Mobile Investigations (REQUIRES COMPLETING VIRTUAL LAB) Computer Science Assignment Help. Mobile Investigations (REQUIRES COMPLETING VIRTUAL LAB) Computer Science Assignment Help.
(/0x4*br />
MOBILE INVESTIGATIONS TRANSCRIPT
Screen 1
You’re the lead digital forensic investigator for the Glaxsom County Sheriff’s Department. The department is handling a case where a local teenage girl has gone missing.
Screen 2
Sheriff Jamison informs you that the teen’s iPhone was retrieved from the mother, but she does not have the passcode.
Screen 3
You also learn that the teen’s mother logged into her daughter’s Facebook account and saw some things that alarmed her. It seems that the teen had recently friended a man the family does not know, and the two had been engaging in flirtatious conversations over the past two weeks.
Screen 4
Lastly, Sheriff Jamison tells you that the Internet service provider has provided call logs for the teen’s phone, after a search warrant for the information was served.
Screen 5
Sheriff Jamison:
“I need a report by the end of the week that details the current state of mobile incident response and investigation. You’ll need an investigation plan, a forensic report based on processing the image from the phone, and an analysis of tools that I should prepare our department to use in cases like this. You’re one of our lead investigators—I know you can do this.”
Mobile forensics is an increasingly complex environment for investigators because of the rapid rate of innovation and adoption of new technologies, applications, and hardware. Smartphones are being used in so many different ways that they have become a central focus in digital forensic investigations. The mobile platform is a forensic challenge because of the number of third-party applications found on many devices, the rapidly evolving security measures employed by the device manufacturers and application developers, and the explosive growth in the use of mobile devices and options.
Mobile devices include cell phones, tablets, and wearables, with literally several thousand different devices, equipped with countless types of interfaces, operating systems, and connectivity options. This type of environment has many implications for the incident responder. The number of devices makes it impossible to be well-versed in each one, complicating analysis. The sheer number of devices also makes it very expensive to stay abreast of the major players in the market. Users tend to choose mobile devices based on their portability, number of communication interfaces and sensors (e.g., GPS), and easy wireless Internet connectivity. The features that make these devices popular are the same features that make them a critical piece of a digital forensics investigation.
In the steps that comprise this project, you will examine mobile investigative challenges, as well as the techniques and technologies available to perform mobile forensic examinations. First, familiarize yourself with the details of the case and the basics provided by the sheriff. Then, you will need to develop an investigation plan that describes the current state of mobile incident response and investigation. As you proceed through Project 4, you will get hands-on practice using the forensic tool MPE+ by AccessData and complete a forensic report. The next component will be a comparative analysis, in which you will describe the features of companion mobile phone forensic tools and recommend tools and techniques to use in the current investigation. The final component is a comprehensive forensic investigation report that will synthesize the investigation plan, forensic report, and comparative analysis.
Now that you know what’s ahead of you, move on to the first step of the project.
Step 1: Familiarize Yourself with the Case and Devise an Overall Plan
With a forensic investigation focused on an iPhone, you plan to undertake a series of steps to develop the report for Sheriff Jamison. You’ll start with an investigation plan that describes the current state of mobile incident response and investigation. In this plan you will discuss the types of mobile phone technologies, challenges presented, and investigative techniques. The goal of this plan is to summarize the current landscape with mobile phone forensics, the guidelines for how examiners approach mobile phone evidence, the challenges posed by iPhones, limitations and constraints, and the expectations for forensic analysis of this device.
Next, you’ll focus on analyzing a mobile phone image using AccessData’s Mobile Phone Examiner Plus (MPE+). MPE+ is a forensics tool used to detect, collect and uncover data from iOS and Android mobile phones. As part of the AccessData suite, MPE+ integrates seamlessly with FTK, a leading tool used in digital forensic investigations. You’ll use what you learned about MPE+ to complete a forensic report.
Then, you’ll conduct a comparison analysis that scans the environment to evaluate, compare, and contrast three mobile phone forensic tools—companion tools to MPE—that could be used to address the concerns Sheriff Jamison identified in the case. This comparative analysis will culminate in your recommendation of a mobile phone forensic tool that best fits the needs of this investigation.
The final step is a comprehensive forensic investigation report to Sheriff Jamison that includes the investigation plan, as well as reports from the MPE+ investigation with your findings, the comparative tool analysis, and case overviews and conclusions.
Step 2: Write an Investigation Plan
As a preliminary step in the process, Sheriff Jamison asks you to write an investigation plan identifying how you, as the digital forensics investigator, can assist with the case by examining the missing girl’s iPhone for footprints, and by providing a description of the considerations and mobile investigative challenges associated with mobile forensics and mobile platforms, including third party applications, security measures, communication interfaces, and sensors. As a reporting technique, this plan should include the following:
- where mobile phone data may be extracted from
- what types of mobile phone data might be present
- how mobile phone data can be retrieved from an iPhone
- how the data will be forensically preserved and analyzed
- mobile phone applications that may hold useful information to this case
- how the evidence will be handled in anticipation of court admissibility
Based on your experience and expertise, you know to include deep diving to locate deleted and locked data and timelines, as well as geographic information systems and Bring Your Own Device. As you prepare to scan for tools to use in this investigation, you outline the need to look at the phone (SIM/USIM), and any additional memory (SD/memory cards), for Call Logs, Text and SMS Messages, Call Logs, Text and Sms Messages, Contacts, Graphics, Web History, Location Information, Wi-Fi Connections call logs, text and SMS messages, contacts, graphics, web history, location information, Wi-Fi connections and application data. The goal of this plan is to summarize the current landscape with mobile phone forensics and mobile incident response and investigation, the guidelines for how examiners approach mobile phone evidence, the challenges posed by iPhones, limitations and constraints, and the expectations for forensic analysis of this device.
Construct an investigation plan that addresses the concerns listed above. An investigation plan would typically be four to six pages, not including images and references. Use APA format and submit your plan to Sheriff Jamison (your instructor) for review and feedback. You will include the investigation plan in your forensic investigation report. Now you are ready to begin your investigation!
Step 3: Process Mobile Phone Image and Prepare a Forensic Report
Warning: This step will take you about three hours to complete. If you leave the lab without finishing it, you will have to start over again at the beginning; the lab environment does not save your information. Please access the associated resources before beginning the lab. |
Now that you have an investigation plan, you are prepared to begin the analysis of the iPhone. You’ll need to review some investigation instructions, then access the virtual lab to obtain the Mobile Phone Image; it is a subset of a full iPhone image. The mobile phone forensics tool that you will be using is MPE+ by AccessData. Features of MPE+ include data carving, deleted data recovery, application data extraction and analysis, SQLite database browsing, and filteringoptions. MPE+ is designed to run on PCs and provide examiners with analysis reports.
You open the case that contains the processed Mobile Phone Image, conduct the laboratory investigation, and prepare a forensic report. The forensic report should include screenshots and information on mobile phone data, including the following:
- the evidence handling and processing steps that you use
- responses to the questions (in the lab)
- screenshots and/or other forensic artifacts to support each response
- summary and other case documentation (e.g., tools used, version, and image hashes)
Prepare a forensic report based on the MPE+ template. Consult with your supervisor (instructor) if you have any questions. Otherwise, review it carefully for accuracy and completeness. You will include it in your forensic investigation report.
In the next step, you will describe and compare MPE+ to three other Mobile Phone Forensic tools.
Step 4: Write a Comparative Analysis Report on Digital Forensic Tools for Mobile Phone Forensics
So far you constructed an investigation plan and analyzed the Mobile Phone Image from the missing girl’s iPhone. In this step, you will complete a comparative analysis report, focused on the evaluation of three companion tools to MPE+ that could be used in the digital forensics investigation and analysis of a mobile phone.
In this report you will identify and explain three alternative mobile phone forensic tools for the analysis of mobile phones:
- assess how the three mobile phone forensic tools compare to MPE+ and one another
- assess how three mobile phone forensic tools differ from MPE+ and one another
- summarize the similarities and differences in all four tools
The outcome will be a comprehensive identification and review of four (including MPE+) Mobile Phone forensic tools that Sheriff Jamison can use to select a tool for future investigations involving mobile phones. The structure of your analysis report should include the following:
- Introduction (clearly state the purpose of your analysis)
- Body
- Main idea statement
- Description of mobile phone forensic tools
- Evaluation of advantages and disadvantages of each tool
- Recommendation of a tool for future investigations
- Conclusion
- Appendices
- References
- Tables
A comparative analysis would typically be four to six pages, not including appendices and references. Use APA format and submit your plan to your supervisor (instructor) for review and feedback. You will include the comparative analysis in your forensic investigation report.
Consult with your supervisor (instructor) if you have any questions. In any case, review the results of your analysis carefully for accuracy and completeness.
Step 5: Submit Your Final Report
You have conducted an exhaustive analysis of the missing teen’s iPhone. Sheriff Jamison is looking forward to seeing your forensic investigation report. It is time to synthesize the investigation plan, lab analysis with MPE+, and comparative analysis elements into a single, cohesive document that includes
- an introduction including the purpose of the report
- an incident summary
- your investigation plan
- all pieces of evidence and your findings from the forensic report
- your comparative analysis
- a conclusion
- supporting documentation
- screenshots from MPE+ lab
- references
- tables and graphics
The report summary/abstract should include an overview and a paragraph explaining your experience working through the case. Be sure to describe mobile investigative challenges and the techniques and technologies available to perform mobile forensic examinations. The report should flow easily from an introduction, which explains the reason for the report and investigation, to a conclusion, which summarizes the previous steps and supports recommendations for future investigations. Sign and date the final report, and initial and date each page. Make sure the report has your name, course number and section, and date. Submit your final report to Sheriff Jamison (your instructor) for evaluation.
Before you submit your assignment, review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them in your work.
- 1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.
- 1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.
- 1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.
- 1.4: Tailor communications to the audience.
- 1.5: Use sentence structure appropriate to the task, message and audience.
- 1.6: Follow conventions of Standard Written English.
- 1.7: Create neat and professional looking documents appropriate for the project or presentation.
- 2.1: Identify and clearly explain the issue, question, or problem under critical consideration.
- 2.2: Locate and access sufficient information to investigate the issue or problem.
- 2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.
- 2.4: Consider and analyze information in context to the issue or problem.
- 2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.
- 4.1: Lead and/or participate in a diverse group to accomplish projects and assignments.
- 4.4: Demonstrate diversity and inclusiveness in a team setting.
- 5.1: Demonstrate best practices in organizing a digital forensic investigation
- 5.3: Demonstrate the appropriate use of multiple digital forensic tools and techniques for imaging
- 5.4: Demonstrate an understanding of the different parts of a computer
- 5.5: Apply risk management principles to an investigation.
- 5.6: Use of multiple digital forensic tools and techniques for imaging
- 5.7: Use forensic tools and techniques to carry out an email investigation
- 6.1: Perform report creation, affidavit creation, and preparation to testify
- 6.2: Demonstrate ability to investigate mobile technology
- 6.3: Use forensic tools for investigation of multimedia technologies
- 6.4: Demonstrate the ability to gather file system evidence.
- 6.6: Perform malware analysis
- 6.7: Access encrypted data or process data and systems that have been subjected to anti-forensics techniques
- 6.9: Employ ethics throughout the forensic investigation process.
- 7.5: Evaluate encryption
- 7.7: Incorporate Geographic Information Systems into plans for conducting Digital Forensics on a network.
- 8.1: Employ ethics when planning and conducting forensic investigations, and when testifying in court.
- 8.2: Incorporate international issues including culture and foreign language to plans for investigations.
- 9.1: Examine Data Storage and Transport Technologies
- 9.2: Evaluate Enterprise Architecture
- 9.3: Analyze File Systems
- 9.4: Utilize Hexadecimal and ASCII
- 9.5: Investigate Operating Systems
- 9.6: Evaluate Information Systems/Network Security
PROJECT FOUR HINTS
First:
If you are looking for wpa_sufficiant.conf file under Lab Resources > Project Resources > Project 3, this is instruction error. You are supposed to use the one in Android Image.
Second:
In Step 7/ Pg 7, there is no Number of visits column so you can skip this part of the task.
Third:
In Step 4/ Pg 11, you will not be able to run a query on wigle.net, as SSID name failed to recognize. You can only open a new account and test some known SSID names. You may skip this step.
Also, view the attached file for unzipping your project four device files.
I am also attaching my step-by-step directions on logging into project four lab.
Mobile Investigations (REQUIRES COMPLETING VIRTUAL LAB) Computer Science Assignment Help[supanova_question]
art appreciation Humanities Assignment Help
part 1
Look at three pictures and write three discussions based on answer every question.
Each discussion should around 200 words.
Do not use any source from internet, do not plagiarism
1. What is a benefit in a painting if the artist uses a developed sense of Chiaroscuro? Is the use of Chiaroscuro necessary? Do the images of Illuminated Manuscripts suffer a lack of beauty or clarity of meaning because they do not tend to use a chiaroscuro systems?
2.What is the difference between realistic and naturalistic visual art? What is the difference between realistic and representational visual art?
3.What is the difference between realism and idealism in visual art? Where do you see examples of idealistic visual art in daily life?
part 2
choose two pictures from internet and post 2 images with a short explanation about how each relates to the Unit
around 100 words is fine
[supanova_question]
Leadership and management assignment 2 Health Medical Assignment Help
the first part of the assignment is for you to write a discussion about your ideas about the topic you choose for the second part of the assignment which is the actual paper. The discussion should be on a separate document and follow the attached rubric for the actual paper.
Part 1
Discussion
Select a topic for your Topic 3 Executive Summary assignment. Post your idea and basic thoughts about the topic using the Topic 3 Executive Summary assignment details. 300 words
Part 2
Executive summary
Details:
In this assignment, you will select a program, quality improvement initiative, or other project from your place of employment. Assume you are presenting this program to the board for approval of funding. Write an executive summary (850-1,000 words) to present to the board, from which they will make their decision to fund your program or project. The summary should include:
- The purpose of the program or project.
- The target population or audience.
- The benefits of the program or project
- The cost or budget justification.
- The basis upon which the program or project will be evaluated.
Share your written proposal with your manager, supervisor or other colleague in a formal leadership position within a health care organization. Request their feedback using the following questions as prompts:
- Do you believe the proposal would be approved if formally proposed?
- What are some strengths and weaknesses of the proposal?
Submit the written proposal along with the “Executive Summary Feedback Form.”
Prepare this assignment according to the APA guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are required to submit this assignment to Turnitin.
[supanova_question]
Computer Networks Computer Science Assignment Help
Question 1:
=============
a) Consider a network in which packets are delivered reliable across each link. That is, for each pair of adjacent nodes A – B, the datalink layer has an ARQ protocol (such as stop-and-wait) that ensures packets sent by A do arrive at B. In this network, why do you think is necessary for the transport layer to also have its own ARQ protocol and do retransmissions of its packets?
b) For each of the following, identify which OSI layer is responsible for performing the described action:
i) Make sure that a packet is delivered reliably across a single physical link
ii) Describes how a binary tree data structure is to be encoded inside the message
iii) Makes sure that a message is delivered reliably from the source host to the destination host
iv) Coordinates the transmission of multiple flows of data across multiple sources and multiple destinations (for example, a video conference)
v) Defines how the bits are converted into voltages
vi) Decides how a data packet is to be routed from one link to the next.
Question 2 –
=============
a) Assume you have a link that has 50ms of round-trip-time, the transmission rate is 3Mbits/sec, and each packet is 1Kbyte. If we are using the concurrent logical channels protocol, how many logical channels do we need to maintain 100% throughput (assuming no message loss)
b) Assume three of the above (i.e. part (a)) logical channels have lost a message and are stuck waiting for the timeout to occur (assume the timeout value unnecessarily large, way too big). How much is the reduction in throughput?
Question 3
===========
Consider the following sequence of data bits
10110100111010100011
How would this be translated into physical bits if we use:
a) NRZ
b) NRZI (high value initially)
c) Manchester
d) 4B/5B
Question 4:
===========
a) Consider bit-stuffing (also known as bit-insertion) the way I present it in the slides, NOT the way it is presented in the book. Consider k = 2. If the data bits of the frame to be sent are
1110011010110011101
what are the actual bits sent by the sender? Please include some idleness bits before and after the frame.
b) Is it possible to have k=1? Why or why not?
Question 5
==========
a) Consider the parity bit protocol with the p’s, q’s, and the additional r bit. What is the hamming distance of this protocol? Briefly explain why
b) Assume we have a CRC protocol that satisfies all the desirable properties that we described in the slides. What is the hamming distance of this protocol? Briefly explain why.
c) For both a) and b), can these protocols be used for error correction, and if so, how many bits can they correct? (i.e., can they perform x-bit correction, and if so, what is x?)
Question 6
==========
a) Assume G = 100101, and M = 10110011. What check bits are sent by the sender?
b) Argue that if G has at least three terms (e.g. G = 1011 or G = 1110 or G = 1001100), then it can catch all errors E of the form x^i + x^(i-1) (i.e., two consecutive bits).
Question 7
========
a) Assume that packet size is 1KB, the round-trip-time is 25ms, and the bandwidth of the channel is 1200KB/s. What is the throughput of stop-and-wait?
b) What is the minimum number of logical channels in the concurrent-logical channels protocol that are needed to ensure we maximize the throughput
c) What if instead of using the number of logical channels you gave in b), we use twice that number. What will happen to the throughput? Briefly argue why.
Question 8
=======
Assume we have the cumulative acknowledgment protocol with unbounded sequence numbers. Assume the channel can lose and reorder messages (but not duplicate). Furthermore, assume that the SWS = 1, and that the timeout of the sender is accurate,. i.e., the last action of the sender is replaced by
when timeout frame#ch.sender.receiver = 0 and ack#ch.receiver.sender = 0 and LAR < LFS then
send frame(LAR+1) to receiver.
Under these conditions, is the sequence number in the acknowledgment really necessary? Briefly argue why yes or why no.
[supanova_question]
12 or 15 slide power point Business Finance Assignment Help
1) Read the written account of someone from colonial/pre-colonial times. Put together a 5-7 minute slide presentation comparing the experience you read about to your own experiences growing up.
2) Include in your presentation a piece of fictional media (a book, film, television show, game, etc) that you think most accurately represents what it felt like living in your community growing up, or what it is like living in your current community. This should be around 2 minutes in addition to the 5-7 minutes described above.
im from saudi aribia so plese write easy word and i will choose movie from Saudi to put in the slide becuse i will do persiention
this the movie if u find the same and short take it
[supanova_question]
[supanova_question]
Driverless Cars Computer Science Assignment Help
I need a very short paper on the instructions attached. In addition to the initial post, I need two peer response posts. There is no word count specified.
Initial Post Instructions:
Driverless cars have the ability to provide many benefits, from helping the elderly remain independent to reducing the number of road accidents. However, disasters can still happen and someone needs to be held accountable. Who should pay the damages – the car owner, the car producer, the government, some other entity? Discuss your thoughts on this technology, whether you find it useful, necessary, unnerving, interesting, etc. and who you think should be liable for accidents involving driverless cars.
Reply to 2 Peer Post Instructions:
Your original post is worth 15 points. Responding to two of your peers’ posts will gain you another 5 points for each post for a total of 25 points.
Driverless Cars Computer Science Assignment Help[supanova_question]
Need a document with APA Format and a PPT(PFA for template) Computer Science Assignment Help
prepare a presentation in which your team presents 1) overview 2) summary of findings 3) drill down on the high risks- discuss why you felt they presented a greater risk to the agency 4) Recommendations for all of your significant findings (don’t worry about the low ones).5) Research a technical solution (a product), that can help the agency “get healthy”. Describe (in your own words, not the vendor’s words) how the tool can help solve the risk it is intended to address..
Document has to be APA Latest Format
PPT doc is available for reference.PFA
Please refer these documents ( points can be noted from this docs). you will work on a risk assessment using one of the agencies as assigned, below
http://www.va.gov/oig/pubs/VAOIG-12-01712-229.pdf
http://www.va.gov/oig/pubs/VAOIG-11-01823-294.pdf
https://www.va.gov/oig/pubs/VAOIG-13-01391-72.pdf
https://www.va.gov/oig/pubs/VAOIG-16-01949-248.pdf
Please keep me posted if you have any questions and queries.
[supanova_question]
Statistics Probability SAS SOFTWARE project 2 the date should be on SOFTWARE File and word File Mathematics Assignment Help
Ch # 5 Discrete Probability Distributions
Ch # 6 Continuous Probability Distributions
Finish studying for Chapter # 5 & 6 before starting to work on your Lab.
Use any reference to find meaningful data of a problem of interest to you and check whether or not the data you choose is normal.
1- Find the mean, variance and the standard deviation
2-Plot your data
3- Use the three ways of testing for normality ( graph, stem and leaf, Ratio.)
3- Explain why it is important to check for normality.
4- Why did you choose this particular example and how would the statistical analysis help you with decisions pertaining to your problem you need to take?
Note: You should submit your SAS extension file of your calculation and your a well written word and pdf documents answering all the questions above.
[supanova_question]
Simulation Assignment Business Finance Assignment Help
Access the McGraw-Hill Connect simulation.
Each team member must complete the simulation activity.
Post in your team for discussion.
This week you will complete Ch. 1, 2, and 3, which can be found in the Connect Guide.
Discuss, as a team, your experiences and key concepts learned.
Each team member will receive points, at the instructor’s discretion, for completing the simulation and contributing to the discussion
Complete the City of Smithville problems using the Connect Guide:
- Chapter 1: Introducing the (Short Version) of the City of Smithville Cumulative Problem.
- Chapter 2: Opening the Books.
- Chapter 3: Recording the Annual Budget.
Submit only one each of the following reports, a PDF version of the post-closing trial balance for 2016, the pre-closing subsidiary ledgers, and pre-closing General Fund trial balance for 2017. Team will decide which of the team members’ posting they will submit.
[supanova_question]
Simulation Assignment Business Finance Assignment Help
Access the McGraw-Hill Connect simulation.
Each team member must complete the simulation activity.
Post in your team for discussion.
This week you will complete Ch. 1, 2, and 3, which can be found in the Connect Guide.
Discuss, as a team, your experiences and key concepts learned.
Each team member will receive points, at the instructor’s discretion, for completing the simulation and contributing to the discussion
Complete the City of Smithville problems using the Connect Guide:
- Chapter 1: Introducing the (Short Version) of the City of Smithville Cumulative Problem.
- Chapter 2: Opening the Books.
- Chapter 3: Recording the Annual Budget.
Submit only one each of the following reports, a PDF version of the post-closing trial balance for 2016, the pre-closing subsidiary ledgers, and pre-closing General Fund trial balance for 2017. Team will decide which of the team members’ posting they will submit.
[supanova_question]
Mobile Investigations (REQUIRES COMPLETING VIRTUAL LAB) Computer Science Assignment Help
Mobile Investigations (REQUIRES COMPLETING VIRTUAL LAB) Computer Science Assignment Help