Intelligent Imaging Solutions (IIS) image
Your case is to investigate the Intelligent Imaging Solutions (IIS) image and objectively report on the following:
1. your determination of the IIS source code exposure, along with suspects and methods used for the exposure; and
2. your determination of other suspicious and/or illegal activity within IIS.
This investigation should incorporate all previous knowledge gained in the previous CCSI courses including Digital Crime, Forensics I, and this course.
Your copy of FTK, which you downloaded and installed in the Week 1 Lab, will be used for the investigation. Since this is a senior-level course and the final course in the forensic track, your ingenuity, knowledge, professionalism, and resourcefulness are assumed.
A properly prepared Forensic Report: This report will be used in criminal proceedings. Remember that this is a professional report and will be graded as such so make it accurate, detailed, objective, professional, easy-to-read, and nice-looking.
During your investigation with FTK, you will be collecting information relating to your investigation and will be given the opportunity to save it in log files. If you consider these logs significant, attach them to the end of your final report as supporting documentation.
A Course Critique and Suggestion page is included at the end of this document and is required to be completed.
Grading and Requirements
The following list will be used as both project requirements and the grading rubric.
Final Project (200 points)
• Use of proper forensic techniques and requirements (30 points)
o This should allow someone to basically retrace your examination step-by-step.
• Professional Report Presentation—format, grammar, spelling (20 points)
o Follow the format in the template and do not change it. Your Detail section must be completed using the format provided in the examples.
• Summary Section (25 points)
All investigation findings should be properly summarized.
• Detail Section (20 points)
o Explain why you start in a specific area and what led you to look at other places.
o The details should be realistic and reflect what you actually did in your investigation.
• Primary Investigation (65 points)
Your Summary and Details sections should provide the answers to the following questions, to the best of your knowledge.
o What software was used on the machine? (15 points)
o How was the source code disclosed? (15 points)
o Who disclosed the source code? (15 points)
o Who received the source code? (10 points)
o When was the source disclosed? (10 points)
• Other issues discovered during the investigation (40 points)
o There is a lot of extra stuff out there, so take your time to make a thorough investigation—often it’s the small details that can make a difference. (20 points)
o What system items might have been affected or changed? (20 points)
no of pages preferingly 15
PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET AN AMAZING DISCOUNT ?
Our Service Charter
Excellent Quality / 100% Plagiarism-FreeWe employ a number of measures to ensure top quality essays. The papers go through a system of quality control prior to delivery. We run plagiarism checks on each paper to ensure that they will be 100% plagiarism-free. So, only clean copies hit customers’ emails. We also never resell the papers completed by our writers. So, once it is checked using a plagiarism checker, the paper will be unique. Speaking of the academic writing standards, we will stick to the assignment brief given by the customer and assign the perfect writer. By saying “the perfect writer” we mean the one having an academic degree in the customer’s study field and positive feedback from other customers.
Free RevisionsWe keep the quality bar of all papers high. But in case you need some extra brilliance to the paper, here’s what to do. First of all, you can choose a top writer. It means that we will assign an expert with a degree in your subject. And secondly, you can rely on our editing services. Our editors will revise your papers, checking whether or not they comply with high standards of academic writing. In addition, editing entails adjusting content if it’s off the topic, adding more sources, refining the language style, and making sure the referencing style is followed.
Confidentiality / 100% No DisclosureWe make sure that clients’ personal data remains confidential and is not exploited for any purposes beyond those related to our services. We only ask you to provide us with the information that is required to produce the paper according to your writing needs. Please note that the payment info is protected as well. Feel free to refer to the support team for more information about our payment methods. The fact that you used our service is kept secret due to the advanced security standards. So, you can be sure that no one will find out that you got a paper from our writing service.
Money Back GuaranteeIf the writer doesn’t address all the questions on your assignment brief or the delivered paper appears to be off the topic, you can ask for a refund. Or, if it is applicable, you can opt in for free revision within 14-30 days, depending on your paper’s length. The revision or refund request should be sent within 14 days after delivery. The customer gets 100% money-back in case they haven't downloaded the paper. All approved refunds will be returned to the customer’s credit card or Bonus Balance in a form of store credit. Take a note that we will send an extra compensation if the customers goes with a store credit.
24/7 Customer SupportWe have a support team working 24/7 ready to give your issue concerning the order their immediate attention. If you have any questions about the ordering process, communication with the writer, payment options, feel free to join live chat. Be sure to get a fast response. They can also give you the exact price quote, taking into account the timing, desired academic level of the paper, and the number of pages.