Social Network Forensics: Approach To Research Proposal

PAGES
6
WORDS
2191
Cite

Figure 2. Sample screenshot of Internet Evidence Finder Interface

Source: JAD Software at http://www.jadsoftware.com/go/wp-content/themes/jadsoftv2 / images/iefv4-1.png

Moreover, IEF v4 also has some useful features for social networking site applications, including:

1. Facebook live chat search has been updated to locate additional chat (including damaged fragments); the vendor adds that messages sent and received using the Facebook live chat feature. Information found with the message can include the Facebook profile ID used to send/receive the message, the from/to names and ID's, and the date/time (in UTC) that the message was sent; however, there are a few different formats of Facebook chat and not all formats include all this data).

2. Facebook unicode text is now converted.

3. Facebook page fragments: Facebook related web pages, including but not limited to the Inbox page, emails, photo galleries, groups, and so on. Most recovered items will be fragments and not the complete page, but attempts are made to recover the entire page and filter out false positives. A header is added to the fragment to aid in viewing the page in its original format.

4. Updated MSN/Windows Live Messenger search re-written to find more chat faster.

5. New Portable Edition that can run on live systems

6. Yahoo! Messenger existing log files are now parsed without requiring usernames.

7. Yahoo! Messenger chat log validation has been improved, with support for date ranges and message text filtering (Internet Evidence Finder v4 -- Standard Edition, 2011, para. 2-3).

A mixed methodology consisting of both qualitative as well as quantitative elements will be used to conduct the analytical comparison of the EnCase and IEF v4 products. The quantitative elements will consist of how many instances of specified key word searches and other functions of each product results in the desired outcomes (i.e., the identification of desired evidentiary information) using five hard drives containing Facebook chat that will be created specifically for this purpose. Because both software applications are expected to perform within reasonably comparable timeframes (e.g., a few seconds), the time required to perform each function will not be included in the data analysis. The numeric totals of each such desired outcomes will be collected for each product, but quantitative data only will...

...

Therefore, a weight will be assigned to each product's data analysis results to indicate their quality, scope and reliability. This approach is congruent with Neuman's (2003) guidance concerning conducting analytical comparisons. According to Neuman, an analytic comparison "identifies many characteristics and a key outcome, then checks the agreement and difference among the characteristics to learn which ones are associated with the outcome" (p. 458). The results of this weighted comparison of the EnCase and IEF v4 products will be presented in tabular and graphic formats, and interpreted in a narrative fashion.
Finally, to improve the trustworthiness of the findings, the case management recommendations provided by EnCase will be followed for conducting the analytical comparison of both vendors' software application products as follows:

1. Separate folders for each case; use unique directory names.

2. Use large capacity, high RPM (revolutions per minute) hard drives with single partition for evidence files

3. Wipe the drive to eliminate any claims or arguments of cross-contamination.

4. Give the hard drive a unique label prior to acquisitions to differentiate your drives from the suspect's.

5. Create default Evidence, Export, and Temp folders for each case (EnCase Methodology, 2011).

Sources Used in Documents:

References

Anklam, P. (2007). Net work: A practical guide to creating and sustaining networks at work and in the world. Boston: Elsevier/Butterworth Heinemann.

Carter, H.L., Foulger, T.S. & Ewbank, a.D. (2008). Have you Googled your teacher lately?

Phi Delta Kappan, 89(9), 681-683.

EnCase Forensic for Law Enforcement. (2011). Guidance Software. Retrieved from http://
EnCase study guide. (2011). Guidance Software. Retrieved from http://www.encaseenterprise.
Internet Evidence Finder v4 -- Standard Edition. (2011). JADSoftware. Retrieved from http://


Cite this Document:

"Social Network Forensics Approach To" (2011, May 01) Retrieved April 20, 2024, from
https://www.paperdue.com/essay/social-network-forensics-approach-to-13216

"Social Network Forensics Approach To" 01 May 2011. Web.20 April. 2024. <
https://www.paperdue.com/essay/social-network-forensics-approach-to-13216>

"Social Network Forensics Approach To", 01 May 2011, Accessed.20 April. 2024,
https://www.paperdue.com/essay/social-network-forensics-approach-to-13216

Related Documents
Social Business and Retailer
PAGES 50 WORDS 12746

business2community.com/social-media/2012s-ten-worst-social-media-Disaster-0370309 Using contemporary illustrative examples from academic literature and reputable business publications, discuss the concept of "Social Business" and the resultant opportunity and challenges that are currently being faced by the retail industry globally. Concept of Social Business Concept of Social Business with Retailers Social Media and Retailing Best Practices in Administering Social Media There is a growing body of research that confirms that companies of all sizes and types can realize a wide array

Batchen (2005) defines the components of the nursing process as the client, the environment, the definition of health, and the definition of the nurse's role. Another trend in healthcare to be addressed is the reduction of enrollment in Registered Nurse (RN) programs, which has led to a shortage of trained nurses. This trend is important because the role of the forensic nurse has changed as a result of the

placement of children and youth within residential group treatment programs group treatment will be reviewed. As will be reflected within the literature review, while there has been little direct attention focused on the use of groups and group treatment within residential placement settings for children and adolescents, there are a number of factors associated with residential placement that may be significant and meaningful to future efforts to further examine

Typically, a database uses either the simple recovery model or the full recovery model. The full recovery model can be supplemented by switching to the bulk-logged recovery model before bulk operations." (Microsoft, 2010 P. 2). Meanwhile, our company will need to implement the full back up safeguard all our data. Under the full recovery model, the first step is to back up the transaction log. Combination of full back-up with

i.e. modifying the domain name system. 7. DNS-Based Phishing ("Pharming"): This offense is based on interference in the domain name searching process by modifying the domain name resolution sending the user to a different IP address. 8. Content-Injection Phishing: The phisher introduces fraudulent content into a legitimate website. 9. Data Theft: Malicious code that collects sensitive information stored within the machines in which it is installed. 10. Man-in-the-Middle Phishing: The phisher takes a

Social-Environmental Context of Violent Behavior in Persons Treated for Severe Mental Illness Concept Introduction Society as a whole understands that two major demographic predictors of violent behavior are being male and being young. Two major clinical predictors of violent behavior are a past experiential history of violence (e.g., in the home, the community, personal delivery or receipt of violent acts or behaviors) and substance abuse (i.e., alcohol and/or drugs). Recently, it has