Digital forensic analysis is used to review and investigate data collected through digital communications and computer networks. The National Institute for Standards and Technology (NIST) has defined four fundamental phases for forensic analysis: collection, examination, analysis, and reporting. You will learn more about these concepts as you navigate throughout the steps of this project and read the literature and links found in each step.
There are four steps that will lead you through this project. Begin with Step 1: “Methodology.” The deliverables for this project are as follows:
1. Digital Forensic Research Paper: This should be a five-page double-spaced Word document with citations in APA format. The page count does not include diagrams or tables.
2. In a Word document, share your lab experience and provide screenshots to demonstrate that you completed the lab.
Step 1: Methodology
The methodology for digital forensics follows a systems process. Identify the requirements, purpose, and objectives of the investigation. Click the links below to review information that will aid in conducting and documenting an investigation:
• secure programming fundamentals
• forensics fundamentals
Learn about the investigation methodology. Consider secure programming fundamentals. Define the digital forensics analysis methodology and the phases of the digital forensics fundamentals and methodology, including the following:
1. preparation
2. extraction
3. identification
4. analysis
This information will help you understand the process you will use during an investigation.

Step 2: Tools and Techniques
Select the following links to learn about forensics analysis tools, methods, and techniques:
1. forensics analysis tools
2. web log and session analysis
3. hash analysis
Step 3; LAB

Step 4: Digital Forensics Research Paper
Now that you have learned the basics of digital forensics analysis and methodology, and have experienced one of the common forensic tools, use the material presented in this project as well as research you have conducted outside of the course materials to write a research paper that addresses the following:
1. digital forensics methodology
2. the importance of using forensic tools to collect and analyze evidence (e.g., FTK Imager and EnCase)
3. hashing in the context of digital forensics
4. How do you ensure that the evidence collected has not been tampered with (i.e., after collection)? Why and how is this important to prove in court?
The deliverables for this project are as follows:
1. Digital Forensics Research Paper: This should be a six-page double-spaced Word document with citations in APA format. The page count does not include diagrams or tables.
2. In a Word document, share your lab experience and provide screenshots to demonstrate that you completed the lab.

review the competencies below, which your instructor will use to evaluate your work. A good practice would be to use each competency as a self-check to confirm you have incorporated all of them. To view the complete grading rubric, click My Tools, select Assignments from the drop-down menu, and then click the project title.
• 5.3: Uses defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network in order to protect information, information systems, and networks from threats.
• 8.6: Provides professional preparation for computer digital forensics, investigation of crime, and preservation of digital evidence in criminal and civil investigations and information security incident response.
• 8.7: Provide theoretical basis and practical assistance for all aspects of digital investigation and the use of computer evidence in forensics and law enforcement.

Sample solution

Dante Alighieri played a critical role in the literature world through his poem Divine Comedy that was written in the 14th century. The poem contains Inferno, Purgatorio, and Paradiso. The Inferno is a description of the nine circles of torment that are found on the earth. It depicts the realms of the people that have gone against the spiritual values and who, instead, have chosen bestial appetite, violence, or fraud and malice. The nine circles of hell are limbo, lust, gluttony, greed and wrath. Others are heresy, violence, fraud, and treachery. The purpose of this paper is to examine the Dante’s Inferno in the perspective of its portrayal of God’s image and the justification of hell. 

In this epic poem, God is portrayed as a super being guilty of multiple weaknesses including being egotistic, unjust, and hypocritical. Dante, in this poem, depicts God as being more human than divine by challenging God’s omnipotence. Additionally, the manner in which Dante describes Hell is in full contradiction to the morals of God as written in the Bible. When god arranges Hell to flatter Himself, He commits egotism, a sin that is common among human beings (Cheney, 2016). The weakness is depicted in Limbo and on the Gate of Hell where, for instance, God sends those who do not worship Him to Hell. This implies that failure to worship Him is a sin.

God is also depicted as lacking justice in His actions thus removing the godly image. The injustice is portrayed by the manner in which the sodomites and opportunists are treated. The opportunists are subjected to banner chasing in their lives after death followed by being stung by insects and maggots. They are known to having done neither good nor bad during their lifetimes and, therefore, justice could have demanded that they be granted a neutral punishment having lived a neutral life. The sodomites are also punished unfairly by God when Brunetto Lattini is condemned to hell despite being a good leader (Babor, T. F., McGovern, T., & Robaina, K. (2017). While he commited sodomy, God chooses to ignore all the other good deeds that Brunetto did.

Finally, God is also portrayed as being hypocritical in His actions, a sin that further diminishes His godliness and makes Him more human. A case in point is when God condemns the sin of egotism and goes ahead to commit it repeatedly. Proverbs 29:23 states that “arrogance will bring your downfall, but if you are humble, you will be respected.” When Slattery condemns Dante’s human state as being weak, doubtful, and limited, he is proving God’s hypocrisy because He is also human (Verdicchio, 2015). The actions of God in Hell as portrayed by Dante are inconsistent with the Biblical literature. Both Dante and God are prone to making mistakes, something common among human beings thus making God more human.

To wrap it up, Dante portrays God is more human since He commits the same sins that humans commit: egotism, hypocrisy, and injustice. Hell is justified as being a destination for victims of the mistakes committed by God. The Hell is presented as being a totally different place as compared to what is written about it in the Bible. As a result, reading through the text gives an image of God who is prone to the very mistakes common to humans thus ripping Him off His lofty status of divine and, instead, making Him a mere human. Whether or not Dante did it intentionally is subject to debate but one thing is clear in the poem: the misconstrued notion of God is revealed to future generations.

 

References

Babor, T. F., McGovern, T., & Robaina, K. (2017). Dante’s inferno: Seven deadly sins in scientific publishing and how to avoid them. Addiction Science: A Guide for the Perplexed, 267.

Cheney, L. D. G. (2016). Illustrations for Dante’s Inferno: A Comparative Study of Sandro Botticelli, Giovanni Stradano, and Federico Zuccaro. Cultural and Religious Studies4(8), 487.

Verdicchio, M. (2015). Irony and Desire in Dante’s” Inferno” 27. Italica, 285-297.

Sample Solution

Step 2: Collection
In this step, the team collects evidence from a source. Evidence collection is an important part of digital forensics analysis since it helps to determine the origin and purpose of the collected data. It also establishes trustworthiness for later stages of investigation. Review information about evidence collection methods before completing this step.
Consider what to collect, where to obtain it from, and how it can be preserved in order to remain admissible as evidence in court. Determine which tools will be used and how they should be configured for each specific case. The most commonly used tool is EnCase Forensic software by Guidance Software Inc., but other free or commercial solutions are available as well depending on your needs (e.g.: FTK Imager).

Sample Solution

Step 2: Collection
In this step, the team collects evidence from a source. Evidence collection is an important part of digital forensics analysis since it helps to determine the origin and purpose of the collected data. It also establishes trustworthiness for later stages of investigation. Review information about evidence collection methods before completing this step.
Consider what to collect, where to obtain it from, and how it can be preserved in order to remain admissible as evidence in court. Determine which tools will be used and how they should be configured for each specific case. The most commonly used tool is EnCase Forensic software by Guidance Software Inc., but other free or commercial solutions are available as well depending on your needs (e.g.: FTK Imager).

Click below to review information that will aid you in collecting evidence:
• Forensic Analysis Processes
• Digital Forensics Tools
•chain-of-custody procedures

Step 3: Examination & Analysis
In this step, you review the collected material with examination techniques that allow investigators to understand the context in which data was created and accessed, identify hidden files or metadata associated with documents, recover deleted files, etc., depending on their goals for the investigation. To do so properly requires expertise in analyzing digital media such as hard drives and smartphones; understanding different types of digital crimes; balancing investigative objectives against legal requirements; applying analytical techniques like keyword searches; identifying patterns within collected elements; recognizing anomalous behavior which may indicate something out of ordinary happened on a device or network etc.. Click below to review additional information related to conducting examinations/analyses :
• Legal Obligations
• Investigative Techniques Step 4: Reporting & Documentation The final phase consists on documenting all findings obtained during investigation steps 1 through 3 while maintaining objectivity throughout all documentation processes conducted by forensic examiners – especially when presenting results at court – is needed so end users are capable of making informed decisions based on valid reports produced during investigations. As such forensic analysts must document their testing process thoroughly record any abnormal activities witnessed while performing tests maintain chain-of-custody records IT security incident response plans procedures apply proper labeling standards secure storage practices etc… Multiple resources regarding report writing can be found online but these are some of common topics addressed when researching this subject matter : • Unbiased Investigation Reports • Chain Of Custody Procedures • Report Writing Tips

This question has been answered.

Get Answer