What are SEO meta keys?
You are required to carry out a forensic examination of the evidence file that you have been supplied with and forensically examine its contents. You will need to produce an expert witness report that describes the formal investigation methodology that you followed and presents your findings. It is therefore essential that you follow a formal investigation procedure.
You will have to describe in detail the methodology that you followed in order to analyse the evidence file. You will have to identify and describe the procedures for all the different phases of your investigation including the tools you used for the analysis.
Your findings should be presented in a factual way, following the guidelines that were discussed in class. Your findings should include any relevant information that was discovered during your investigation. You should illustrate your analysis with screen dumps of the tools you used.
Your expert witness report should be no more than 2000 words.
You also need to produce contemporaneous notes that reflect the work you have undertaken and justify how you maintained the chain of custody. It is advisable you make use of a specialist tool to securely record your digital notes. Your contemporaneous notes should be submitted as an Appendix to the expert witness report and there is no word count for the notes.
You are expected to use appropriate peer reviewed sources for developing your arguments and the Harvard referencing style as per the University regulations.
This Assignment assesses the following module Learning Outcomes:
1.Advanced current concepts and issues of information environment risks, vulnerabilities and threats
2.Managing an information environment in terms of deterrence, detection, protection and reaction to access
3.A systematic application of the tools, methods and procedures (theoretical and methodological) used within the cyber security arena under the context of a risk and threat assessment
4.Critically demonstrate self-direction and creativity in managing the security of an information environment at the strategic, tactical and operational levels, effectively developing information security policies.
5.Use initiative to autonomously conduct and manage a risk assessment of a complex and unpredictable environment
6.Demonstrating a systematic approach of creatively applying security standards to unfamiliar contexts for solving problems
Outstanding understanding and exposition of relevant issues that shows insight and draws together various investigative techniques. Innovative and well-formed recommendations made. Clearly structured and logically reached findings. No errors.
Excellent understanding and exposition of relevant issues that shows insight and draws together various investigative techniques. Innovative and well-formed recommendations made. Clearly structured and logically reached findings. Minor errors may be present.
A clear and useful theme is developed. Insight into implications. Clear and concise arguments. Extensive reporting on and analysis of activities. Analysis draws out important lessons learned. Supported recommendations given. Contains very few errors and a very good report.
Good evidence has been provided. All the material is appropriate, and most problems were addressed. A clear understanding of the procedures that had to be followed. Appropriate reporting on the user profiles and analysis of their activities. Analysis draws out important lessons learned. Supported recommendations given.