Create a pretended crime scenario

Assignment Help Computer Network Security
Reference no: EM132486772

MN624 Digital Forensic - Melbourne Institute of Technology

Assessment - Validating and testing digital forensics tools and evidence

Learning Outcome 1: Record, administer and document digital forensics in social media.

Assignment 1a: Leaving Clues to a Crime

In this Assignment 1a you will create a pretended crime scenario that needs computer forensic analysis. Along with the crime scenario, create digital clues that may be left on a small portable storage device.

The chosen crime scenario must be discussed according to the following questions:

Question 1) You will leave your digital "clues" on a flash/thumb drive. Provide your thumb drive (containing your digital clues) for analysis as an image by using software such as ProDiscover.
Include this screenshot in your final report!

Your digital clues must include at least one of each of the following:

- Hidden file
- Deleted file
- Graphic file
- Password-protected file
- Web access (browser history)
- Change extension of one file such as .docs to .pdf

Question 2) Discuss what should you consider when determining which data acquisition method to use.

Question  3) Discuss some options that can be used for preserving the data in this situation

Question 4) Explain two acquisition methods that you should use in this situation.

Assignment 1b: Create and Delete Files on USB Drive

In this Assignment 1b, you need to find any evidence of the Assignment 1a, and any data that might have been generated from the suspect's hard drive, so that, it may be presented in a court of law. To create your digital clues, please do the following task:

Part 1. On your USB drive, create a word file named your Student ID, where the blank should be filled with your name, mobile, citizen, address and some other information.
The file should contain the following sentence: "I have enrolled for MN624 Digital Forensic." The first blank in the sentence should be filled in with your Full name and the second blank with the date when you registered for this unit.

Part 2. On the same drive, create an excel file named "StudentID.xls", where the First column should be filled with your units name that you had at MIT last semester and the second column should be filled with your marks with those units.

Part 3. Store your current Photo on a USB drive and save it in JPG format or other images format.

Part 4. Take a screenshot of your Windows Explorer window showing the content of the USB's folder hosting the three files. Include this screenshot in your final report! Now delete those files, and then take another screenshot of the respective folder's content (after the two files have been deleted). Include this screenshot in your final report.

Table 1: Digital forensics Tools (You can choose any two tools for your demonstration with your tutor's consent)

Serial #

Name of the security tool

1

The Sleuth Kit (Autopsy)

2

FTK Imager

3

X-Ways Forensics

4

CAINE (Computer Aided Investigative Environment)

5

SANS Investigative Forensic Toolkit (SIFT)

Question 1) Use two computer forensics tool from table 1 to Acquire an Image of USB Drive. In the report, you need to include the screenshots of each step.
Question 2) Use two computer forensics tool from table 1 to Recover Deleted Images and to verify which files have changed of extension. In the report, you need to include the screenshots of each step.
Question 3) validate your results by using hash algorithms.

Question 4) Comparison of the digital forensics tools that you used in this work. Your comparison could include:
- Digital forensics features
- Time is taken to detect acquire threat
- Ease of usage
Question 5) Demonstration of the two digital forensics tools that you used in this work on week 7.

Attachment:- Digital Forensic.rar

Reference no: EM132486772

Questions Cloud

Determine how wasteful are habits : Determine How wasteful are your habits? Consider ISWM best practices-waste prevention, recycling and composting, and disposal.
What is genotype and phenotype ratio : What is genotype and phenotype ratio with prediction of the offspring
Comparison of the digital forensics tools : Comparison of the digital forensics tools that you used in this work and Demonstration of the two digital forensics tools that you used in this work on week 7
Determine and evaluate a green building : Evaluate a Green Building. Energy strategies such as lighting, system controls, transparent energy dashboards, metering, and others
Create a pretended crime scenario : Validating and testing digital forensics tools and evidence and administer and document digital forensics in social media - create a pretended crime scenario
Heterozygous for pigment expression : Predict the offspring of a heterozygous black lab and a chocolate lab that are both heterozygous for pigment expression.
How dose-response data are utilized for risk assessment : Describe one current event (within the last six to eight months) that exemplified the relationship between toxicology and environmental safety and health
Show the genotype of the parents in the cross : Show the genotype of the parents in the cross, punnett square and the phenotype ratio.
Validating and testing digital forensics tools and evidence : Validating and testing digital forensics tools and evidence - create a pretended crime scenario that needs computer forensic analysis

Reviews

Write a Review

Computer Network Security Questions & Answers

  List some of the public concerns including privacy

List some of the public concerns (including privacy) regarding biometric authentication and critically evaluate the validity of each. You may offer personal examples if you wish.

  Describe situations where end-to-end encryption combined

Give some examples where traffic analysis could jeopardize security. Describe situations where end-to-end encryption combined with link encryption would still allow enough traffic analysis to be dangerous. about 150 words with references

  Calculate the total gross pay for each employee.

Calculate the total Gross Pay for each employee. Keep in mind that employees are paid time and a half for all over-time hours. Here is an example formula that demonstrates how you would make such a calculation: =b4*d4+b4*c4*1.5 These must be formu..

  Evaluate the extent to which ddos attacks are avoidable

Evaluate the extent to which DDoS attacks are avoidable or inevitable when using the TCP/IP protocol suite.

  Ssl for http traffic

SSL Record protocol of the SSL protocol stack, RADIUS, networks for access control, DNS poisoning, Spear Phishing attacks, centralised or decentralised access control, encrypt email data

  Social media manager for a vendor management consultancy

Question: What is the problem? What are the main events? Question: Who are the participants and the decision makers influencing the outcome?

  Analyze the precise cyber-security laws

Analyze the precise cyber-security laws, private and public laws, state statutes, criminal and civil laws, and ethical guidelines that are pertinent

  How does the design meet the high availability requirement

How does the design meet the high availability requirement? Analyze the existing security situation in the organization. Identify the predominant electronic and physical threats to communications networks.

  Explain the organizational authentication technology

Identify and describe the organizational authentication technology and network security issues and make a list of access points internal and external (remote) and design a secure authentication technology and network security for GFI.

  What descriptive labels might apply to this type of threat

What descriptive labels might apply to this type of threat/incident? What sort of people would go after this information? Why would they want it

  Describe a malware attack that causes the victim

Describe a malware attack that causes the victim to receive physical advertisement and describe how to modify a NAT router to prevent packets with spoofed IP addresses from exiting a private network.

  Cyber Security and Ethical Hacking Assignment

Cyber Security and Ethical Hacking Assignment Help and Solution – Assessment Writing Service - Describe and critically evaluate any cyber vulnerabilities.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd