100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

FOR3704– Assignment 02 Answers (04 April 2025)- For expert assistance with assignments and exam preparation, contact 0/8/3/2/8/6/8/4/6/5.

Puntuación
-
Vendido
5
Páginas
10
Grado
A+
Subido en
26-03-2025
Escrito en
2024/2025

FOR3704– Assignment 02 Answers (04 April 2025)- QUESTION 1 The pre-examination phase of the digital forensic process consists of five specific processes that must be completed before digital evidence can be examined by a digital forensic examiner. 1.1 What is a multiple scene incident? (3) 1.2 Describe the key characteristics of a multiple scene incident. (3) 1.3 Describe five requirements for seizing and transporting evidence if computers are not powered on. (5) FOR3704/102/1/2025 3 1.4 Discuss the requirements for seizing and transporting evidence if computers are powered on. (10) [21] QUESTION 2 You have established that Company Y is involved in racketeering activities, during which fraudulent offshore accounts are being used to channel money derived from fraudulent business activities. 2.1 Discuss how you would provide proof of the offence of racketeering. (15) 2.2 Identify and explain three key methods used to obtain information and evidence in criminal investigations. In your response, briefly describe each method and discuss its significance in gathering reliable evidence. (15) 2.3 What does the phrase ‘method of operating’ mean in a specific context? (2) [32] Question 3 A vehicle transporting cash was robbed of an undisclosed amount of money when collecting cash at the All-in-All shopping complex by three African males and two white males. The suspects escaped in two vehicles. Upon chasing the suspects, the police arrested two of the suspects hiding in a house in the Here-we-Are suburban area. 3.1 In the scenario, identify the primary and the secondary scene of the incident. (2) 3.2 List the objectives of an investigation (4) 3.3 Briefly discuss the language usage in statements as provided for in section 6(1) of the Constitution. (4) [10] QUESTION 4 4.1 Briefly explain the language usage in statements/affidavits as provided for in section 6(1) of the Constitution. (4) 4.2 FOR3704/102/1/2025 During the walkthrough at the scene of the incident, how can investigators effectively gather and preserve evidence to ensure accurate reconstruction of events? (6) 4.3 4.4 Describe the distinction between modus operandi, signature, and fantasy in criminal behaviour. (10) Define the meaning of digital evidence QUESTION 5 Scenario-Based Question Read the following scenario carefully: (2) [22] On 15 January 2025, the EveryOne’s bank cybersecurity team head, Lulama Du Plessis, detected unusual login attempts from an external IP address. These attempts bypassed multi-factor authentication, leading the team to suspect credential stuffing or phishing. The bank’s logs showed that large volumes of customer data were accessed outside regular business hours. Our first step was securing the bank’s server logs and network traffic data. We worked with their IT team to capture system event logs, which showed repeated login attempts from an IP address traced to a rented virtual private server (VPS). Additionally, we collected firewall logs, which indicated unauthorized outbound data transfers to an encrypted external server. Preliminary investigation - Investigator Next, our forensic team obtained a warrant to seize a suspect’s laptop, which was recovered from an apartment belonging to a former bank employee, Lopie. Using a forensic imaging tool, we created a bit-by-bit copy of the hard drive, ensuring that the original data remained intact. The analysis revealed scripts designed to automate login attempts and extract customer information. Furthermore, we discovered a hidden folder containing authentication tokens stolen from the bank’s system. To link the suspect to the crime, we analysed metadata and timestamps, confirming that the unauthorised data was transferred shortly after the suspect’s VPN connection was 4 FOR3704/102/1/2025 established. Additionally, chat logs retrieved from the suspect’s encrypted messaging app indicated discussions about selling the stolen data on the dark web. We also collected and preserved digital evidence from cloud storage services where the suspect had backed up some of the stolen information. Through legal steps, we obtained access logs from the cloud provider, showing that the same VPS IP address was used to upload sensitive customer records. All digital evidence was properly documented and secured using forensic chain-of custody protocols. We ensured every step of the investigation followed legal and procedural guidelines, making the evidence admissible in court. As a result of this investigation, we have obtained a strong case against the suspect, who is now facing charges related to unauthorised access, data theft, and fraud. Our next step is presenting these findings to the prosecutor for formal charges and trial proceedings.” 5.1 As an investigator, write a formal investigation statement detailing your findings regarding the incident. Your statement should include: • A summary of what happened based on the evidence collected. • The methods used to investigate and gather digital evidence. • The relevance of the Electronic Communications and Transactions (ECT) Act 25 of 2002, explaining how it applies to the case and supports digital evidence collection. Use statement template and ensure your response is structured, professional, and demonstrates an understanding of digital forensic procedures and legal compliance. TOTAL: [15] [100]

Mostrar más Leer menos
Institución
Grado








Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
26 de marzo de 2025
Número de páginas
10
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

FOR3704 ASSIGNMENT 01 DUE 04 APRIL 2025
FOR EXAMS, PORTFOLIO, AND ASSIGNMENT ASSISTANCE WHATSAPP 0832868465 EMAIL:


Questions
QUESTION 1 The pre-examination phase of the digital forensic process consists of five specific processes that
must be completed before digital evidence can be examined by a digital forensic examiner. 1.1 What is a multiple
scene incident? (3) 1.2 Describe the key characteristics of a multiple scene incident. (3) 1.3 Describe five
requirements for seizing and transporting evidence if computers are not powered on. (5) FOR3704/102/1/2025 3
1.4 Discuss the requirements for seizing and transporting evidence if computers are powered on. (10) [21]
QUESTION 2 You have established that Company Y is involved in racketeering activities, during which fraudulent
offshore accounts are being used to channel money derived from fraudulent business activities. 2.1 Discuss how
you would provide proof of the offence of racketeering. (15) 2.2 Identify and explain three key methods used to
obtain information and evidence in criminal investigations. In your response, briefly describe each method and
discuss its significance in gathering reliable evidence. (15) 2.3 What does the phrase ‘method of operating’ mean
in a specific context? (2) [32] Question 3 A vehicle transporting cash was robbed of an undisclosed amount of
money when collecting cash at the All-in-All shopping complex by three African males and two white males. The
suspects escaped in two vehicles. Upon chasing the suspects, the police arrested two of the suspects hiding in a
house in the Here-we-Are suburban area. 3.1 In the scenario, identify the primary and the secondary scene of the
incident. (2) 3.2 List the objectives of an investigation (4) 3.3 Briefly discuss the language usage in statements as
provided for in section 6(1) of the Constitution. (4) [10] QUESTION 4 4.1 Briefly explain the language usage in
statements/affidavits as provided for in section 6(1) of the Constitution. (4) 4.2 FOR3704/102/1/2025 During the
walkthrough at the scene of the incident, how can investigators effectively gather and preserve evidence to
ensure accurate reconstruction of events? (6) 4.3 4.4 Describe the distinction between modus operandi,
signature, and fantasy in criminal behaviour. (10) Define the meaning of digital evidence QUESTION 5 Scenario-
Based Question Read the following scenario carefully: (2) [22] On 15 January 2025, the EveryOne’s bank
cybersecurity team head, Lulama Du Plessis, detected unusual login attempts from an external IP address. These
attempts bypassed multi-factor authentication, leading the team to suspect credential stuffing or phishing. The
bank’s logs showed that large volumes of customer data were accessed outside regular business hours. Our first
step was securing the bank’s server logs and network traffic data. We worked with their IT team to capture
system event logs, which showed repeated login attempts from an IP address traced to a rented virtual private
server (VPS). Additionally, we collected firewall logs, which indicated unauthorized outbound data transfers to an
encrypted external server. Preliminary investigation - Investigator Next, our forensic team obtained a warrant to
seize a suspect’s laptop, which was recovered from an apartment belonging to a former bank employee, Lopie.
Using a forensic imaging tool, we created a bit-by-bit copy of the hard drive, ensuring that the original data
remained intact. The analysis revealed scripts designed to automate login attempts and extract customer
information. Furthermore, we discovered a hidden folder containing authentication tokens stolen from the bank’s
system. To link the suspect to the crime, we analysed metadata and timestamps, confirming that the
unauthorised data was transferred shortly after the suspect’s VPN connection was 4 FOR3704/102/1/2025
established. Additionally, chat logs retrieved from the suspect’s encrypted messaging app indicated discussions
about selling the stolen data on the dark web. We also collected and preserved digital evidence from cloud
storage services where the suspect had backed up some of the stolen information. Through legal steps, we
obtained access logs from the cloud provider, showing that the same VPS IP address was used to upload sensitive
customer records. All digital evidence was properly documented and secured using forensic chain-of custody
protocols. We ensured every step of the investigation followed legal and procedural guidelines, making the
evidence admissible in court. As a result of this investigation, we have obtained a strong case against the
suspect, who is now facing charges related to unauthorised access, data theft, and fraud. Our next step is
presenting these findings to the prosecutor for formal charges and trial proceedings.” 5.1 As an investigator, write
a formal investigation statement detailing your findings regarding the incident. Your statement should include: • A
QUESTION
summary of what1 happened based on the evidence collected. • The methods used to investigate and gather

1
$3.18
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
VBPSEDUPROS SN Tutors
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
723
Miembro desde
2 año
Número de seguidores
473
Documentos
221
Última venta
1 semana hace
VBPS EDUPROS

Exams, assignment solutions and study notes

4.1

114 reseñas

5
69
4
13
3
16
2
4
1
12

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes