Create a digital crime scene

Assignment Help Other Subject
Reference no: EM133289787

Coursework - Creating a Digital Crime Scene

PLEASE NOTE: This is not the final version, however the content here and the tasks requested of you will not change - therefore you can use this to start planning your coursework.

Abstract
The Red Coursework is an opportunity for you to work as an individual or in a small group (1-3 persons) to create a digital crime scene. You will create an evidence file (.E01) containing artefacts that need to be recovered and artefacts that have been explicitly hidden. You will provide a report detailing the design of your case, the legislation you analysed, and the artefacts that you have put into your case.

This specification should be read along with the lecture material on Data Hiding and Data Recovery. A simple report template is provided on Moodle to assist the completion of this assignment.

The Assignment
For this coursework you will:
• Provide a design, where you provide a narrative of the case and an analysis of relevant legislation to the case.
• You will create a suitable evidence file.
• You will provide a significant number of artefacts in your evidence file that need to be recovered by an analyst looking for evidence using techniques such as search terms, file carving or just looking through the gallery view in a forensic tool.
• You will provide a significant number of artefacts that have been specifically hidden. This could be as simple as flagging a document as ‘hidden' or could involving complex hiding, such as concealing passwords by splicing it into video footage.
• Each member of a group will reflect upon the challenges they had whilst doing this coursework.

Group Selection
The expectation is that this coursework can be completed by an individual. Therefore staff will not allocate you to groups, but you may work in a group of 1-3 people and the volume of work that must be done for a group is proportionally greater. You must not work with members of other groups and the detection of collusion with other groups carries a stringent penalty. We will fail students.
You must select an ‘Operation' from the Moodle page as this gives an initial case idea and highlights as a starter some legislation you may want to consider. You may add further offences to your case if you deem useful. For example, you have selected a hacking case but you may add further offences such as blackmail or indecency.

Case Design Requirements
The requirements of this coursework is that you will provide a detailed narrative of a case along with a critical analysis of the kind of legislation that is involved in such an investigation. You will highlight the points that would need to be proved to prosecute such a crime and detail in your report the artefacts that support, undermine or do not assist the prosecution of the case.
Timeline of the Case
• Narrative of the case
• Showing when key evidence was created in the timeline
• Details of the offenders, victims and witnesses (including equipment/devices)
Legislation (see lecture material for more detail)
• Points to prove
• What the case can prove
• What the case will not prove
• Highlight any artefacts that undermine the prosecution's case.

Evidence Requirements
You will create a suitable evidence file that contains your digital crime scene. This should not just be a folder of artefacts, but rather is must be the image of some suitable file system, be it a memory card, USB stick, mobile phone, virtual disk or actual physical disk.
Create an Image file
• Ensure that there is no extraneous information in the case (e.g. we don't want to see other coursework, or personal pictures in the evidence file).
• In a suitable evidence file format - ideally a compressed E01 file.
• Hash value of the evidence file is included - screenshot from a forensic tool to verify this is correct
• The evidence file(s) uploaded to a suitable location to be downloaded and verified

Artefact Requirements
Previously we have asked students doing this coursework to provide easy, medium and hard artefacts, however this causes problems for both the students and the assessors working out if what they are doing is easy or hard. Therefore we want you to provide Data Recovery (DR) artefacts, and Data Hiding (DH) artefacts. A list of the DR and DH categories are listed below, and see the lecture notes for more detailed examples.
Obviously some of these methods are harder than others, e.g. DR Contents of a file - cat pictures (easy) , versus DR Contents of File System - Deleted cat pictures (medium) or cat pictures in unallocated (hard). Therefore we are requiring you to provide at least one example of every kind of data recovery and data hiding. Yes you can pass without doing all the harder kinds of DR or DH, however the marking scheme reflects the effort required to do these harder artefacts.
Number of artefacts you have to supply: 4 of your choosing + (1 of every type of DR and DH category x every member of the group).
E.g. A group of 2 people will provide 20 artefacts (4 of their choice + 2 x Contents of files, 2 x Contents of applications, 2 x Contents of Operating System Data Structures, 2 x Contents of File System, and Data hiding in 2x User area, 2 x Applications, 2 x Operating System, 2 x File System).

For each artefact you will provide:
• A screenshot of the artefact itself
• A screenshot of the artefact within the evidence file (the meta-data, the data structure it comes from, showing us the data within unallocated clusters etc.)
• A description of the implications of the artefact. Does it support or undermine a prosecution case? Does it prove a point, either by itself or in combination with any other artefacts?
• For the Data Hiding artefacts, a description of how to unhide the artefact
• All passwords used MUST be supplied (for example of a post-it note) or hidden within the evidence somewhere.

Supporting Files/Software Requirement
The software, files or links to online software that are needed to unhide (and have been used to hide) artefacts have to be included within an evidence file. This may be within some kind of software backup folder, or it may be more subtly insinuated into the case. This will be documented by screenshots in the report.
Where there are artefacts that are hints or clues needed to unhide data such as post-it notes or otherwise aide memoire that may have been found at the crime scene, although they might not be evidence or points to prove themselves, these files, pictures or whatever are evidenced with screenshots.

Supporting Files:
• Screenshots of the location within your casefile of the software, files or links to supporting material needed to unhide the DH artefacts.
• Hints or clues need to unhide artefacts, even though they may not be evidence themselves, are to be included.

Personal Reflection Requirements
We require each person in the group to provide a personal reflection where you highlight the things you brought to the group work, what was particularly enjoyable, what was particularly challenging and any technical difficulties (if you were able to get around them or if you couldn't during this assignment).
Each person will:
• Highlight their strengths/major contributions to the group
• What they found enjoyable
• What was challenging
• Technical challenges and outcomes

Attachment:- Creating a Digital Crime Scene.rar

Reference no: EM133289787

Questions Cloud

Research paper on what causes war : Complete a research paper on What causes "War". A good research paper has three core elements.
Explain his experiences with his family : Explain his experiences with his family, and the ways that they influenced him, his experiences, and his views of masculinity.
Highlight how problem of poor communication : Highlight how the problem of Poor Communication within families effects the each family member and the society as a whole.
Reading essay on a poem-dolce et decorum est : I have an assignment to develop a close reading essay on a poem of my choice. I am choosing "Dolce Et Decorum Est".
Create a digital crime scene : Create a digital crime scene. You will create an evidence file (.E01) containing artefacts that need to be recovered and artefacts that have been explicitly
Compensation plans usually include variety of benefits : Compensation plans usually include a variety of benefits.
Applying symbolic interactionism theoretical approach : Analyze the differences between the micro, meso, and macro levels by applying Symbolic Interactionism theoretical approach.
Marx theory of social revolution : Consider Marx's theory of social revolution. Which of the following best explains why workers do not overthrow their masters
Herbert mead and reading from mind-self and society : George Herbert Mead and reading from Mind, Self, and Society (1934) consider the types of gestures that the average person partakes in on a daily basis.

Reviews

len3289787

12/5/2022 11:35:59 PM

coursework. Requires you to analyse legislation, create a suitable case and timeline, and create a Digital Forensics crime scene containing a variety of artefacts that need to be recovered. Essentially you will be creating the kind of case which we give to the second year students (and often do use your cases with them). This is the required operation Operation Waterloo: Child Protection (1978 c. 37, s1), Indecent Photographs of Children - Distribution of Cats photos to a group of people who are first-hand makers of the pictures tools you may use Hash My Files HxD Setup file FTKi (useful for live acquisition)File Registry AnalysisFile I only require 4 data hiding tech nique artefacts 4 data recovery and 4 of your choice any questions ask

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd