logo

Introduction to Digital Forensics

   

Added on  2023-01-16

9 Pages815 Words44 Views
Running head: INTRODUCTION TO DIGITAL FORENSICS
Introduction to Digital Forensics
Name of the Student
Name of the University
Author’s Note

1
INTRODUCTION TO DIGITAL FORENSICS
Task 1: Analysis of ACS_Ethics with the application of 6 values of ACS Code of Ethics
Case No. 6:
The selected case for releasing the software application with bugs present in its violates the ACS code of
professional conduct and have potential conflict between the legal and other acceptance. The new software package
developed by the company can help the small business and individual to figure the taxes and new tax laws. The bugs
present in the software codes can cause error in the result and thus violates the 6 values of ACS code of ethics.
The primacy of public interest – The interest of the stakeholders is not safeguarded and thus it causes a
conflict between the duty and loyalty to owe the public. The public health, environment and safety is evaluated for
finding the impact and the software can cause error in calculation of the tax and results in penalised by ATO.
Enhancement of quality of life – The impact of the application on the society and the negative effect of the
application and its continuation is evaluated. The approach for minimizing the effect of bug and promoting the access
of benefits to all the members with the application of updates and patches can help in promoting the health and safety
for the people affected with the application.
Honesty – The use of disclaimer for the resultant of the use of application is used for distinguishing the
professional and personal opinion. The scenario does not fulfil the honesty values for providing the estimation and
controlling the project. Attempt is not made for enhancing the reputation at an expense of the employee’s reputation.
Competence – The president of the company is highly competent and do not hesitate for obtaining expertise
and individuals for modify the program according to the suggestion of the user. Focus is given on providing product
and service for matching with financial and operational needs. The skills and knowledge is not misrepresented and the
responsibility of work is accepted. The property of interest of the stakeholders are not respected the rectification is
done ion demand of the user after the consequences.
Professional Development – The new technologies is evaluated and practice and standards of the work is
performed for keeping the knowledge up to dated. The industry policy is evaluated and the needs of professionals for
the rectification of the bug is analysed for increasing the public relationship.
Professionalism – The rapid changes and acquiring standards and legislation is evaluated for maintaining a
professional standard in the business. The members of the development team aware of the bug should take
appropriate action like whistle blowing for enabling the ACS member engage the unethical behaviour.
Task 2: Investigation of suspicious hard disk

2
INTRODUCTION TO DIGITAL FORENSICS
For the investigation of the virtual hard disk available from the module the virtual box image file is downloaded
from “https://download.ise.canberra.edu.au/wanli/”. The chunks are assembled and the setup is done in oracle virtual
box.
The following screenshot shows the configuration of Win7 and successfully booting into it.
The following screenshot demonstrates the creation of a virtual hard drive with the student ID and with a size
of 128 MB.

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
ICT Developments and Ethical, Social, and Legal Issues - Desklib
|11
|733
|277

Professional Skills for Information and Communication Technology
|3
|588
|140