Prompt
After reading the article, Iceman Pleads Guilty to Massive Computer Hacking, linked in the Module Five Reading and Resources section of your course, address the following critical elements:
- Case Study Analysis
- Identify at least two assets that are relevant for the investigation, and explain which areas of those assets should be searched for evidence.
- Based on the assets you identified, describe which digital forensic hardware and software tools you would need to use to collect evidence. Justify your selection.
- Explain the procedures you would use to maintain chain of custody for the collected evidence.
- Proactive Approaches
- Explain why a systems thinking mindset is important when performing these investigations.
- Explain why it is essential to maintain data integrity during a digital forensic investigation for both court cases and non-court cases.
- Explain the concept of chain of custody and why it is important for collected evidence.
What to Submit
Your submission should be 2 to 3 pages in length. Use double spacing, 12-point Times New Roman font, and one-inch margins. Any references should be cited according to APA style. Use a file name that includes the course code, the assignment title, and your namefor example, CYB_123_Assignment_Firstname_Lastname.docx.
Article: https://www.computerworld.com/article/1551500/iceman-pleads-guilty-to-massive-computer-hacking.html
Attached Files (PDF/DOCX): Project Two Stepping Stone Guidelines and Rubric – CYB-320-12149-M01 Incident Response and Invest 2026 C-1 (Jan – Mar).pdf
Note: Content extraction from these files is restricted, please review them manually.

Leave a Reply
You must be logged in to post a comment.