Analyse data on storage media and various file systems

Assignment Help Other Subject
Reference no: EM132997746

Assessment item - Task and Forensics Report

TASK

Task 1: Recovering scrambled bits

Thia task helps you to test your skills in encryption and decryption of some data that you may encounter in the field of digital forensics. For this task I will upload a text file with scrambled bits on the suject interact2 site closer to the assignment due date. You will need to use some DFT (digital forensics tool) to recover the scrambled bits. First, decide what DFT will be suitable for this task and then start your process. Please note you may need to do few iterations and some trial and test to get the goal. Your bit recovery process will be step by step which means you may not see the whole receovered bits just after one step, you may need to use several steps to recover all bits in the given file. You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment.

Describe the process used in restoring the scrambled bits and insert plain text in the assignment.

Task 2: Digital Forensics Report

In this major task you are asked to prepare a digital forensic report for the following scenario after carefully reading the scenario and looking at textbook figures as referred below:

In addition, you are also to comment on the ethical issues / implications that may arise during your investigation. See further explanation of this in the deliverables below.

You are working in a Digital Forensic Investigation company, ABC Forensics (you can come up with your own company name if you are not fan of this name) and investigating a possible intellectual property theft by a new employee of Superior Bicycles, Inc. This employee, Tom Johnson, is the cousin of Jim Shu, an employee who had been terminated. Bob Aspen is an external contractor and investor who gets a strange e-mail from Terry Sadler about Jim Shu's new project (shown in Figure 8-5 of the textbook on p. 350). Bob forwards the e-mail to Chris Robinson (the president of Superior Bicycles) to inquire about any special projects that might need capital investments. Chris forwards the e-mail to the general counsel, Ralph Benson, asking him to look into it. He also forwards it to Bob Swartz, asking him to have IT look for any e-mails with attachments. After a little investigation, Bob Swartz forwards an e-mail IT found to Chris Robinson (shown in Figure 8-6 of the textbook on p. 350).

Chris also found a USB drive on the desk Tom Johnson was assigned to. Your task is to search for and determine whether the drive contains any proprietary Superior Bicycles, Inc. data in the form of any digital photograph and/or in any other form such as emails, text, spreadsheets etc as an evidence. In particular, you may look for graphic files such as JPEG on the USB drive

hidden with different format. But during the investigation you also look for other type of data as mentioned above. As a digital forensic specialist, you do not pre-assume that you will (or will not) find what you are looking for. However, you need to make sure that you conduct comprehensive investigation before reaching to any conclusions.

Note for the USB drive image, you need to download the "C08InChp.exe" file from the download section of Chapter 8 on the student companion site of the textbook (Nelson, Phillips, & Steuart, 6/e, 2019).

In order to conduct a thorough investigation, search all possible places where you think that data might be hidden (e.g. in e-mails and USB drive) and recover and present any digital evidence in the report. You may find that some of the files that you found cannot be opened properly or may be damaged or may be made corrupt intentionally, mention such files in your report. You may look at how to repair these files (hint: look at files headers). If you repair a file, mention your report that you have done so usinga specific DFT. You do not need to write the whole repairing process if it is too long. If your current free version of the DFT cannot save large size files, you may consider searching and using other similar DFT that can save the larger size files. Assume that your company does not have the budget to purchase another DFT for this purpose, so you have to go with the free version.

You should also be asking this question while doing investigation, are there any evidence other than images in this case (although you have been specifically asked to look for images)?

For this forensic examination, you need to provide a report of approximately 10-12 pages (this is not a hard page limit, take it as a guideline) in the format described in presentation section below. Your report must include screen shots of your work and any images that you may have found during the investigation. Make sure that each screen shot has proper label, e.g. something like Figure 1: Screen shot of opening USB file. etc. You also provide a breif (one or two sentence) description of that screen shot or the image that you inserted in your report.
This may increase the number of pages of your report, which is acceptable. But make sure, if this is the case, you only include the screen shots which you think are necessary for the report.

In the findings section of your report, please comment on the ethical issues / implications that you may encounter during your investigation. Your comments should be clear, concise and to the point to articulate all the ethical issues and consequences related to the investigation.

Learning outcome/s:

• be able to determine and explain the legal and ethical considerations for investigating and prosecuting digital crimes.
• be able to formulate a digital forensics process.
• be able to evaluate the technology in digital forensics to detect, prevent and recover from digital crimes.
• be able to analyse data on storage media and various file systems.
• be able to collect electronic evidence without compromising the original data.
• be able to evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab.
• be able to critique and compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation.
• be able to prepare and defend reports on the results of an investigation.

Attachment:- Task and Forensics Report.rar

Reference no: EM132997746

Questions Cloud

What are the reasons for drug prices being so high : What are the reasons for drug prices being so high in the United States as compared to other advanced nations globally?
Prepare the installment table for the five months : On July 1, 2020, Koinadugu Corporation incurs a 30-year, $585,000 mortgage liability upon purchaseof a warehouse. Prepare the Installment table for the five mon
Theoretical review of relevant literature and application : Employees' social media and how it can impact their job - Research is a theoretical review of relevant literature and application of findings in the literature
Theoretical review of relevant literature and application : Employees' social media and how it can impact their job - Research is a theoretical review of relevant literature and application of findings in the literature
Analyse data on storage media and various file systems : Evaluate the technology in digital forensics to detect, prevent and recover from digital crimes and analyse data on storage media and various file systems
ES969-10 Quality Reliability and Maintenance Assignment : ES969-10 Quality Reliability and Maintenance Assignment Help and Solution, University of Warwick - Assessment Writing Service
Which do you think is more influential : Which do you think is more influential? and why? Also discuss why these are important for risk management.
Define market segmentation and provide an example : 2) Define target market and provide an example of the target market for a specific business. For example, who would be the target market for H & M or Bass Pro S
What was the cause of the metrolink accident : What was the cause of the Metrolink accident and could it have been avoided?

Reviews

Write a Review

Other Subject Questions & Answers

  Describing the overall intent of the ppaca

This assignment involves an analysis of articles regarding a significant provision within the Patient Protection and Affordable Care Act.

  Explain polar is liable for the damages caused by warren

Explain whether Polar is liable for the damages caused by Warren. Include a full discussion of the factors that may be important in this determination

  What are the three key components of logistics

What are the three key components of logistics? What are the basic aspects of logistics, the supply chain, and the flow process?

  Examine an environmental issue

Your goal for this assignment is to apply an ethical theory to a real-world situation. You will examine an environmental issue and apply one of the ethical theories to understand how human interactions with the natural environment raise ethical co..

  Explain your interpretation of what occurred in the dialogue

Explain your interpretation of what occurred in the dialogue, including social work practice theories, and explain how it might relate to diversity or cultural.

  Identify and describe each of your selected foundations

Identify and describe each of your selected foundations, including as much information as you can gather from the Grantsmanship site and the foundation website

  Racial- and ethnic-minority and low-income

Analyze three factors that cause many racial- and ethnic-minority and low-income students to be identified as gifted underachievers. Explain your rationale for choosing these factors.

  List five common barriers to active listening

List five common barriers to Active Listening and describe the four steps discussed in class for being or becoming a more Active Listener.

  Differences between simulation models and models covered

Describe the key differences between simulation models and the models covered in previous modules, not only from the perspective of their applications, but also from the perspective of computing/solving the models.

  Understanding of the functioning brain

Use your understanding of the functioning brain to account for Theresa's strange pattern of experience.

  How could you explain the behavior of mary fiance

When your family gathers for Thanksgiving, your cousin Mary brings her new fiancé; it's the first time he's met the whole family, and his behavior is a little strained: How could you explain the behavior of Mary's fiancé using situational attribut..

  How does hawthorne express skepticism about the puritans

How might it be argued that Martin Luther inadvertently brought about the "rise of the individual" in Western culture?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd