Enterprise Cryptography

Question 1

After establishing probable cause, your company, AB Investigative Services (ABIS), has been contacted by a prominent state law enforcement agency. Investigators do not understand the specifics of processing digital evidence or analyzing digital evidence. As an ABIS investigator, you will need go to the scene and provide guidance concerning the identification of digital evidence that will establish motive related to the particular offense. The state forensic agents will follow the procedure guidelines provided by you to establish the motive of its case as it relates to a high-tech crime.

For full credit, your 3–4-paragraph posting must include the following information:

  • What do you consider to be the 3 most important computer-related forensics procedures necessary in processing evidence at the scene of a crime? Provide your reasoning of why these are the most important procedures.
  • What do you consider to be the most important aspect of how a financial investigator must secure digital evidence to help in the prosecution of offenders, and why this process is important?
  • How would omitting one of these forensic procedures negatively affect either the investigation or prosecution process?
  • What is a possible oversight that could occur during the collection and identification of digital evidence process, and what is one way to overcome such an oversight?

Question 2

Answer the following three questions in essay format. The response to each question should be at least 250 words in length. You need to include at least one source (both as a reference and as in-text citations) for each response.

1.Discuss various encryption methods, types, and uses. Include examples.

2.Compare and contrast IPv4 with IPv6.

3.Compare and contrast commercial firewalls with open source firewalls. Include examples.

Do you need help with this assignment or any other? We got you! Place your order and leave the rest to our experts.

Quality Guaranteed

Any Deadline

No Plagiarism