Assignment - Create and Delete Files on USB Drive

Assignment Help Computer Network Security
Reference no: EM132487666

MN624 Digital Forensic Assignment - Melbourne Institute of Technology, Australia

Assignment Description - It is to note that this assignment consists of two parts a) Assignment 1a and b) Assignment 1b.

Assignment 1a: Leaving Clues to a Crime

In this Assignment 1a you will create a pretended crime scenario that needs computer forensic analysis. Along with the crime scenario, create digital clues that may be left on a small portable storage device.

IMPORTANT: Any names of persons or organizations in the crime scenario should be pretended; DO NOT use the names of real people or businesses. Also, DO NOT develop a crime scenario involving child pornography or anything that can be interpreted as a threat to the public. Acceptable topics include theft, embezzlement, kidnapping a fictitious character, the murder of a fictitious character, etc.

Questions - The chosen crime scenario must be discussed according to the following questions:

Q1) You will leave your digital "clues" on a flash/thumb drive. Provide your thumb drive (containing your digital clues) for analysis as an image by using software such as ProDiscover.

Include this screenshot in your final report!

Your digital clues must include at least one of each of the following:

- Hidden file

- Deleted file

- Graphic file

- Password-protected file

- Web access (browser history)

- Change extension of one file such as .docs to .pdf

Q2) Discuss what should you consider when determining which data acquisition method to use.

Q3) Discuss some options that can be used for preserving the data in this situation

Q4) Explain two acquisition methods that you should use in this situation.

Assignment 1b: Create and Delete Files on USB Drive

In this Assignment 1b, you need to find any evidence of the Assignment 1a, and any data that might have been generated from the suspect's hard drive, so that, it may be presented in a court of law. To create your digital clues, please do the following task:

1. On your USB drive, create a word file named your Student ID, where the blank should be filled with your name, mobile, citizen, address and some other information.

The file should contain the following sentence: "I have enrolled for MN624 Digital Forensic." The first blank in the sentence should be filled in with your Full name and the second blank with the date when you registered for this unit.

2. On the same drive, create an excel file named "StudentID.xls", where the First column should be filled with your units name that you had at MIT last semester and the second column should be filled with your marks with those units.

3. Store your current Photo on a USB drive and save it in JPG format or other images format.

4. Take a screenshot of your Windows Explorer window showing the content of the USB's folder hosting the three files.

Include this screenshot in your final report! Now delete those files, and then take another screenshot of the respective folder's content (after the two files have been deleted). Include this screenshot in your final report.

Table 1: Digital forensics Tools (You can choose any two tools for your demonstration with your tutor's consent)

Serial #

Name of the security tool

1

The Sleuth Kit (Autopsy)

2

FTK Imager

3

X-Ways Forensics

4

CAINE (Computer Aided Investigative Environment)

5

SANS Investigative Forensic Toolkit (SIFT)

Table 1

Q1) Use two computer forensics tool from table 1 to Acquire an Image of USB Drive. In the report, you need to include the screenshots of each step.

Q2) Use two computer forensics tool from table 1 to Recover Deleted Images and to verify which files have changed of extension. In the report, you need to include the screenshots of each step.

Q3) validate your results by using hash algorithms.

Q4) Comparison of the digital forensics tools that you used in this work. Your comparison could include:

- Digital forensics features

- Time is taken to detect acquire threat

- Ease of usage

Q5) Demonstration of the two digital forensics tools that you used in this work on week 7.

Reference no: EM132487666

Questions Cloud

Prepare in good form a multiple-step income statement : Prepare in good form a multiple-step income statement for the year 2019. Assume a 20 percent tax rate and that 50,000 shares of common stock
Speculate on what changes you think will occur in census : Speculate on what changes you think will occur in census racial categories over the next fifty years, keeping in mind that census categories always reflect
Do you think people who resist using online social networks : Do you think people who resist using online social networks such as Facebook and Twitter are an unusual minority in this country. Support your position
Provisions of the patient protection and affordable care act : What Three provisions of the Patient Protection and Affordable Care Act that are of particular interest to people living with mental disability
Assignment - Create and Delete Files on USB Drive : Create and Delete Files on USB Drive. Comparison of the digital forensics tools that you used in this work. Demonstration of two digital forensics tools
Perpetuate social inequality from a conflict perspective : How does education makes and perpetuate social inequality from a conflict perspective? Support answer with examples.
Create an organizational chart : Create an Organizational Chart outlining the functional areas of business including, but not limited to: Accounting/Finance, Information Technology
How deviance plays a role in everyday life and apply : Discus how deviance plays a role in everyday life and apply the various theories to your thoughts. Can deviance be good?
Explanation for the social fact : Why suicides happen, particularly in prosperous and healthy societies, has puzzled social scientists for decades. Listen to the Freakonomics podcast found

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe situation that can cause breach of network security

Bolstering Network Security by Using Group Policy and Configuring GPO Security Settings. Determine one situation that can cause a breach of network security.

  Outline security threats and vulnerabilities

Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. The topc and title is security threats and vulnerabilities

  Design technical solution to reduce security vulnerabilities

Design a technical solution to reduce security vulnerabilities. Align the legal and regulatory frameworks. Develop a workforce with the skills to handle IoT.

  Wireless security assessment

How does this toolkit differ from that you would use for an application security assessment, wireless security assessment. You can list other types of related assessments if you know if how you might adjust for the given scenario.

  How should webb protect access to these services

Assessment - Security Management and Migration. How should Webb's protect access to these services that they are now moving to the Cloud

  Discuss about the network architecture and security

Publications from the Strayer Learning Resource Center are also available. Additional resources should be used when necessary. Write a twelve to eighteen (12-18) page Security Administrator's handbook including policies tailored to your work envir..

  Determine the routing table of the de-vice

Determine the routing table of the de-vice/interface with an IP address of 194.66.79.2. You might want to take a look at slide 68 of Chapter 5 notes.

  Explain the principles of communication in networks

ITECH1102 Networking and Security Content Analysis Assignment, Federation University Australia. Explain the principles of communication in networks

  Why do modern encryption algorithms use keys?

Why do modern encryption algorithms use keys?

  Discuss the hash functions and message authentication

Stallings states, "...perhaps the most versatile cryptographic algorithm is the cryptographic hash function."

  Expose the computers to virus and worms

Some hackers even try to expose the computers to virus and worms. Moreover these persons sometimes specially design worms to distribute in peer-to-peer networks only.

  Identity and access management in cloud computing

Prepare a paper on Identity and Access Management in Cloud Computing - Need assistance with completing the Methodology along with writing the initial draft

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd