BN309 Computer Forensics Assignment

Assignment Help Computer Engineering
Reference no: EM132648862

BN309 Computer Forensics - Melbourne Institute of Technology

Assessment - Validating and Testing Computer Forensics Tools and Evidence

Learning Outcome 1: Systematically collect evidence at private-sector incident scenes.
Learning Outcome 2: Document evidence and report on computer forensics findings.
Learning Outcome 3:
Implement a number of methodologies for validating and testing computer forensics tools and evidence
Learning Outcome 4: Understand the cross-examination of a legal process

Assignment Questions:

Objective:

The objectives of this assignment are to gain theoretical and practical knowledge and skills in different computer forensics and anti-forensics techniques such as image acquiring and data hiding. The students should apply appropriate computer forensics tools and techniques, and write a report on their findings. Marks will be awarded based on the sophistication and in-depth exploration of the selected techniques.

Case Study:
You are investigating a murder case related to drug dealing. You have acquired the USB drive from the crime scene.

Assignment Specification:

Prepare a report and video demonstration on the following sections related to the case study. You can use your own files for data hiding and analysis. Provide the list of references using IEEE referencing style at the end of the report.

Section 1: Data hiding in graphic file

Do an Internet search to list five of steganography tools. Choose one of the steganography tools to hide data in an image file. Explain each step with the help of screenshots for the tool you used. (250 words)

Section 2: Digital forensic analysis and validation

The computer drive under investigation contains several password-protected files and other files with headers that do not match the extensions. Write a report describing the procedures to retrieve the evidence with your selected forensics tools. Explain how to identify the file headers and determine how their extensions are mismatched. Then discuss what techniques and tools you can use for recovering passwords from the protected files. (500 words)

Section 3: Anti-forensics

Research on anti-forensics techniques and write a report on your findings on these techniques. Compare the pros and cons of these techniques in different contexts. Use one of the anti-forensic technique on your files and explain how useful it is. Please explain your methods with the help of screenshots. (750 words)

Demonstration:

Demonstrate your work. You should appear in the video (You Tube or similar) at the first and last 30 secs to introduce yourself and draw a conclusion on your experience with the different computer forensics and anti-forensics techniques.

Attachment:- Computer Forensics.rar

Reference no: EM132648862

Questions Cloud

Analysis of shifts in demand for shoes : Haleigh omits the variable of housing construction in her analysis of shifts in demand for shoes. What is this an example of?
Calculate nanotech break-even point in sales dollars : Calculate NanoTech break-even point in sales dollars for the upcoming year assuming independent sales agents' commission rate remains unchanged at 18%.
What is the equation of the demand curve : Consider a competitive market with the following equations of demand (D) and supply (S). D0: P = 60 - ½Qd S0: P = 20 + ½Qs
What is involved with deriving demand : What is involved with deriving demand? We differentiate utility twice; the cross partial gives the demand curve
BN309 Computer Forensics Assignment : BN309 Computer Forensics Assignment Help and Solution, Melbourne Institute of Technology - Assessment Writing Service - Understand the cross-examination
Where did we go wrong with our diets : Write a response to the following questions. Your must write at least 500 words, but you can write more if you wish. Make sure your response is grammatically.
What is the short-run market supply curve : Suppose that a market for electric bikes is comprised of 80 individual firms. The firms all have the same cost function: C(q) = 100 + 4q2
Identifying the methods to address the social problem : Working with your field instructor, identify a social problem that is common among the organization (or its clients) and research current policies.
Ricardian model of specialization and trade : Suppose you and a friend are studying the Ricardian Model of Specialization and Trade with two countries, two goods

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd