SlideShare a Scribd company logo
2/13/2021 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport/ultra?attemptId=271de701-
fe14-4348-97dd-1f231fce01bc&course_i… 1/3
%16
%14
%6
SafeAssign Originality Report
Cybersecurity Planning & Mgmt - 202051 - CRN186 - Price •
Research Assignment - Wk 14
%36Total Score: Medium risk
Nagendra Babu Chinnam
Submission UUID: edd45f6a-a924-1eda-c98d-25e1b5bc5141
Total Number of Reports
1
Highest Match
36 %
Week-14 Research Assignment.docx
Average Match
36 %
Submitted on
02/11/21
07:24 PM EST
Average Word Count
453
Highest: Week-14 Research Assignment.d…
%36Attachment 1
Institutional database (2)
Student paper Student paper
Internet (3)
eccouncil diva-portal firstclassessaywriters
Global database (1)
Student paper
Top sources (3)
Excluded sources (0)
View Originality Report - Old Design
Word Count: 453
Week-14 Research Assignment.docx
5 1
2 6 3
4
5 Student paper 1 Student paper 2 eccouncil
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport?attemptId=271de701-fe14-
4348-97dd-
1f231fce01bc&course_id=_50441_1&download=true&includeD
eleted=true&print=true&force=true
2/13/2021 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport/ultra?attemptId=271de701-
fe14-4348-97dd-1f231fce01bc&course_i… 2/3
Source Matches (9)
Student paper 65%
eccouncil 63%
firstclassessaywriters 69%
Student paper 69%
Week-14 Research Assignment
By
Nagendra Babu Chinnam
Digital forensics is the process of investigating by accumulating
evidence from digital equipment like computers, networks,
cloud, hard drive, and any endpoint
system connected to the technological infrastructure. Digital
forensics involves retrieving evidence by preserving or
recording the digital devices' state, analyzing
them, and reporting the information recovered. In instances of
cyber-attack crimes, a digital forensics examiner analyzes the
digital attack to retrieve evidence to help
track the attackers. In today’s world, with more than 95% of
people having cellphones, the data existence is staggering. The
mobile phones involved in the investiga-
tion and devices like laptops, desktops, smart watches, and all
other devices that fall under the internet are capable of data
exchange. Data forensics has been
particularly stressed by the emergence of higher sophisticated
devices (Kävrestad, 2018). Digital forensic methods are used to
solve the crime by law enforcers
and investigators every day. For example, there was this cas e in
the United Kingdom back in 2009 of a particular guy, Krenar
Lusha, who was an illegal immigrant to
the UK. He was arrested based on his internet search engine
pattern. He was found guilty due to the help of digital forensics.
Once the computer forensics
experts investigated his laptop, they discovered that he had
downloaded a manual of 4300GM that contained information to
make search belts and explosives. This
opened up the case, giving them the warrant for further
investigation to search his house, where they found 71.8liters of
petrol, potassium nitrate, and a live shotgun
cartridge. Digital forensics also showed other evidence that he
had used his laptop to message people via MSN, where he
described himself as a terrorist and a
sniper. In the messages, he portrayed himself as someone who
hated Jewish and American people and wanted to see them dead.
All this information was re-
trieved from his laptop using digital forensics and used as
digital evidence in court (Roussev, 2016). Several criminal
cases have used digital evidence to uncover hid-
den scams. In most criminal cases, whenever there is not enough
evidence gathered from all the sources acquired, digital
forensics will often provide adequate evid-
ence to convict the person. Most of these digital devices that we
use can store 99%of the information that we feed them, and in
case of a criminal investigation, they
come in handy. Digital forensics is an effective method to solve
crimes commonly used today by investigators (Husain & Khan,
2019).
References
Husain, M., & Khan, M. (2019). Critical concepts, standards,
and techniques in cyber forensics. IGI Global. Kävrestad, J.
(2018). Fundamentals of digital forensics:
Theory, methods, and real-life applications. Springer. Roussev,
V. (2016). Digital forensic science: Issues, methods, and
challenges. Morgan & Claypool Publishers.
1
2
3
4 5
2
4
6
4
1
Student paper
Digital forensics is the process of invest-
igating by accumulating evidence from
digital equipment like computers,
networks, cloud, hard drive, and any end-
point system connected to the technolo-
gical infrastructure.
Original source
Digital forensics is the act of helping an
investigation by accumulating evidence
from digita devices .The digital artifacts
include computer desktop,mobile,
network, cloud, hard drive, server , any
endpoint system connected to the
infrastructure
2
Student paper
Data forensics has been particularly
stressed by the emergence of higher
sophisticated devices (Kävrestad, 2018).
Original source
The emergence of higher sophisticated
devices has stressed on the importance
of digital forensics too
3
Student paper
Digital forensic methods are used to
solve the crime by law enforcers and in-
vestigators every day.
Original source
Law enforcement professionals and in-
vestigators use digital forensic methods
to solve crimes every day
4
Student paper
He was arrested based on his internet
search engine pattern.
Original source
Krenar Lusha of the United Kingdom was
arrested based on his internet search
pattern
2/13/2021 Originality Report
https://blackboard.nec.edu/webapps/mdb-sa-
BB5b75a0e7334a9/originalityReport/ultra?attemptId=271de701-
fe14-4348-97dd-1f231fce01bc&course_i… 3/3
Student paper 63%
eccouncil 68%
Student paper 64%
diva-portal 94%
Student paper 66%
5
Student paper
Once the computer forensics experts in-
vestigated his laptop, they discovered
that he had downloaded a manual of
4300GM that contained information to
make search belts and explosives. This
opened up the case, giving them the war-
rant for further investigation to search
his house, where they found 71.8liters of
petrol, potassium nitrate, and a live shot-
gun cartridge.
Original source
Examining his laptop, he found that he
had downloaded the 4300GM manual for
the manufacture of explosives and
search belts When they searched his
apartment for further investigation, po-
lice seized 71.8 L of petrol, potassium
nitrate, and a live shotgun cartridge
2
Student paper
Digital forensics also showed other evid-
ence that he had used his laptop to mes-
sage people via MSN, where he de-
scribed himself as a terrorist and a
sniper.
Original source
He had also used his laptop to chat with
people via MSN, describing himself as a
terrorist or a sniper
4
Student paper
In the messages, he portrayed himself as
someone who hated Jewish and Amer-
ican people and wanted to see them
dead.
Original source
He presented himself as a person who
wanted to see Jewish and American
people
6
Student paper
Fundamentals of digital forensics:
Theory, methods, and real-life
applications.
Original source
Fundamentals of Digital Forensics
Theory, Methods, and Real-Life Applica-
tions (2ed.)
4
Student paper
Digital forensic science:
Original source
Digital Forensic investigation

More Related Content

Similar to 2132021 originality reporthttpsblackboard.nec.eduweb

The Role of Digital Forensics in Solving Crimes in New York
The Role of Digital Forensics in Solving Crimes in New YorkThe Role of Digital Forensics in Solving Crimes in New York
The Role of Digital Forensics in Solving Crimes in New York
Guardian Security Training
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
Samantha Vargas
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
AIRCC Publishing Corporation
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
AIRCC Publishing Corporation
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
AIRCC Publishing Corporation
 
Innovations in Forensic Science and Private Detectivein Forensic Science and ...
Innovations in Forensic Science and Private Detectivein Forensic Science and ...Innovations in Forensic Science and Private Detectivein Forensic Science and ...
Innovations in Forensic Science and Private Detectivein Forensic Science and ...
Detectivfrei
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
Emily Smith
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
Ronak Karanpuria
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
gamemaker762
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
YashPatel132112
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
BhagyasriPatel2
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscovery
CSCJournals
 
by Warren Jin
by Warren Jin by Warren Jin
by Warren Jin butest
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
ijtsrd
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
IRJET Journal
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
Johnson Ubah
 
wang.pptx
wang.pptxwang.pptx
wang.pptx
SteveIrwin25
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
webb00704
 
5200 final ppt
5200 final ppt5200 final ppt
5200 final ppt
Biran Li
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensics
IAESIJAI
 

Similar to 2132021 originality reporthttpsblackboard.nec.eduweb (20)

The Role of Digital Forensics in Solving Crimes in New York
The Role of Digital Forensics in Solving Crimes in New YorkThe Role of Digital Forensics in Solving Crimes in New York
The Role of Digital Forensics in Solving Crimes in New York
 
A Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis ToolsA Literature Review On Cyber Forensic And Its Analysis Tools
A Literature Review On Cyber Forensic And Its Analysis Tools
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATIONBEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
BEHAVIOURAL ANALYTICS IN CYBER SECURITY FOR DIGITAL FORENSICS APPLICATION
 
Behavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics ApplicationBehavioural Analytics in Cyber Security for Digital Forensics Application
Behavioural Analytics in Cyber Security for Digital Forensics Application
 
Innovations in Forensic Science and Private Detectivein Forensic Science and ...
Innovations in Forensic Science and Private Detectivein Forensic Science and ...Innovations in Forensic Science and Private Detectivein Forensic Science and ...
Innovations in Forensic Science and Private Detectivein Forensic Science and ...
 
A Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital ForensicsA Study Of Cybercrimes In India Using Digital Forensics
A Study Of Cybercrimes In India Using Digital Forensics
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
3170725_Unit-1.pptx
3170725_Unit-1.pptx3170725_Unit-1.pptx
3170725_Unit-1.pptx
 
Interplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscoveryInterplay of Digital Forensics in eDiscovery
Interplay of Digital Forensics in eDiscovery
 
by Warren Jin
by Warren Jin by Warren Jin
by Warren Jin
 
Conceptual Study of Mobile Forensics
Conceptual Study of Mobile ForensicsConceptual Study of Mobile Forensics
Conceptual Study of Mobile Forensics
 
Anti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital ForensicAnti-Forensic Techniques and Its Impact on Digital Forensic
Anti-Forensic Techniques and Its Impact on Digital Forensic
 
Network and computer forensics
Network and computer forensicsNetwork and computer forensics
Network and computer forensics
 
wang.pptx
wang.pptxwang.pptx
wang.pptx
 
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptxDigital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
Digital Footprints_ Investigating Digital Evidence in Online Crime Cases.pptx
 
5200 final ppt
5200 final ppt5200 final ppt
5200 final ppt
 
Enhancements in the world of digital forensics
Enhancements in the world of digital forensicsEnhancements in the world of digital forensics
Enhancements in the world of digital forensics
 

More from SUKHI5

Ghocse the correct answer below- A- No- because the probabafy of burvi.docx
Ghocse the correct answer below- A- No- because the probabafy of burvi.docxGhocse the correct answer below- A- No- because the probabafy of burvi.docx
Ghocse the correct answer below- A- No- because the probabafy of burvi.docx
SUKHI5
 
Given Data- MAGLIOCHETTI MOVING CORP- Statement of Earni.docx
Given Data-               MAGLIOCHETTI MOVING CORP- Statement of Earni.docxGiven Data-               MAGLIOCHETTI MOVING CORP- Statement of Earni.docx
Given Data- MAGLIOCHETTI MOVING CORP- Statement of Earni.docx
SUKHI5
 
From this table- which mineral level had a significance on which varia.docx
From this table- which mineral level had a significance on which varia.docxFrom this table- which mineral level had a significance on which varia.docx
From this table- which mineral level had a significance on which varia.docx
SUKHI5
 
Given a ListItem class- complete main() using the built-in list type t.docx
Given a ListItem class- complete main() using the built-in list type t.docxGiven a ListItem class- complete main() using the built-in list type t.docx
Given a ListItem class- complete main() using the built-in list type t.docx
SUKHI5
 
Given a -discrete object- O- the notationO means what- Choose all the.docx
Given a -discrete object- O- the notationO means what- Choose all the.docxGiven a -discrete object- O- the notationO means what- Choose all the.docx
Given a -discrete object- O- the notationO means what- Choose all the.docx
SUKHI5
 
Give five examples of unsustainable living or actions from your own ev.docx
Give five examples of unsustainable living or actions from your own ev.docxGive five examples of unsustainable living or actions from your own ev.docx
Give five examples of unsustainable living or actions from your own ev.docx
SUKHI5
 
Give an inductive definition of the function rev which takes a list an.docx
Give an inductive definition of the function rev which takes a list an.docxGive an inductive definition of the function rev which takes a list an.docx
Give an inductive definition of the function rev which takes a list an.docx
SUKHI5
 
Give feedback19 lines (16 sloc) 450 Bytes.docx
Give feedback19 lines (16 sloc) 450 Bytes.docxGive feedback19 lines (16 sloc) 450 Bytes.docx
Give feedback19 lines (16 sloc) 450 Bytes.docx
SUKHI5
 
Give a big-Oh characterization- in terms of n- of the running time of.docx
Give a big-Oh characterization- in terms of n- of the running time of.docxGive a big-Oh characterization- in terms of n- of the running time of.docx
Give a big-Oh characterization- in terms of n- of the running time of.docx
SUKHI5
 
Give at least 2 reasons why an entire population of microbes does not.docx
Give at least 2 reasons why an entire population of microbes does not.docxGive at least 2 reasons why an entire population of microbes does not.docx
Give at least 2 reasons why an entire population of microbes does not.docx
SUKHI5
 
Giovani Photography bills $650 to Diane Fenning for photography servic.docx
Giovani Photography bills $650 to Diane Fenning for photography servic.docxGiovani Photography bills $650 to Diane Fenning for photography servic.docx
Giovani Photography bills $650 to Diane Fenning for photography servic.docx
SUKHI5
 
Germ Theory was a framework that--- All of these argued that disease w.docx
Germ Theory was a framework that--- All of these argued that disease w.docxGerm Theory was a framework that--- All of these argued that disease w.docx
Germ Theory was a framework that--- All of these argued that disease w.docx
SUKHI5
 
General Knowledge- In 1927 The Jazz Singer- starring Al Jolson- was hi.docx
General Knowledge- In 1927 The Jazz Singer- starring Al Jolson- was hi.docxGeneral Knowledge- In 1927 The Jazz Singer- starring Al Jolson- was hi.docx
General Knowledge- In 1927 The Jazz Singer- starring Al Jolson- was hi.docx
SUKHI5
 
Gereldo recently won a lottery and chose to receive $70-000 todsy inst.docx
Gereldo recently won a lottery and chose to receive $70-000 todsy inst.docxGereldo recently won a lottery and chose to receive $70-000 todsy inst.docx
Gereldo recently won a lottery and chose to receive $70-000 todsy inst.docx
SUKHI5
 
genomes are usually circular loops of double-stranded deoxyribonucleic.docx
genomes are usually circular loops of double-stranded deoxyribonucleic.docxgenomes are usually circular loops of double-stranded deoxyribonucleic.docx
genomes are usually circular loops of double-stranded deoxyribonucleic.docx
SUKHI5
 
Gastrointestinal Disorders- Teaching about Increasing Fiber Intake- pl.docx
Gastrointestinal Disorders- Teaching about Increasing Fiber Intake- pl.docxGastrointestinal Disorders- Teaching about Increasing Fiber Intake- pl.docx
Gastrointestinal Disorders- Teaching about Increasing Fiber Intake- pl.docx
SUKHI5
 
Geert Hofstede surveyed more than 116-000 IBM employees in 40 countrie.docx
Geert Hofstede surveyed more than 116-000 IBM employees in 40 countrie.docxGeert Hofstede surveyed more than 116-000 IBM employees in 40 countrie.docx
Geert Hofstede surveyed more than 116-000 IBM employees in 40 countrie.docx
SUKHI5
 
Gale- Mctean- and Lux are partners of Burgers and Brew Company with ca.docx
Gale- Mctean- and Lux are partners of Burgers and Brew Company with ca.docxGale- Mctean- and Lux are partners of Burgers and Brew Company with ca.docx
Gale- Mctean- and Lux are partners of Burgers and Brew Company with ca.docx
SUKHI5
 
Future valuesFor the case shown in the following table- calculate the.docx
Future valuesFor the case shown in the following table- calculate the.docxFuture valuesFor the case shown in the following table- calculate the.docx
Future valuesFor the case shown in the following table- calculate the.docx
SUKHI5
 
Function Name- isOneCapital Input- 1- (char) A letter 2- (char) A lett.docx
Function Name- isOneCapital Input- 1- (char) A letter 2- (char) A lett.docxFunction Name- isOneCapital Input- 1- (char) A letter 2- (char) A lett.docx
Function Name- isOneCapital Input- 1- (char) A letter 2- (char) A lett.docx
SUKHI5
 

More from SUKHI5 (20)

Ghocse the correct answer below- A- No- because the probabafy of burvi.docx
Ghocse the correct answer below- A- No- because the probabafy of burvi.docxGhocse the correct answer below- A- No- because the probabafy of burvi.docx
Ghocse the correct answer below- A- No- because the probabafy of burvi.docx
 
Given Data- MAGLIOCHETTI MOVING CORP- Statement of Earni.docx
Given Data-               MAGLIOCHETTI MOVING CORP- Statement of Earni.docxGiven Data-               MAGLIOCHETTI MOVING CORP- Statement of Earni.docx
Given Data- MAGLIOCHETTI MOVING CORP- Statement of Earni.docx
 
From this table- which mineral level had a significance on which varia.docx
From this table- which mineral level had a significance on which varia.docxFrom this table- which mineral level had a significance on which varia.docx
From this table- which mineral level had a significance on which varia.docx
 
Given a ListItem class- complete main() using the built-in list type t.docx
Given a ListItem class- complete main() using the built-in list type t.docxGiven a ListItem class- complete main() using the built-in list type t.docx
Given a ListItem class- complete main() using the built-in list type t.docx
 
Given a -discrete object- O- the notationO means what- Choose all the.docx
Given a -discrete object- O- the notationO means what- Choose all the.docxGiven a -discrete object- O- the notationO means what- Choose all the.docx
Given a -discrete object- O- the notationO means what- Choose all the.docx
 
Give five examples of unsustainable living or actions from your own ev.docx
Give five examples of unsustainable living or actions from your own ev.docxGive five examples of unsustainable living or actions from your own ev.docx
Give five examples of unsustainable living or actions from your own ev.docx
 
Give an inductive definition of the function rev which takes a list an.docx
Give an inductive definition of the function rev which takes a list an.docxGive an inductive definition of the function rev which takes a list an.docx
Give an inductive definition of the function rev which takes a list an.docx
 
Give feedback19 lines (16 sloc) 450 Bytes.docx
Give feedback19 lines (16 sloc) 450 Bytes.docxGive feedback19 lines (16 sloc) 450 Bytes.docx
Give feedback19 lines (16 sloc) 450 Bytes.docx
 
Give a big-Oh characterization- in terms of n- of the running time of.docx
Give a big-Oh characterization- in terms of n- of the running time of.docxGive a big-Oh characterization- in terms of n- of the running time of.docx
Give a big-Oh characterization- in terms of n- of the running time of.docx
 
Give at least 2 reasons why an entire population of microbes does not.docx
Give at least 2 reasons why an entire population of microbes does not.docxGive at least 2 reasons why an entire population of microbes does not.docx
Give at least 2 reasons why an entire population of microbes does not.docx
 
Giovani Photography bills $650 to Diane Fenning for photography servic.docx
Giovani Photography bills $650 to Diane Fenning for photography servic.docxGiovani Photography bills $650 to Diane Fenning for photography servic.docx
Giovani Photography bills $650 to Diane Fenning for photography servic.docx
 
Germ Theory was a framework that--- All of these argued that disease w.docx
Germ Theory was a framework that--- All of these argued that disease w.docxGerm Theory was a framework that--- All of these argued that disease w.docx
Germ Theory was a framework that--- All of these argued that disease w.docx
 
General Knowledge- In 1927 The Jazz Singer- starring Al Jolson- was hi.docx
General Knowledge- In 1927 The Jazz Singer- starring Al Jolson- was hi.docxGeneral Knowledge- In 1927 The Jazz Singer- starring Al Jolson- was hi.docx
General Knowledge- In 1927 The Jazz Singer- starring Al Jolson- was hi.docx
 
Gereldo recently won a lottery and chose to receive $70-000 todsy inst.docx
Gereldo recently won a lottery and chose to receive $70-000 todsy inst.docxGereldo recently won a lottery and chose to receive $70-000 todsy inst.docx
Gereldo recently won a lottery and chose to receive $70-000 todsy inst.docx
 
genomes are usually circular loops of double-stranded deoxyribonucleic.docx
genomes are usually circular loops of double-stranded deoxyribonucleic.docxgenomes are usually circular loops of double-stranded deoxyribonucleic.docx
genomes are usually circular loops of double-stranded deoxyribonucleic.docx
 
Gastrointestinal Disorders- Teaching about Increasing Fiber Intake- pl.docx
Gastrointestinal Disorders- Teaching about Increasing Fiber Intake- pl.docxGastrointestinal Disorders- Teaching about Increasing Fiber Intake- pl.docx
Gastrointestinal Disorders- Teaching about Increasing Fiber Intake- pl.docx
 
Geert Hofstede surveyed more than 116-000 IBM employees in 40 countrie.docx
Geert Hofstede surveyed more than 116-000 IBM employees in 40 countrie.docxGeert Hofstede surveyed more than 116-000 IBM employees in 40 countrie.docx
Geert Hofstede surveyed more than 116-000 IBM employees in 40 countrie.docx
 
Gale- Mctean- and Lux are partners of Burgers and Brew Company with ca.docx
Gale- Mctean- and Lux are partners of Burgers and Brew Company with ca.docxGale- Mctean- and Lux are partners of Burgers and Brew Company with ca.docx
Gale- Mctean- and Lux are partners of Burgers and Brew Company with ca.docx
 
Future valuesFor the case shown in the following table- calculate the.docx
Future valuesFor the case shown in the following table- calculate the.docxFuture valuesFor the case shown in the following table- calculate the.docx
Future valuesFor the case shown in the following table- calculate the.docx
 
Function Name- isOneCapital Input- 1- (char) A letter 2- (char) A lett.docx
Function Name- isOneCapital Input- 1- (char) A letter 2- (char) A lett.docxFunction Name- isOneCapital Input- 1- (char) A letter 2- (char) A lett.docx
Function Name- isOneCapital Input- 1- (char) A letter 2- (char) A lett.docx
 

Recently uploaded

The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Reflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPointReflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPoint
amberjdewit93
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
christianmathematics
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
amberjdewit93
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 

Recently uploaded (20)

The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Reflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPointReflective and Evaluative Practice PowerPoint
Reflective and Evaluative Practice PowerPoint
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
What is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptxWhat is the purpose of studying mathematics.pptx
What is the purpose of studying mathematics.pptx
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Reflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdfReflective and Evaluative Practice...pdf
Reflective and Evaluative Practice...pdf
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 

2132021 originality reporthttpsblackboard.nec.eduweb

  • 1. 2/13/2021 Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReport/ultra?attemptId=271de701- fe14-4348-97dd-1f231fce01bc&course_i… 1/3 %16 %14 %6 SafeAssign Originality Report Cybersecurity Planning & Mgmt - 202051 - CRN186 - Price • Research Assignment - Wk 14 %36Total Score: Medium risk Nagendra Babu Chinnam Submission UUID: edd45f6a-a924-1eda-c98d-25e1b5bc5141 Total Number of Reports 1 Highest Match 36 % Week-14 Research Assignment.docx Average Match 36 %
  • 2. Submitted on 02/11/21 07:24 PM EST Average Word Count 453 Highest: Week-14 Research Assignment.d… %36Attachment 1 Institutional database (2) Student paper Student paper Internet (3) eccouncil diva-portal firstclassessaywriters Global database (1) Student paper Top sources (3) Excluded sources (0) View Originality Report - Old Design Word Count: 453 Week-14 Research Assignment.docx 5 1 2 6 3
  • 3. 4 5 Student paper 1 Student paper 2 eccouncil https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReport?attemptId=271de701-fe14- 4348-97dd- 1f231fce01bc&course_id=_50441_1&download=true&includeD eleted=true&print=true&force=true 2/13/2021 Originality Report https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReport/ultra?attemptId=271de701- fe14-4348-97dd-1f231fce01bc&course_i… 2/3 Source Matches (9) Student paper 65% eccouncil 63% firstclassessaywriters 69% Student paper 69% Week-14 Research Assignment By Nagendra Babu Chinnam Digital forensics is the process of investigating by accumulating evidence from digital equipment like computers, networks,
  • 4. cloud, hard drive, and any endpoint system connected to the technological infrastructure. Digital forensics involves retrieving evidence by preserving or recording the digital devices' state, analyzing them, and reporting the information recovered. In instances of cyber-attack crimes, a digital forensics examiner analyzes the digital attack to retrieve evidence to help track the attackers. In today’s world, with more than 95% of people having cellphones, the data existence is staggering. The mobile phones involved in the investiga- tion and devices like laptops, desktops, smart watches, and all other devices that fall under the internet are capable of data exchange. Data forensics has been particularly stressed by the emergence of higher sophisticated devices (Kävrestad, 2018). Digital forensic methods are used to solve the crime by law enforcers and investigators every day. For example, there was this cas e in the United Kingdom back in 2009 of a particular guy, Krenar Lusha, who was an illegal immigrant to the UK. He was arrested based on his internet search engine pattern. He was found guilty due to the help of digital forensics. Once the computer forensics experts investigated his laptop, they discovered that he had downloaded a manual of 4300GM that contained information to make search belts and explosives. This opened up the case, giving them the warrant for further investigation to search his house, where they found 71.8liters of petrol, potassium nitrate, and a live shotgun cartridge. Digital forensics also showed other evidence that he had used his laptop to message people via MSN, where he described himself as a terrorist and a
  • 5. sniper. In the messages, he portrayed himself as someone who hated Jewish and American people and wanted to see them dead. All this information was re- trieved from his laptop using digital forensics and used as digital evidence in court (Roussev, 2016). Several criminal cases have used digital evidence to uncover hid- den scams. In most criminal cases, whenever there is not enough evidence gathered from all the sources acquired, digital forensics will often provide adequate evid- ence to convict the person. Most of these digital devices that we use can store 99%of the information that we feed them, and in case of a criminal investigation, they come in handy. Digital forensics is an effective method to solve crimes commonly used today by investigators (Husain & Khan, 2019). References Husain, M., & Khan, M. (2019). Critical concepts, standards, and techniques in cyber forensics. IGI Global. Kävrestad, J. (2018). Fundamentals of digital forensics: Theory, methods, and real-life applications. Springer. Roussev, V. (2016). Digital forensic science: Issues, methods, and challenges. Morgan & Claypool Publishers. 1 2 3 4 5 2
  • 6. 4 6 4 1 Student paper Digital forensics is the process of invest- igating by accumulating evidence from digital equipment like computers, networks, cloud, hard drive, and any end- point system connected to the technolo- gical infrastructure. Original source Digital forensics is the act of helping an investigation by accumulating evidence from digita devices .The digital artifacts include computer desktop,mobile, network, cloud, hard drive, server , any endpoint system connected to the infrastructure 2 Student paper Data forensics has been particularly stressed by the emergence of higher sophisticated devices (Kävrestad, 2018).
  • 7. Original source The emergence of higher sophisticated devices has stressed on the importance of digital forensics too 3 Student paper Digital forensic methods are used to solve the crime by law enforcers and in- vestigators every day. Original source Law enforcement professionals and in- vestigators use digital forensic methods to solve crimes every day 4 Student paper He was arrested based on his internet search engine pattern. Original source Krenar Lusha of the United Kingdom was arrested based on his internet search pattern 2/13/2021 Originality Report
  • 8. https://blackboard.nec.edu/webapps/mdb-sa- BB5b75a0e7334a9/originalityReport/ultra?attemptId=271de701- fe14-4348-97dd-1f231fce01bc&course_i… 3/3 Student paper 63% eccouncil 68% Student paper 64% diva-portal 94% Student paper 66% 5 Student paper Once the computer forensics experts in- vestigated his laptop, they discovered that he had downloaded a manual of 4300GM that contained information to make search belts and explosives. This opened up the case, giving them the war- rant for further investigation to search his house, where they found 71.8liters of petrol, potassium nitrate, and a live shot- gun cartridge. Original source Examining his laptop, he found that he had downloaded the 4300GM manual for the manufacture of explosives and search belts When they searched his
  • 9. apartment for further investigation, po- lice seized 71.8 L of petrol, potassium nitrate, and a live shotgun cartridge 2 Student paper Digital forensics also showed other evid- ence that he had used his laptop to mes- sage people via MSN, where he de- scribed himself as a terrorist and a sniper. Original source He had also used his laptop to chat with people via MSN, describing himself as a terrorist or a sniper 4 Student paper In the messages, he portrayed himself as someone who hated Jewish and Amer- ican people and wanted to see them dead. Original source He presented himself as a person who wanted to see Jewish and American people 6
  • 10. Student paper Fundamentals of digital forensics: Theory, methods, and real-life applications. Original source Fundamentals of Digital Forensics Theory, Methods, and Real-Life Applica- tions (2ed.) 4 Student paper Digital forensic science: Original source Digital Forensic investigation