I need a solution on – Discuss the chain of custody for evidence and apply it to network forensic analysis.-Discuss the chain of custody for evidence and apply it to network forensic analysis.

Course Linkhttps://study.com/academy/lesson/network-forensics-assignment-2-legal-ethical-components-of-network-forensic-investigations.html
About this Assignment
In this course, you have learned about network forensics, including legal aspects of digital criminal investigations. You will apply this knowledge in this project.
After completing this project, you will be able to:
Describe the legal aspects of network forensic analysisAnalyze ethical components of forensic analysisDiscuss the chain of custody for evidence and apply it to network forensic analysis
For this assignment, students will write a 2,500-3,000 word research paper that covers legal and ethical components of network forensic investigations. Consider the following scenario.
Through your investigations, you discovered illegal activity on your network, stemming from a couple of computers that had been taken over by cyber criminals. Ports were left open and exploited in order to steal company assets and attempt to sell them online. Your task is to address the legal requirements you have in order to ensure that evidence can be admitted in court. Additionally, you must address ethical issues surrounding the search and seizure of equipment and end-user data. Finally, the proper chain of custody must be followed: create a plan that maintains this important component of forensic investigation.
Your paper will consist of the following sections.
Legal Aspects of Network Forensic Analysis – Discuss legal aspects of forensic analysis, tying your analysis to network forensic analysis and the case study. Analyze the legal steps required in the process of gathering evidence, search and seizure, and the interviewing of suspects.Ethical Components – Analyze the ethical components of network forensic analysis: what challenges could you face when trying to gather evidence of a crime? When does the prosecution of a crime override privacy or protection of personal data? How can these hurdles be overcome? Provide suggestions using relevant research.Chain of Custody – Explain the importance of a chain of custody for digital forensic evidence in network forensics. Be sure to explain the process of documenting, collecting and storing evidence from a crime scene (e.g., a laptop computer). Describe the consequences of not following a proper chain of custody, connecting to the case study.
Formatting & Sources
You may draw upon the lesson Legal Aspects of Digital Criminal Evidence, however much of your evidence should be from peer-reviewed sources.
Please write your paper in the APA format. You may refer to the course material for supporting evidence, but you must also use five to seven sources and cite them using APA format. Please include a mix of both primary and secondary sources, with at least one source from a scholarly peer-reviewed journal. If you use any Study.com lessons as sources, please also cite them in APA (including the lesson title and instructor’s name).
Primary sources are first-hand accounts such as interviews, advertisements, speeches, company documents, statements, and press releases published by the company in question.Secondary sources come from peer-reviewed scholarly journals, such as Journal of Forensic Sciences, Journal of Digital Forensics, Security, and Law and International Journal of Cybersecurity and Forensics. You may use sources like JSTOR, Google Scholar, to find articles from these journals. Secondary sources may also come from reputable websites with .gov, .edu, or .org in the domain. (Wikipedia is not a reputable source, though the sources listed in Wikipedia articles may be acceptable.)
If you’re unsure about how to use APA format to cite your sources, please see the following lessons:
What is APA Format? Style & DefinitionHow To Format APA Citations
Grading Rubric
Your essay will be graded based on the following rubric:
Category Unacceptable (0-1) Needs Improvement (2-3) Good (4) Excellent (5) Total Possible PointsLegal Aspects (x3) Lacks discussion of legal aspects; does not address the case study; or does not discuss the legal steps for gathering forensic evidence. Includes discussion of part of the topics; does not cover all aspects, or discussion does not tie back to the case study. Addresses the legal aspects of forensic analysis, connects analysis to the case study, and lists legal steps required in gathering of evidence. In-depth analysis of the legal aspects to network forensic analysis, connecting directly to the case study; comprehensive analysis of the steps required in gathering evidence. Supported by evidence. 15Ethical Components (x2) Incomplete discussion, or does not address questions asked in the topic. Limited discussion of ethical issues, but does not correlate to case study, or not supported by research Addresses ethical components of network analysis and challenges that could be faced in the case study. Comprehensive analysis of ethical issues in network forensic analysis, provides analysis of case study and possible hurdles; offers solutions and suggestions. 10Chain of Custody (x2) Does not address issue, or incomplete discussion of chain of custody; does not relate to case study. Basic assessment of chain of custody and cursory connection to the current case study Explains the chain of custody and its importance in network forensics; connects to the current case study. In-depth analysis of the chain of custody and the importance of following it; connects relevant research to the current case study to support assertions 10Clarity, Structure & Organization (x1) Disorganized and unclear structure. Language is difficult to understand. Contains grammar, spelling, and punctuation errors. Acknowledges the main points, but lacks a cohesive structure. Contains some unclear language and typos. Addresses the mains points in a cohesive structure. Language is understandable, clear, and correct. Main points are very clear and concise Organization is logical; transitions between points are smooth and enhance clarity and delivery of main ideas 5
Are you looking for a custom made solution (original essay) on the same question or a similar one?
We have prepared thousands papers to our clients around the world in the last ten years.
We really respect our clients’ privacy.
We guarantee original work with a free plagiarism report and high grades in your homework.
Proceed and place an order with us….get sufficient time to study for your main exams!