CC7179 Digital Forensics Assignment

Assignment Help Computer Network Security
Reference no: EM132744091 , Length: word count:2500

CC7179 Digital Forensics - London Metropolitan University

Corporate Exfiltration - Case Background

M57.biz is a hip web start-up developing a body art catalogue. The facts of the company are as follows.
• $3M in seed funding; now closing $10M round
• 2 founder/owners
• 10 employees hired first year
Current staff members:
• President: Alison Smith
• CFO: Jean
• Programmers: Bob, Carole, David, Emmy
• Marketing: Gina, Harris
• BizDev: Indy
Programmers:
• Work out of their houses
• Daily online chat session; Weekly in-person meetings office park
Marketing &BizDev:
• Work out of hotel rooms or Starbucks (mostly on the road)
• In-person meetings once every two weeks.
Most documents are exchanged by emails.
A spreadsheet containing confidential information was posted as an attachment in the "technical support" forum of a competitor's website. The spreadsheet came from CFO Jean's computer. You are given a copy of the spreadsheet, "m57plan.xls". This case study is mainly to look into how the documents got on the competitor's website.
Before the computer forensics started, brief interviews were conducted and the summaries of the interviews are shown below.
Alison (President):
• I don't know what Jean is talking about.
• I never asked Jean for the spreadsheet.
• I never received the spreadsheet by email.
Jean (CFO):
• Alison asked me to prepare the spreadsheet as part of new funding round.
• Alison asked me to send the spreadsheet to her by email.
• That's all I know.
In this case study, you have access to the following:
• The mirror image of Jean's computer hard drive: nps-2008-jean.E01
• A copy of the spreadsheet concerned:
• Full FTK version (the world leading digital forensic and investigation toolkit)
You are required to answer the following questions, supported by the evidence found from your investigation:
1. The used algorithm for verifying the image integrity and verification hash code of Jean's hard disk mirror image
2. Its hard disk geometry including bytes per sector and sector count
3. When did Jean create this spreadsheet?
4. How did the spreadsheet come out of her computer to the competitor's website?
5. Who else from the company is/are possibly involved?
6. additional computer misconduct and/or crimes committed by Jean

Required Submission
You are required to write an investigation report in PDF format. The length of the report could be extended up to 2500 words. In addition, your findings presented in the report must be properly interpreted, accompanied by supporting evidence, and/or linked to appendix/appendices to show the relevant evidence supporting your findings.

Attachment:- Digital Forensics.rar

Reference no: EM132744091

Questions Cloud

What statuses would you confer upon such groups : Freedom of speech, freedom of expression, and freedom of association are all values that we as Americans hold dear. Yet, we sometimes encounter ethical.
Explain how social responsibility also falls to individual : Explain how social responsibility also falls to the individual. Explain at least two ways CSR impacts Human Resources and two ways Human Resources impacts CSR.
What are key success factors of asian paints : What are key success factors of Asian Paints? I need this answer specifically for Competition & Strategy course in MBA.
Analyzing the organizational hierarchy : How would you go about analyzing the organizational hierarchy to decide which managerial positions should be cut first?
CC7179 Digital Forensics Assignment : CC7179 Digital Forensics Assignment Help and Solution, London Metropolitan University - Assessment Writing Service - used algorithm for verifying the image
Support or refute the claim that the ceo of the hospital : Support or refute the claim that the CEO of the hospital should pay the ransom to the cybercriminals responsible for this attack.
Explain approach to deal with crucial issue : Due to poor working conditions and unfair wages, your workers go on strike for a few days, resulting your company in a bad situation.
Heckscher-ohlin theory of factor proportions : "Heckscher-Ohlin Theory of Factor Proportions" is the theories in international trade and investment that best suit to South Africa.
What is the project NPV : Amazon is considering a new warehouse which will cost $115 million initially and another $75 million at the end of year 3. What is the project NPV

Reviews

len2744091

12/27/2020 9:49:33 PM

I want a description about the whole case study on the top and some screenshots for every questions and some matter describing the screenshots and all to be done in 2500 words.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd