Assignment - leaving clues to a crime

Assignment Help Computer Networking
Reference no: EM132496432 , Length: word count:1000

MN624 Digital Forensic Assignment - Melbourne Institute of Technology, Australia

Assessment Title - Validating and testing digital forensics tools and evidence

Purpose of the assessment (with ULO Mapping) - This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

b) Record, administer and document digital forensics in social media.

Assignment Description - Assignment - Leaving Clues to a Crime

In this Assignment you will create a pretended crime scenario that needs computer forensic analysis. Along with the crime scenario, create digital clues that may be left on a small portable storage device.

IMPORTANT: Any names of persons or organizations in the crime scenario should be pretended; DO NOT use the names of real people or businesses. Also, DO NOT develop a crime scenario involving child pornography or anything that can be interpreted as a threat to the public. Acceptable topics include theft, embezzlement, kidnapping a fictitious character, the murder of a fictitious character, etc.

The chosen crime scenario must be discussed according to the following questions:

Questions -

Q1) You will leave your digital "clues" on a flash/thumb drive. Provide your thumb drive (containing your digital clues) for analysis as an image by using software such as ProDiscover.

Include this screenshot in your final report!

Your digital clues must include at least one of each of the following:

- Hidden file

- Deleted file

- Graphic file

- Password-protected file

- Web access (browser history)

- Change extension of one file such as .docs to .pdf

Q2) Discuss what should you consider when determining which data acquisition method to use.

Q3) Discuss some options that can be used for preserving the data in this situation

Q4) Explain two acquisition methods that you should use in this situation.

Assignment 1b: Create and Delete Files on USB Drive

In this Assignment 1b, you need to find any evidence of the Assignment 1a, and any data that might have been generated from the suspect's hard drive, so that, it may be presented in a court of law. To create your digital clues, please do the following task:

1. On your USB drive, create a word file named your Student ID, where the blank should be filled with your name, mobile, citizen, address and some other information.

The file should contain the following sentence: "I have enrolled for MN624 Digital Forensic." The first blank in the sentence should be filled in with your Full name and the second blank with the date when you registered for this unit.

2. On the same drive, create an excel file named "StudentID.xls", where the First column should be filled with your units name that you had at MIT last semester and the second column should be filled with your marks with those units.

3. Store your current Photo on a USB drive and save it in JPG format or other images format.

4. Take a screenshot of your Windows Explorer window showing the content of the USB's folder hosting the three files.

Include this screenshot in your final report! Now delete those files, and then take another screenshot of the respective folder's content (after the two files have been deleted). Include this screenshot in your final report.

Table 1: Digital forensics Tools (You can choose any two tools for your demonstration with your tutor's consent)

 

Serial # Name of the security tool
1 The Sleuth Kit (Autopsy)
2 FTK Imager
3 X-Ways Forensics
4 CAINE (Computer Aided Investigative Environment)
5 SANS Investigative Forensic Toolkit (SIFT)

Table 1
Q1) Use two computer forensics tool from table 1 to Acquire an Image of USB Drive. In the report, you need to include the screenshots of each step.
Q2) Use two computer forensics tool from table 1 to Recover Deleted Images and to verify which files have changed of extension. In the report, you need to include the screenshots of each step.
Q3) validate your results by using hash algorithms.

Q4) Comparison of the digital forensics tools that you used in this work. Your comparison could include:
- Digital forensics features
- Time is taken to detect acquire threat
- Ease of usage

Q7) Demonstration of the two digital forensics tools that you used in this work on week 7.

Note - Word limit Max 2000 words.

Attachment:- Validating and testing digital forensics tools and evidence.rar

Reference no: EM132496432

Questions Cloud

Understanding about sounds and symbol systems : Describe 2-3 listening and speaking activities or strategies teachers could use to help students develop phonemic awareness
Should the board conclude to issue the preferred stock : To maximize the anticipated return to common over the next 4 years, should the board conclude to issue the preferred stock as cumulative or noncumulative?
Beliefs of most psychologists regarding intelligence : Which of the following statements BEST reflects the beliefs of most psychologists regarding intelligence?
Social theories of gender development : How do the biological and social theories of gender development differ?
Assignment - leaving clues to a crime : Assignment - Leaving Clues to a Crime - Record, administer and document digital forensics in social media - Discuss what should you consider when determining
What is the types of leasing arrangements : What is the impact of depreciation expense on the cash flow analysis of a capital project. What is the types of leasing arrangements and what is their pros
Understanding of death and dying : Describe your own understanding of death and dying and how you developed that understanding.
Impact a person symptoms in a positive manner : Describe how lifestyle choices and sociocultural, socioeconomic, and diversity factors might contribute to or cause disorders such as depression.
Prepare an income statement through gross profit for year : Prepare an income statement through gross profit for the year ended December 31, 2012. At the end of Rutherford Department Store's fiscal year on December

Reviews

len2496432

4/20/2020 4:42:40 AM

I attacthed the file, please look the submission guide lines. And they is two parts in assignment 1a and 1b please have a look into it. And do the two parts separately 1a and 1b

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd