For this assignment,students will write a 2,500-3,000 word research paper thatcovers legal and ethical components of network forensic investigations.Consider the following scenario.

Through yourinvestigations, you discovered illegal activity on your network, stemming froma couple of computers that had been taken over by cyber criminals. Ports wereleft open and exploited in order to steal company assets and attempt to sellthem online. Your task is to address the legal requirements you have in orderto ensure that evidence can be admitted in court. Additionally, you mustaddress ethical issues surrounding the search and seizure of equipment andend-user data. Finally, the proper chain of custody must be followed: create aplan that maintains this important component of forensic investigation.

Your paper willconsist of the following sections.

  • Legal Aspects of Network Forensic Analysis – Discuss legal aspects of forensic analysis, tying your analysis to network forensic analysis and the case study. Analyze the legal steps required in the process of gathering evidence, search and seizure, and the interviewing of suspects.
  • Ethical Components – Analyze the ethical components of network forensic analysis: what challenges could you face when trying to gather evidence of a crime? When does the prosecution of a crime override privacy or protection of personal data? How can these hurdles be overcome? Provide suggestions using relevant research.
  • Chain of Custody – Explain the importance of a chain of custody for digital forensic evidence in network forensics. Be sure to explain the process of documenting, collecting and storing evidence from a crime scene (e.g., a laptop computer). Describe the consequences of not following a proper chain of custody, connecting to the case study.

Formatting & Sources

You may draw upon thelesson ,however much of your evidence should be from peer-reviewed sources.

Please write yourpaper in the APA format. You may refer to the course material for supportingevidence, but you must also use five to seven sources and cite them using APAformat. Please include a mix of both primary and secondary sources, with atleast one source from a scholarly peer-reviewed journal. If you use anyStudy.com lessons as sources, please also cite them in APA (including thelesson title and instructor’s name).

  • Primary sources are first-hand accounts such as interviews, advertisements, speeches, company documents, statements, and press releases published by the company in question.
  • Secondary sources come from peer-reviewed scholarly journals, such as Journal of Forensic Sciences, Journal of Digital Forensics, Security, and Law and International Journal of Cybersecurity and Forensics. You may use sources like JSTOR, Google Scholar, to find articles from these journals. Secondary sources may also come from reputable websites with .gov, .edu, or .org in the domain. (Wikipedia is not a reputable source, though the sources listed in Wikipedia articles may be acceptable.)

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


"Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!"