Verified Document

Social Network Forensics: Approach To Research Proposal

Figure 2. Sample screenshot of Internet Evidence Finder Interface

Source: JAD Software at http://www.jadsoftware.com/go/wp-content/themes/jadsoftv2 / images/iefv4-1.png

Moreover, IEF v4 also has some useful features for social networking site applications, including:

1. Facebook live chat search has been updated to locate additional chat (including damaged fragments); the vendor adds that messages sent and received using the Facebook live chat feature. Information found with the message can include the Facebook profile ID used to send/receive the message, the from/to names and ID's, and the date/time (in UTC) that the message was sent; however, there are a few different formats of Facebook chat and not all formats include all this data).

2. Facebook unicode text is now converted.

3. Facebook page fragments: Facebook related web pages, including but not limited to the Inbox page, emails, photo galleries, groups, and so on. Most recovered items will be fragments and not the complete page, but attempts are made to recover the entire page and filter out false positives. A header is added to the fragment to aid in viewing the page in its original format.

4. Updated MSN/Windows Live Messenger search re-written to find more chat faster.

5. New Portable Edition that can run on live systems

6. Yahoo! Messenger existing log files are now parsed without requiring usernames.

7. Yahoo! Messenger chat log validation has been improved, with support for date ranges and message text filtering (Internet Evidence Finder v4 -- Standard Edition, 2011, para. 2-3).

A mixed methodology consisting of both qualitative as well as quantitative elements will be used to conduct the analytical comparison of the EnCase and IEF v4 products. The quantitative elements will consist of how many instances of specified key word searches and other functions of each product results in the desired outcomes (i.e., the identification of desired evidentiary information) using five hard drives containing Facebook chat that will be created specifically for this purpose. Because both software applications are expected to perform within reasonably comparable timeframes (e.g., a few seconds), the time required to perform each function will not be included in the data analysis. The numeric totals of each such desired outcomes will be collected for each product, but quantitative data only will...

Therefore, a weight will be assigned to each product's data analysis results to indicate their quality, scope and reliability. This approach is congruent with Neuman's (2003) guidance concerning conducting analytical comparisons. According to Neuman, an analytic comparison "identifies many characteristics and a key outcome, then checks the agreement and difference among the characteristics to learn which ones are associated with the outcome" (p. 458). The results of this weighted comparison of the EnCase and IEF v4 products will be presented in tabular and graphic formats, and interpreted in a narrative fashion.
Finally, to improve the trustworthiness of the findings, the case management recommendations provided by EnCase will be followed for conducting the analytical comparison of both vendors' software application products as follows:

1. Separate folders for each case; use unique directory names.

2. Use large capacity, high RPM (revolutions per minute) hard drives with single partition for evidence files

3. Wipe the drive to eliminate any claims or arguments of cross-contamination.

4. Give the hard drive a unique label prior to acquisitions to differentiate your drives from the suspect's.

5. Create default Evidence, Export, and Temp folders for each case (EnCase Methodology, 2011).

References

Anklam, P. (2007). Net work: A practical guide to creating and sustaining networks at work and in the world. Boston: Elsevier/Butterworth Heinemann.

Carter, H.L., Foulger, T.S. & Ewbank, a.D. (2008). Have you Googled your teacher lately?

Phi Delta Kappan, 89(9), 681-683.

EnCase Forensic for Law Enforcement. (2011). Guidance Software. Retrieved from http://

www.guidancesoftware.com/WorkArea/linkit.aspx?LinkIdentifier=ID&ItemID=674.

EnCase study guide. (2011). Guidance Software. Retrieved from http://www.encaseenterprise.

com/downloads/getpdf.aspx?fl=.pdf.

Internet Evidence Finder v4 -- Standard Edition. (2011). JADSoftware. Retrieved from http://

www.jadsoftware.com/go/?page_id=141.

Neuman, W.L. (2003). Social research methods: Qualitative and quantitative approaches, 5th ed. New York: Allyn & Bacon.

Van Tassel, J. (2006). Digital rights management. Boston: Focal.

Sources used in this document:
References

Anklam, P. (2007). Net work: A practical guide to creating and sustaining networks at work and in the world. Boston: Elsevier/Butterworth Heinemann.

Carter, H.L., Foulger, T.S. & Ewbank, a.D. (2008). Have you Googled your teacher lately?

Phi Delta Kappan, 89(9), 681-683.

EnCase Forensic for Law Enforcement. (2011). Guidance Software. Retrieved from http://
EnCase study guide. (2011). Guidance Software. Retrieved from http://www.encaseenterprise.
Internet Evidence Finder v4 -- Standard Edition. (2011). JADSoftware. Retrieved from http://
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Forensics for Preventing Email
Words: 4655 Length: 17 Document Type: Capstone Project

i.e. modifying the domain name system. 7. DNS-Based Phishing ("Pharming"): This offense is based on interference in the domain name searching process by modifying the domain name resolution sending the user to a different IP address. 8. Content-Injection Phishing: The phisher introduces fraudulent content into a legitimate website. 9. Data Theft: Malicious code that collects sensitive information stored within the machines in which it is installed. 10. Man-in-the-Middle Phishing: The phisher takes a

Cyber Crime Task Force Plan
Words: 2886 Length: 8 Document Type: Term Paper

Cyber Crime Task Force "Are computer vulnerabilities growing faster than measures to reduce them? Carelessness in protecting oneself, tolerance of bug-filled software, vendors selling inadequately tested products, or the unappreciated complexity of network connectivity has led to…abuse…" (Lukasik, 2011). The evidence is overwhelming that cyber crimes are not only increasing each year, but the sophistication of the attacks is greater each year and the impacts of attacks are more severe each year

Information Security
Words: 2352 Length: 8 Document Type: Term Paper

Security An institution of higher learning is one of the most vulnerable places to cyber-attacks available to hackers due to the number of units operating, lackadaisical security measures and the ability of hackers to hide in plain sight. The fact that these are vulnerable systems and individuals has made it a top priority of most institutions to ensure that the people who attend the school at least have a policy

Construction Fraud in the Netherlands
Words: 8194 Length: 20 Document Type: Case Study

Framework Analysis & Review As is also noted in the methodology of this report, the overall basis and goal of this report is to assess the widespread and national-level Dutch construction fraud scandal that erupted and came into full bloom in 2001. As will become clear throughout this framework and paradigm analysis, the presence of fraud within the Dutch construction industry and environment is without question and this was especially true

Cloud Computing Will Be Discussed to Show
Words: 9986 Length: 26 Document Type: Research Proposal

cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public. In completing a dissertation, it is very hard to go through the challenges that it requires.

Role of Law Enforcement Administrators
Words: 6496 Length: 15 Document Type: Term Paper

Therefore, one must be both committed to the law, as well as to individual freedom, and this would be in keeping with the trends as dictated by a democratic country such as the United States of America. It must be stated that in the Post Cold War world, crimes such as terrorism, narcotics drugs trafficking, money laundering, and so on, are all considered to be serious threats to the very

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now