Computer forensic analysis - create pretended crime scenario

Assignment Help Computer Networking
Reference no: EM132487554 , Length: word count:2000

MN624 Digital Forensic - Melbourne Institute of Technology

Assessment - Validating and testing digital forensics tools and evidence

Learning Outcome 1: Record, administer and document digital forensics in social media.

Assignment 1a: Leaving Clues to a Crime

In this Assignment 1a you will create a pretended crime scenario that needs computer forensic analysis. Along with the crime scenario, create digital clues that may be left on a small portable storage device.

The chosen crime scenario must be discussed according to the following questions:

Question 1) You will leave your digital "clues" on a flash/thumb drive. Provide your thumb drive (containing your digital clues) for analysis as an image by using software such as ProDiscover.
Include this screenshot in your final report!

Your digital clues must include at least one of each of the following:

- Hidden file
- Deleted file
- Graphic file
- Password-protected file
- Web access (browser history)
- Change extension of one file such as .docs to .pdf

Question 2) Discuss what should you consider when determining which data acquisition method to use.

Question  3) Discuss some options that can be used for preserving the data in this situation

Question 4) Explain two acquisition methods that you should use in this situation.

Assignment 1b: Create and Delete Files on USB Drive

In this Assignment 1b, you need to find any evidence of the Assignment 1a, and any data that might have been generated from the suspect's hard drive, so that, it may be presented in a court of law. To create your digital clues, please do the following task:

Part 1. On your USB drive, create a word file named your Student ID, where the blank should be filled with your name, mobile, citizen, address and some other information.
The file should contain the following sentence: "I have enrolled for MN624 Digital Forensic." The first blank in the sentence should be filled in with your Full name and the second blank with the date when you registered for this unit.

Part 2. On the same drive, create an excel file named "StudentID.xls", where the First column should be filled with your units name that you had at MIT last semester and the second column should be filled with your marks with those units.

Part 3. Store your current Photo on a USB drive and save it in JPG format or other images format.

Part 4. Take a screenshot of your Windows Explorer window showing the content of the USB's folder hosting the three files. Include this screenshot in your final report! Now delete those files, and then take another screenshot of the respective folder's content (after the two files have been deleted). Include this screenshot in your final report.

Table 1: Digital forensics Tools (You can choose any two tools for your demonstration with your tutor's consent)

Serial #

Name of the security tool

1

The Sleuth Kit (Autopsy)

2

FTK Imager

3

X-Ways Forensics

4

CAINE (Computer Aided Investigative Environment)

5

SANS Investigative Forensic Toolkit (SIFT)

Question 1) Use two computer forensics tool from table 1 to Acquire an Image of USB Drive. In the report, you need to include the screenshots of each step.
Question 2) Use two computer forensics tool from table 1 to Recover Deleted Images and to verify which files have changed of extension. In the report, you need to include the screenshots of each step.
Question 3) validate your results by using hash algorithms.

Question 4) Comparison of the digital forensics tools that you used in this work. Your comparison could include:
- Digital forensics features
- Time is taken to detect acquire threat
- Ease of usage
Question 5) Demonstration of the two digital forensics tools that you used in this work on week 7.

Attachment:- Digital Forensic.rar

Reference no: EM132487554

Questions Cloud

What three areas will impact sports in the future : What three areas will impact sports in the future? What are some positive and negative aspects in the future of sport?
Determine the incremental profit of three joint products : Determine the incremental profit or loss that each of the three joint products. (Enter negative amounts using either a negative sign preceding the number)
Compute the break-even point in units : Compute the break-even point in units and sales dollars for the current year. Viejol Corporation has collected the following information after its first year
Create record for the old country company require at january : Record the above transactions, and any necessary adjusting entries for The Old Country Company required at January 31, 2022
Computer forensic analysis - create pretended crime scenario : Create a pretended crime scenario that needs computer forensic analysis. Along with the crime scenario, create digital clues that may be left
What is the difference in our everyday or natural : What is the difference in our everyday or "natural" way of thinking about the social world and the sociological way of thinking about the social world?
Compute the contribution margin for the current year : Compute the contribution margin for the current year and the projected year, and the fixed costs for the current year. (Assume that fixed costs)
Traits are shared by the somali migrants : Sociologist Louis Wirth remarked that minority groups share particular traits. According to this theory, which of the following traits are shared by the Somali
What is the NPV of the investment in the security : Investing in the security is as safe as depositing money in the bank account. What is the NPV of this investment in the security?

Reviews

Write a Review

Computer Networking Questions & Answers

  Why a vpn is the right solution for protecting the network

What are the main reasons why a VPN is the right solution for protecting the network perimeter? Do they also provide protection for mobile devices?

  What is the purpose of the mib

How is it possible for the command ping www.networkB.edu to find the destination without an IP address?

  Explain plan and design a lan/wan for citycampus

The faulty staff and students of CityCampus need the ability to communicate with each other via email and to access to internet. Plan and design a LAN/WAN for CityCampus based on the following considerations

  Briefly discuss how each capture filter works

Briefly discuss how each capture filter work. Capture all traffic from the other machine. Use either the IP or MAC address of the remote machine to identify it.

  Define the term packet what is packet switching how would

what is a packet? what is packet switching? how would you explain the concept of packet switching? what are the

  What is the maximum size of the send and receive windows

Using 5-bit sequence numbers, what is the maximum size of the send and receive windows for each of the following protocols?

  What is the goal of a vpn tunnel

Draw a sketch of the encapsulation of a VPN data packet. Show the IP source and destination address and the VPN tunnel source and destination address.

  What range of features is available in lan and wan switches

What range of features is available in LAN and WAN switches and routers? What devices are offered that don t clearly fall into the categories described?

  Who do you think should pay for the changes

Network Project Management - Who do you think should pay for the changes and what could have been done to make sure that the project scope was correct?

  Security in bluetooth and other mobile devices

Analyze the factors that business managers must consider when determining if wireless and mobile devices are appropriate in their business environment.

  Complete the ospf configuration part

What are the three statements required to complete the OSPF configuration part of the router assuming we are using process-ID 33 and Area 0?

  Explain how files on the network may be accessed by lsdg

Explain how files on the network may be accessed by LSDG. Explain how LSDG can securely share files within their group and other selected groups/users in the company.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd