Good Essays
  • Better Essays

    2. Which item(s) generated by WinAudit would be of critical importance in a computer Forensic investigation?…

    • 664 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Helix3 Pro Step Action

    • 1321 Words
    • 5 Pages

    The destination media represents the HDD that will contain the output of the forensic acquisition. Before this process takes place, certain requirements must be met to ensure a successful and forensically sound acquisition.…

    • 1321 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Chapter20

    • 16888 Words
    • 85 Pages

    Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).…

    • 16888 Words
    • 85 Pages
    Good Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Forensic Science 1

    • 353 Words
    • 2 Pages

    1. Why do you think it is so important to use proper methods when collecting evidence from a crime scene?…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Appendix E Solution

    • 3551 Words
    • 17 Pages

    © 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible…

    • 3551 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    Forensic Tool

    • 1128 Words
    • 5 Pages

    One of the hardest choices to make when dealing with a problem is, what tool will resolve this issue? There are hundreds of tools that deal with the different aspects and approaches to memory forensics and incident response. Failing to choose a tool, leaves a hole in mission related capabilities. The two that are discussed within this paper are Redline and Volatility. These tools address the issue of memory forensics and incident response; however, they take different approaches to accomplish that goal. Redline is a Windows specific, GUI based program with minimal functionality, but a streamlined approach to giving you the important data up front. Volatility is compatible with Windows, Linux, Mac, and…

    • 1128 Words
    • 5 Pages
    Good Essays

Related Topics