1.2 Describe the environment of your forensic workstation and the access to the machine. Describe the procedure that you used to download the image file to your work directory?
1.3 Explain why multiple hash values are necessary to verify the validity of the image file?
1.4 Explain the procedure that you used before you could access the image file inside the virtual machine?
1.5 Provide a description of any programs you would like to use based on the files identified on the ISO image?
1.6. LEGAL IMPLICATIONS 1.7 List one violation conducted by Mr. Price against Cybercrime Act 2001, and one violation conducted by Mr. Price against the Crimes Act 1958. Back up your answers with definitions?
1.8 Is this case best pursued as a corporate or criminal investigation? Why?