SlideShare a Scribd company logo
1 of 10
2/13/2021 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport/ultra?attemptId=271de701-
fe14-4348-97dd-1f231fce01bc&course_i… 1/3
%16
%14
%6
SafeAssign Originality Report
Cybersecurity Planning & Mgmt - 202051 - CRN186 - Price •
Research Assignment - Wk 14
%36Total Score: Medium risk
Nagendra Babu Chinnam
Submission UUID: edd45f6a-a924-1eda-c98d-25e1b5bc5141
Total Number of Reports
1
Highest Match
36 %
Week-14 Research Assignment.docx
Average Match
36 %
Submitted on
02/11/21
07:24 PM EST
Average Word Count
453
Highest: Week-14 Research Assignment.d…
%36Attachment 1
Institutional database (2)
Student paper Student paper
Internet (3)
eccouncil diva-portal firstclassessaywriters
Global database (1)
Student paper
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 453
Week-14 Research Assignment.docx
5 1
2 6 3
4
5 Student paper 1 Student paper 2 eccouncil
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport?attemptId=271de701-fe14-
4348-97dd-
1f231fce01bc&course_id=_50441_1&download=true&includeD
eleted=true&print=true&force=true
2/13/2021 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport/ultra?attemptId=271de701-
fe14-4348-97dd-1f231fce01bc&course_i… 2/3
Source Matches (9)
Student paper 65%
eccouncil 63%
firstclassessaywriters 69%
Student paper 69%
Week-14 Research Assignment
By
Nagendra Babu Chinnam
Digital forensics is the process of investigating by accumulating
evidence from digital equipment like computers, networks,
cloud, hard drive, and any endpoint
system connected to the technological infrastructure. Digital
forensics involves retrieving evidence by preserving or
recording the digital devices' state, analyzing
them, and reporting the information recovered. In instances of
cyber-attack crimes, a digital forensics examiner analyzes the
digital attack to retrieve evidence to help
track the attackers. In today’s world, with more than 95% of
people having cellphones, the data existence is staggering. The
mobile phones involved in the investiga-
tion and devices like laptops, desktops, smart watches, and all
other devices that fall under the internet are capable of data
exchange. Data forensics has been
particularly stressed by the emergence of higher sophisticated
devices (Kävrestad, 2018). Digital forensic methods are used to
solve the crime by law enforcers
and investigators every day. For example, there was this cas e in
the United Kingdom back in 2009 of a particular guy, Krenar
Lusha, who was an illegal immigrant to
the UK. He was arrested based on his internet search engine
pattern. He was found guilty due to the help of digital forensics.
Once the computer forensics
experts investigated his laptop, they discovered that he had
downloaded a manual of 4300GM that contained information to
make search belts and explosives. This
opened up the case, giving them the warrant for further
investigation to search his house, where they found 71.8liters of
petrol, potassium nitrate, and a live shotgun
cartridge. Digital forensics also showed other evidence that he
had used his laptop to message people via MSN, where he
described himself as a terrorist and a
sniper. In the messages, he portrayed himself as someone who
hated Jewish and American people and wanted to see them dead.
All this information was re-
trieved from his laptop using digital forensics and used as
digital evidence in court (Roussev, 2016). Several criminal
cases have used digital evidence to uncover hid-
den scams. In most criminal cases, whenever there is not enough
evidence gathered from all the sources acquired, digital
forensics will often provide adequate evid-
ence to convict the person. Most of these digital devices that we
use can store 99%of the information that we feed them, and in
case of a criminal investigation, they
come in handy. Digital forensics is an effective method to solve
crimes commonly used today by investigators (Husain & Khan,
2019).
References
Husain, M., & Khan, M. (2019). Critical concepts, standards,
and techniques in cyber forensics. IGI Global. Kävrestad, J.
(2018). Fundamentals of digital forensics:
Theory, methods, and real-life applications. Springer. Roussev,
V. (2016). Digital forensic science: Issues, methods, and
challenges. Morgan & Claypool Publishers.
1
2
3
4 5
2
4
6
4
1
Student paper
Digital forensics is the process of invest-
igating by accumulating evidence from
digital equipment like computers,
networks, cloud, hard drive, and any end-
point system connected to the technolo-
gical infrastructure.
Original source
Digital forensics is the act of helping an
investigation by accumulating evidence
from digita devices .The digital artifacts
include computer desktop,mobile,
network, cloud, hard drive, server , any
endpoint system connected to the
infrastructure
2
Student paper
Data forensics has been particularly
stressed by the emergence of higher
sophisticated devices (Kävrestad, 2018).
Original source
The emergence of higher sophisticated
devices has stressed on the importance
of digital forensics too
3
Student paper
Digital forensic methods are used to
solve the crime by law enforcers and in-
vestigators every day.
Original source
Law enforcement professionals and in-
vestigators use digital forensic methods
to solve crimes every day
4
Student paper
He was arrested based on his internet
search engine pattern.
Original source
Krenar Lusha of the United Kingdom was
arrested based on his internet search
pattern
2/13/2021 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport/ultra?attemptId=271de701-
fe14-4348-97dd-1f231fce01bc&course_i… 3/3
Student paper 63%
eccouncil 68%
Student paper 64%
diva-portal 94%
Student paper 66%
5
Student paper
Once the computer forensics experts in-
vestigated his laptop, they discovered
that he had downloaded a manual of
4300GM that contained information to
make search belts and explosives. This
opened up the case, giving them the war-
rant for further investigation to search
his house, where they found 71.8liters of
petrol, potassium nitrate, and a live shot-
gun cartridge.
Original source
Examining his laptop, he found that he
had downloaded the 4300GM manual for
the manufacture of explosives and
search belts When they searched his
apartment for further investigation, po-
lice seized 71.8 L of petrol, potassium
nitrate, and a live shotgun cartridge
2
Student paper
Digital forensics also showed other evid-
ence that he had used his laptop to mes-
sage people via MSN, where he de-
scribed himself as a terrorist and a
sniper.
Original source
He had also used his laptop to chat with
people via MSN, describing himself as a
terrorist or a sniper
4
Student paper
In the messages, he portrayed himself as
someone who hated Jewish and Amer-
ican people and wanted to see them
dead.
Original source
He presented himself as a person who
wanted to see Jewish and American
people
6
Student paper
Fundamentals of digital forensics:
Theory, methods, and real-life
applications.
Original source
Fundamentals of Digital Forensics
Theory, Methods, and Real-Life Applica-
tions (2ed.)
4
Student paper
Digital forensic science:
Original source
Digital Forensic investigation

More Related Content

Similar to 2132021 originality reporthttpsblackboard.nec.eduweb

by Warren Jin
by Warren Jin by Warren Jin
by Warren Jin
butest
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
ijtsrd
 

Similar to 2132021 originality reporthttpsblackboard.nec.eduweb (20)

The Role of Digital Forensics in Solving Crimes in New York
The Role of Digital Forensics in Solving Crimes in New YorkThe Role of Digital Forensics in Solving Crimes in New York
The Role of Digital Forensics in Solving Crimes in New York
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Innovations in Forensic Science and Private Detectivein Forensic Science and ...
Innovations in Forensic Science and Private Detectivein Forensic Science and ...Innovations in Forensic Science and Private Detectivein Forensic Science and ...
Innovations in Forensic Science and Private Detectivein Forensic Science and ...
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscovery
 
by Warren Jin
by Warren Jin by Warren Jin
by Warren Jin
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
wang.pptx
wang.pptxwang.pptx
wang.pptx
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
5200 final ppt
5200 final ppt5200 final ppt
5200 final ppt
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensics
 

More from SUKHI5

Gale- Mctean- and Lux are partners of Burgers and Brew Company with ca.docx
Gale- Mctean- and Lux are partners of Burgers and Brew Company with ca.docxGale- Mctean- and Lux are partners of Burgers and Brew Company with ca.docx
Gale- Mctean- and Lux are partners of Burgers and Brew Company with ca.docx
SUKHI5
 

More from SUKHI5 (20)

Ghocse the correct answer below- A- No- because the probabafy of burvi.docx
Ghocse the correct answer below- A- No- because the probabafy of burvi.docxGhocse the correct answer below- A- No- because the probabafy of burvi.docx
Ghocse the correct answer below- A- No- because the probabafy of burvi.docx
 
Given Data- MAGLIOCHETTI MOVING CORP- Statement of Earni.docx
Given Data-               MAGLIOCHETTI MOVING CORP- Statement of Earni.docxGiven Data-               MAGLIOCHETTI MOVING CORP- Statement of Earni.docx
Given Data- MAGLIOCHETTI MOVING CORP- Statement of Earni.docx
 
From this table- which mineral level had a significance on which varia.docx
From this table- which mineral level had a significance on which varia.docxFrom this table- which mineral level had a significance on which varia.docx
From this table- which mineral level had a significance on which varia.docx
 
Given a ListItem class- complete main() using the built-in list type t.docx
Given a ListItem class- complete main() using the built-in list type t.docxGiven a ListItem class- complete main() using the built-in list type t.docx
Given a ListItem class- complete main() using the built-in list type t.docx
 
Given a -discrete object- O- the notationO means what- Choose all the.docx
Given a -discrete object- O- the notationO means what- Choose all the.docxGiven a -discrete object- O- the notationO means what- Choose all the.docx
Given a -discrete object- O- the notationO means what- Choose all the.docx
 
Give five examples of unsustainable living or actions from your own ev.docx
Give five examples of unsustainable living or actions from your own ev.docxGive five examples of unsustainable living or actions from your own ev.docx
Give five examples of unsustainable living or actions from your own ev.docx
 
Give an inductive definition of the function rev which takes a list an.docx
Give an inductive definition of the function rev which takes a list an.docxGive an inductive definition of the function rev which takes a list an.docx
Give an inductive definition of the function rev which takes a list an.docx
 
Give feedback19 lines (16 sloc) 450 Bytes.docx
Give feedback19 lines (16 sloc) 450 Bytes.docxGive feedback19 lines (16 sloc) 450 Bytes.docx
Give feedback19 lines (16 sloc) 450 Bytes.docx
 
Give a big-Oh characterization- in terms of n- of the running time of.docx
Give a big-Oh characterization- in terms of n- of the running time of.docxGive a big-Oh characterization- in terms of n- of the running time of.docx
Give a big-Oh characterization- in terms of n- of the running time of.docx
 
Give at least 2 reasons why an entire population of microbes does not.docx
Give at least 2 reasons why an entire population of microbes does not.docxGive at least 2 reasons why an entire population of microbes does not.docx
Give at least 2 reasons why an entire population of microbes does not.docx
 
Giovani Photography bills $650 to Diane Fenning for photography servic.docx
Giovani Photography bills $650 to Diane Fenning for photography servic.docxGiovani Photography bills $650 to Diane Fenning for photography servic.docx
Giovani Photography bills $650 to Diane Fenning for photography servic.docx
 
Germ Theory was a framework that--- All of these argued that disease w.docx
Germ Theory was a framework that--- All of these argued that disease w.docxGerm Theory was a framework that--- All of these argued that disease w.docx
Germ Theory was a framework that--- All of these argued that disease w.docx
 
General Knowledge- In 1927 The Jazz Singer- starring Al Jolson- was hi.docx
General Knowledge- In 1927 The Jazz Singer- starring Al Jolson- was hi.docxGeneral Knowledge- In 1927 The Jazz Singer- starring Al Jolson- was hi.docx
General Knowledge- In 1927 The Jazz Singer- starring Al Jolson- was hi.docx
 
Gereldo recently won a lottery and chose to receive $70-000 todsy inst.docx
Gereldo recently won a lottery and chose to receive $70-000 todsy inst.docxGereldo recently won a lottery and chose to receive $70-000 todsy inst.docx
Gereldo recently won a lottery and chose to receive $70-000 todsy inst.docx
 
genomes are usually circular loops of double-stranded deoxyribonucleic.docx
genomes are usually circular loops of double-stranded deoxyribonucleic.docxgenomes are usually circular loops of double-stranded deoxyribonucleic.docx
genomes are usually circular loops of double-stranded deoxyribonucleic.docx
 
Gastrointestinal Disorders- Teaching about Increasing Fiber Intake- pl.docx
Gastrointestinal Disorders- Teaching about Increasing Fiber Intake- pl.docxGastrointestinal Disorders- Teaching about Increasing Fiber Intake- pl.docx
Gastrointestinal Disorders- Teaching about Increasing Fiber Intake- pl.docx
 
Geert Hofstede surveyed more than 116-000 IBM employees in 40 countrie.docx
Geert Hofstede surveyed more than 116-000 IBM employees in 40 countrie.docxGeert Hofstede surveyed more than 116-000 IBM employees in 40 countrie.docx
Geert Hofstede surveyed more than 116-000 IBM employees in 40 countrie.docx
 
Gale- Mctean- and Lux are partners of Burgers and Brew Company with ca.docx
Gale- Mctean- and Lux are partners of Burgers and Brew Company with ca.docxGale- Mctean- and Lux are partners of Burgers and Brew Company with ca.docx
Gale- Mctean- and Lux are partners of Burgers and Brew Company with ca.docx
 
Future valuesFor the case shown in the following table- calculate the.docx
Future valuesFor the case shown in the following table- calculate the.docxFuture valuesFor the case shown in the following table- calculate the.docx
Future valuesFor the case shown in the following table- calculate the.docx
 
Function Name- isOneCapital Input- 1- (char) A letter 2- (char) A lett.docx
Function Name- isOneCapital Input- 1- (char) A letter 2- (char) A lett.docxFunction Name- isOneCapital Input- 1- (char) A letter 2- (char) A lett.docx
Function Name- isOneCapital Input- 1- (char) A letter 2- (char) A lett.docx
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
MateoGardella
 

Recently uploaded (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 

2132021 originality reporthttpsblackboard.nec.eduweb

  • 1. 2/13/2021 Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReport/ultra?attemptId=271de701- fe14-4348-97dd-1f231fce01bc&course_i… 1/3 %16 %14 %6 SafeAssign Originality Report Cybersecurity Planning & Mgmt - 202051 - CRN186 - Price • Research Assignment - Wk 14 %36Total Score: Medium risk Nagendra Babu Chinnam Submission UUID: edd45f6a-a924-1eda-c98d-25e1b5bc5141 Total Number of Reports 1 Highest Match 36 % Week-14 Research Assignment.docx Average Match 36 %
  • 2. Submitted on 02/11/21 07:24 PM EST Average Word Count 453 Highest: Week-14 Research Assignment.d… %36Attachment 1 Institutional database (2) Student paper Student paper Internet (3) eccouncil diva-portal firstclassessaywriters Global database (1) Student paper Top sources (3) Excluded sources (0) View Originality Report - Old Design Word Count: 453 Week-14 Research Assignment.docx 5 1 2 6 3
  • 3. 4 5 Student paper 1 Student paper 2 eccouncil https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReport?attemptId=271de701-fe14- 4348-97dd- 1f231fce01bc&course_id=_50441_1&download=true&includeD eleted=true&print=true&force=true 2/13/2021 Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReport/ultra?attemptId=271de701- fe14-4348-97dd-1f231fce01bc&course_i… 2/3 Source Matches (9) Student paper 65% eccouncil 63% firstclassessaywriters 69% Student paper 69% Week-14 Research Assignment By Nagendra Babu Chinnam Digital forensics is the process of investigating by accumulating evidence from digital equipment like computers, networks,
  • 4. cloud, hard drive, and any endpoint system connected to the technological infrastructure. Digital forensics involves retrieving evidence by preserving or recording the digital devices' state, analyzing them, and reporting the information recovered. In instances of cyber-attack crimes, a digital forensics examiner analyzes the digital attack to retrieve evidence to help track the attackers. In today’s world, with more than 95% of people having cellphones, the data existence is staggering. The mobile phones involved in the investiga- tion and devices like laptops, desktops, smart watches, and all other devices that fall under the internet are capable of data exchange. Data forensics has been particularly stressed by the emergence of higher sophisticated devices (Kävrestad, 2018). Digital forensic methods are used to solve the crime by law enforcers and investigators every day. For example, there was this cas e in the United Kingdom back in 2009 of a particular guy, Krenar Lusha, who was an illegal immigrant to the UK. He was arrested based on his internet search engine pattern. He was found guilty due to the help of digital forensics. Once the computer forensics experts investigated his laptop, they discovered that he had downloaded a manual of 4300GM that contained information to make search belts and explosives. This opened up the case, giving them the warrant for further investigation to search his house, where they found 71.8liters of petrol, potassium nitrate, and a live shotgun cartridge. Digital forensics also showed other evidence that he had used his laptop to message people via MSN, where he described himself as a terrorist and a
  • 5. sniper. In the messages, he portrayed himself as someone who hated Jewish and American people and wanted to see them dead. All this information was re- trieved from his laptop using digital forensics and used as digital evidence in court (Roussev, 2016). Several criminal cases have used digital evidence to uncover hid- den scams. In most criminal cases, whenever there is not enough evidence gathered from all the sources acquired, digital forensics will often provide adequate evid- ence to convict the person. Most of these digital devices that we use can store 99%of the information that we feed them, and in case of a criminal investigation, they come in handy. Digital forensics is an effective method to solve crimes commonly used today by investigators (Husain & Khan, 2019). References Husain, M., & Khan, M. (2019). Critical concepts, standards, and techniques in cyber forensics. IGI Global. Kävrestad, J. (2018). Fundamentals of digital forensics: Theory, methods, and real-life applications. Springer. Roussev, V. (2016). Digital forensic science: Issues, methods, and challenges. Morgan & Claypool Publishers. 1 2 3 4 5 2
  • 6. 4 6 4 1 Student paper Digital forensics is the process of invest- igating by accumulating evidence from digital equipment like computers, networks, cloud, hard drive, and any end- point system connected to the technolo- gical infrastructure. Original source Digital forensics is the act of helping an investigation by accumulating evidence from digita devices .The digital artifacts include computer desktop,mobile, network, cloud, hard drive, server , any endpoint system connected to the infrastructure 2 Student paper Data forensics has been particularly stressed by the emergence of higher sophisticated devices (Kävrestad, 2018).
  • 7. Original source The emergence of higher sophisticated devices has stressed on the importance of digital forensics too 3 Student paper Digital forensic methods are used to solve the crime by law enforcers and in- vestigators every day. Original source Law enforcement professionals and in- vestigators use digital forensic methods to solve crimes every day 4 Student paper He was arrested based on his internet search engine pattern. Original source Krenar Lusha of the United Kingdom was arrested based on his internet search pattern 2/13/2021 Originality Report
  • 8. https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReport/ultra?attemptId=271de701- fe14-4348-97dd-1f231fce01bc&course_i… 3/3 Student paper 63% eccouncil 68% Student paper 64% diva-portal 94% Student paper 66% 5 Student paper Once the computer forensics experts in- vestigated his laptop, they discovered that he had downloaded a manual of 4300GM that contained information to make search belts and explosives. This opened up the case, giving them the war- rant for further investigation to search his house, where they found 71.8liters of petrol, potassium nitrate, and a live shot- gun cartridge. Original source Examining his laptop, he found that he had downloaded the 4300GM manual for the manufacture of explosives and search belts When they searched his
  • 9. apartment for further investigation, po- lice seized 71.8 L of petrol, potassium nitrate, and a live shotgun cartridge 2 Student paper Digital forensics also showed other evid- ence that he had used his laptop to mes- sage people via MSN, where he de- scribed himself as a terrorist and a sniper. Original source He had also used his laptop to chat with people via MSN, describing himself as a terrorist or a sniper 4 Student paper In the messages, he portrayed himself as someone who hated Jewish and Amer- ican people and wanted to see them dead. Original source He presented himself as a person who wanted to see Jewish and American people 6
  • 10. Student paper Fundamentals of digital forensics: Theory, methods, and real-life applications. Original source Fundamentals of Digital Forensics Theory, Methods, and Real-Life Applica- tions (2ed.) 4 Student paper Digital forensic science: Original source Digital Forensic investigation