Assignment 3 CCJS 321

.docx

School

University of Maryland, College Park *

*We aren’t endorsed by this school

Course

321

Subject

Computer Science

Date

Dec 6, 2023

Type

docx

Pages

8

Uploaded by BrigadierIceStarling13

1 Assignment 3 Jae Woo CCJS 321 Section 6382 Professor Daniel Grove 03/03/2023
2 The first ethical dilemma for a digital forensic practitioner is the use of publication. The potential impact of results from digital forensic research not becoming publicly available can be a major risk or issue. Users of the software that contains evidence could attempt to hide the evidence in an unlawful manner and then switch to a more effective product that is capable of erasing the data in question. The developers may decide to take the published research and develop updates that can fix the problem. Now that the software can erase the locations, this will deny the use of important evidence for the digital forensic practitioners. The best way to ensure that the integrity of this ethical dilemma isn’t questioned upon is through the practice of publishing results of research to set limitations and help with protect the victim’s personal privacy (Hargreaves, 2020). The second ethical dilemma for a digital forensic practitioner is the mislabeling of professional credentials. Misrepresentations which include educational degrees, licensures, or certifications can be a huge ethical issue of dishonesty to the workplace. This is usually the case to impress clients, judge, or jury to avoid challenges. One way to avoid this type of ethical dishonesty is to do a thorough background check of the professional before admitting them into the company as a new hire (Yadav, 2017). The Google Home Voice Controller is an IoT device created for users to enjoy certain features and entertainment like media, alarms, and lights with just by the sound of their voice. This device is made for the comfort of the user and adds extra help for the disabled by allowing such a simple command of their own voice to accomplish tasks. The Amazon Dash Button is a device that ensures that the user doesn’t lack specific household items like soft drinks,
3 groceries, and personal care items. This device allows the user to order products quickly for the convenience of the user. The August Doorbell Cam is a very effective IoT device. This allows the user to answer the door from anywhere while also constantly checking the doors as well as capturing motion changes at the doorstep. This device is created to allow the user to let their guests inside very easily while also recording through a camera for added safety. The Google Home Voice Controller could contain valuable data for an investigation if the suspects or victim uses this device. The little bits of information stored on this device which includes the specific temperature the user likes, what time the users wake up every morning, and the specific media that the user is connected to are small but detailed bits of evidence that could be included in this device. All the data stored on this IoT device is encrypted and practices keeping personal data within the application or the device itself to help protect privacy, however, installing third-party apps may allow for risk of malicious apps that is being installed that can steal sensitive and personal information (Kelly, 2019). The Amazon Dash Button device can be useful evidence with the stored data in the device which includes the specific shopping carts made by the user. This will give the investigators an idea on what the user could be purchasing and why. All the data in this device is only stored within this device but can be acquired if the user have access to the personal login information (Newman, 2016). The August Doorbell Cam is valuable during an investigation due to the surprising amount of data that is stored in this device. Just like most IoT devices, the doorbell cam contains a lot of personal information including phone number, email address, postal address, and IP address. These are good enough evidence for the investigator to gather (Security.org, 2022).
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help