Create and delete files on usb drive

Assignment Help Computer Networking
Reference no: EM132489919 , Length: word count:1500

MN624 Digital Forensic Assignment - Melbourne Institute of Technology, Australia

Assessment Title - Validating and testing digital forensics tools and evidence

Purpose of the assessment (with ULO Mapping) - This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

b) Record, administer and document digital forensics in social media.

Assignment Description - Assignment - Leaving Clues to a Crime

In this Assignment you will create a pretended crime scenario that needs computer forensic analysis. Along with the crime scenario, create digital clues that may be left on a small portable storage device.

IMPORTANT: Any names of persons or organizations in the crime scenario should be pretended; DO NOT use the names of real people or businesses. Also, DO NOT develop a crime scenario involving child pornography or anything that can be interpreted as a threat to the public. Acceptable topics include theft, embezzlement, kidnapping a fictitious character, the murder of a fictitious character, etc.

The chosen crime scenario must be discussed according to the following questions:

Questions -

Q1) You will leave your digital "clues" on a flash/thumb drive. Provide your thumb drive (containing your digital clues) for analysis as an image by using software such as ProDiscover.

Include this screenshot in your final report!

Your digital clues must include at least one of each of the following:

- Hidden file

- Deleted file

- Graphic file

- Password-protected file

- Web access (browser history)

- Change extension of one file such as .docs to .pdf

Q2) Discuss what should you consider when determining which data acquisition method to use.

Q3) Discuss some options that can be used for preserving the data in this situation

Q4) Explain two acquisition methods that you should use in this situation.

Assignment 1b: Create and Delete Files on USB Drive

In this Assignment 1b, you need to find any evidence of the Assignment 1a, and any data that might have been generated from the suspect's hard drive, so that, it may be presented in a court of law. To create your digital clues, please do the following task:

1. On your USB drive, create a word file named your Student ID, where the blank should be filled with your name, mobile, citizen, address and some other information.

The file should contain the following sentence: "I have enrolled for MN624 Digital Forensic." The first blank in the sentence should be filled in with your Full name and the second blank with the date when you registered for this unit.

2. On the same drive, create an excel file named "StudentID.xls", where the First column should be filled with your units name that you had at MIT last semester and the second column should be filled with your marks with those units.

3. Store your current Photo on a USB drive and save it in JPG format or other images format.

4. Take a screenshot of your Windows Explorer window showing the content of the USB's folder hosting the three files.

Include this screenshot in your final report! Now delete those files, and then take another screenshot of the respective folder's content (after the two files have been deleted). Include this screenshot in your final report.

Table 1: Digital forensics Tools (You can choose any two tools for your demonstration with your tutor's consent)

Serial # Name of the security tool
1 The Sleuth Kit (Autopsy)
2 FTK Imager
3 X-Ways Forensics
4 CAINE (Computer Aided Investigative Environment)
5 SANS Investigative Forensic Toolkit (SIFT)

Table 1
Q1) Use two computer forensics tool from table 1 to Acquire an Image of USB Drive. In the report, you need to include the screenshots of each step.
Q2) Use two computer forensics tool from table 1 to Recover Deleted Images and to verify which files have changed of extension. In the report, you need to include the screenshots of each step.
Q3) validate your results by using hash algorithms.

Q4) Comparison of the digital forensics tools that you used in this work. Your comparison could include:
- Digital forensics features
- Time is taken to detect acquire threat
- Ease of usage

Q7) Demonstration of the two digital forensics tools that you used in this work on week 7.

Note - Word limit Max 2000 words.

Reference no: EM132489919

Questions Cloud

Common characteristics do protozoa have that facilitates : Protozoa are a polyphyletic group .What does that term mean? What common characteristics do Protozoa have that facilitates informally
Compute accounting and cash breakeven points in units : The snow blowers sell for $800 each. Variable costs of a snow blower are $500. Compute Accounting and Cash Breakeven points in Units.
What workplace laws or regulations are in place : What workplace laws or regulations are in place? How does law impact healthcare professionals of that country? Do you believe their laws contradict or support.
Determine burn most likely read a disclosure regarding major : Major Manufacturing from the analysis after reading the notes to its financial statements. Burns most likely read a disclosure regarding Major's
Create and delete files on usb drive : Validating and testing digital forensics tools and evidence - create a pretended crime scenario that needs computer forensic analysis
Describe the key issues for planning and implementation : Suggested health care subjects include the topics listed below. Please select one of these topics, or a topic of your own choosing. Focus on identified problems
What align ending inventory with current replacement values : If CFO prediction is correct regarding prices, which cost flow assumption would most accurately align ending inventory with current replacement values?
What are your peers opinions of your strategic alternatives : As you are responding to others, note any common insights you may have with your peers. What are your peers' opinions of your strategic alternatives using SPACE
Electron acceptor in bacterial metabolism pathways : Is the molecular oxygen the only substance that can be used as an electron acceptor in bacterial metabolism pathways? Explain

Reviews

len2489919

4/10/2020 1:54:23 AM

last day I'm send a post like this, I'm already got review response but I'm lost that link. So I'm created a new verified account. Can you please review the assignment and let me know the datails. I need Section 1a asap and also need the 1b section. more over I need 2nd copy as well to my friend. Please check and intimate me the details. thank you.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd