Create a table of contents for the investigative plan

Assignment Help Case Study
Reference no: EM131060580 , Length: word count:3000

Assessment item - Case study

Enabling objectives

1. Apply the digital forensics methodologies.

2. Write an analysis of a case study.

3. Prepare an outline of a professional digital forensic plan.

The Case - A Digital Forensic Investigation Plan

Summary:

Building Finance Pty Ltd is a leading consumer finance company in Australia. Building Finance employs more than 1,000 employees and the company serves more than 3 million customers in Australia. The company offers a range of services including personal loans, car loans, credit cards, personal insurance, and interest-free retail finance.

Building Finance has invested heavily in information technology for supporting its business operations and achieving competitive advantages over its competitors. Major investments were made by the company in the early 2000s but management has lost focus in updating the networks and application infrastructure that supports the business operation in recent years. The network environment between all of Building Finance offices is flat and relatively unrestricted. Users from one office can access systems and servers from another office. Workstations and servers are typically Microsoft Windows-based. Firewalls and network segmentation are implemented poorly throughout the environment. Intrusion detection and logging exist on systems but they are not effectively used.
Last night, a team leader from Brisbane office has contacted the Information Security Office urgently at Building Finance head office with some concerns regarding the office computer system. He suspects that someone has compromised a few computers in the office building including his computer.

He noted that a few new features of finance management software have been introduced to the computer system. In addition, several files containing customer personal information have been modified from some of the office computers.

Information security and specifically investigative and forensic capabilities are housed at the head office in Sydney and are responsible for issues at all offices. The Information Security Office takes this suspicion seriously. A team of auditors is formed to investigate this suspicion at the Brisbane office. Apart from reviewing paper based company documents, the auditing team is tasked to undertake digital forensic analysis of the computer systems at the Brisbane office. This involves gathering digital evidence from relevant desktop PC's and e-mail accounts. Some examples of the type of files that may be collected include MS - Word documents, spreadsheets, MS-Outlook and deleted files.

Requirements:

As part of the auditing team in capacity of a Digital Forensics expert, your task is to prepare digital forensics investigative plan to enable a systematic collection of evidence and subsequent forensic analysis of the electronic and digital data. Assuming all systems are Windows based, this plan should detail following:

• justify why use of the digital forensic methodology and approach is warranted including appropriate procedures for corporate investigation.

• describe the resources required to conduct a digital forensic investigation, including skill sets and required tools of the team members.

• outline an approach for data/evidence identification and acquisition that would occur in order to prepare the auditors for review of the digital evidence.

• outline an approach and steps to be taken during the analysis phase making the assumption the computer system is a Microsoft Windows-based computer.

• develop relevant security policies for the company.

• provide recommendations to the company for dealing with the problem.

• create a table of contents for the investigative plan describing what the primary focus of the report would be.

Tips for preparing your digital forensics investigative plan

In writing the digital forensics investigative plan, students need to address following points. Do note that points listed below are not exhaustive and need to be considered as helpful tips.

• Justify a need for digital forensics methodology and consider scope of the case including nature of alleged misconduct leading to consideration of how electronic and digital evidence may support the investigation. The plan should consider how digital forensics differs from other techniques (such as network forensics, data recovery) and detail the overall steps for the systematic digital forensics approach.

• Consider the required resources and include details regarding preparation plan for evidence gathering (such as evidence forms, types, storage media and containers), forensics workstation and peripherals needed, software/tools for analysis depending on the type of evidence to be gathered including rationale for selected tools, and consideration of team member skills in digital analysis (such as OS knowledge, skills for interviewing, consultation, working as per the needs of the auditing team and understanding of law and corporate policies).

• Detail the approach for data acquisition including the different types of evidence that can be gathered and their source depending upon the nature of the case and scope of investigation, develop a plan for data acquisition including rationale for selected plan and contingency planning, detail type of data acquisition tools needed including rationale and an outline for the data validation & verification procedures.

• Provide an outline of the forensic analysis procedures/steps depending upon the nature of evidence to be collected, and detail the validation approach. This can include techniques to counter data hiding, recovering deleted files, procedures for network and e-mail analysis.

• Develop suitable security policies for the company.

• Provide appropriate recommendations to the company for dealing with the problem.

• Table of contents for the investigative plan should consider what to include in report, structure of report, focus or scope of the report including supporting material to be provided and references. This table of contents should include headings and sub-headings pertaining to the aspects addressed in the above dot points.

• Prepare a professional report with an Executive Summary, a Word generated table of contents, an Introduction, a body of report with proper headings and sub-headings, and a Conclusion.

This assignment is based on digital forencics. so you have given a case study. based on that case study you have to make a report on task is to prepare digital forensics investigative plan to enable a systematic collection of evidence and subsequent forensic analysis of the electronic and digital data. other requirements are given in the attached document. use proper forensic tools and highlight them because this subject is all about forensic tools. and plz follow the marking criteria and the requirements. use proper intex referencing and write introduction and summury and other things are mentioned in attached documents.

3000 words.

10 harvard reference.

Reference no: EM131060580

Questions Cloud

Fund the proposed equipment modernization program : Preparing Martin Manufacturing’s 2015 Pro Forma Financial Statements. To improve its competitive position, Martin Manufacturing is planning to implement a major equipment modernization program. Use the historical and projected financial data provided..
Expansion of biofuels might affect the market for corn : Do you agree with this claim? Incorporating what you know about demand and supply, how do you think expansion of biofuels might affect the market for corn?
Determine the minimum frame size : Suppose a CSMA/CD network is operating at 100Mbps, and suppose there are NO repeaters and the length of the cable is 1.0 km. Determine the minimum frame size if the signal propagation speed is 200 km/ms.
What you have learned about the lawsuit so far : Based on what you have learned about the lawsuit so far, are the numbers sufficient evidence to support a claim of discrimination?
Create a table of contents for the investigative plan : Describe the resources required to conduct a digital forensic investigation, including skill sets and required tools of the team members and create a table of contents for the investigative plan describing what the primary focus of the report would..
What is the average memory access time t_{m} : what is the average memory access time T_{m} ?
Summary of city information that the website provides : Summary of city information that the website provides that could be useful to (1) businesses generally, and/or (2) startup businesses.
What is the encryption of m=34 : What is theencryption of m=34?
Write an essay about mans voyage to mid-life- crisis : Write an essay about Man's Voyage to Mid-Life - Crisis?

Reviews

Write a Review

Case Study Questions & Answers

  What role does customer relationship management play

What role, if any, does customer relationship management play when dealing with difficult buyers like Mr. Logan? Should Marilyn do like most salespeople who "win" orders from Mr. Logan-simply cut back on product quality?

  Case study—shortage of nurses

Case Study-Shortage of Nurses

  Conduct banking services and research new audio

Participate in online video conferences, web courses and forums -

  Advise malcolm regarding what you feel

Advise Malcolm regarding what you feel should be the key elements in recruiting, training and managing his new sales force.

  How would a person representing ethical egoism advise you

How would a person representing ethical egoism advise you in deciding on the right thing to do in the ethical scenario below? Why would they advise you as they do?

  Develop a plan to meet the comfort needs of all patients

Is this so or should comfort care be a "substantive need in all aspects of life" as the author proposes -  Are all comforts needs the same? How does the RN develop a plan to meet the comfort needs of all patients?

  Discuss critically infosys current and future strategy

Discuss critically Infosys current and future strategy. What advice would you give Kris Gopalakrishnan and KShop has resulted in information overload among staff. What operational measures would you suggest to overcome such challenges?

  Search and seizure 1 did officer greens removal of sams bag

1 did officer greens removal of sams bag from the overhead compartment and putting it on the seat below constitute a

  Case study on ethical decision making

Case Study on Ethical Decision Making

  Haier - taking a chinese company global in 2011

Discuss factors considered in developing international business including the political environment, culture, economics etc. Why the specific mode of entry into different markets was used?

  Why apple continues to source its production

Determine why Apple continues to source its production from overseas firms such as Foxconn? In your answer, consider what advantages and/or disadvantages this generates for the firm. Evaluate and assess what Apple could have done to avoid the thre..

  Find australian shared services case studies

Research and find four Australian shared services case studies you need to write the conclusion of each use case.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd