Describe the process used in restoring the scrambled bits

Assignment Help Computer Network Security
Reference no: EM13730600

Task 1: Recovering scrambled bits

Scrambled bits on the subject site closer to the assignment due date. You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment.

Deliverable: Describe the process used in restoring the scrambled bits and insert plain text in the assignment.

Task 2: Revealing hidden information from an image

For this task I will provide an image with hidden information in it. You will be required to reveal the hidden information.

Deliverable: Describe the process used to reveal the hidden information from the image and copy the revealed information in the assignment in plain text.

Task 3: Forensics Report

In this major task you are assumed as a Digital Forensics Examiner. Considering a real or a hypothetical case you are required to produce a formal report consisting of facts from your findings to your attorney who has retained you. You are free to choose a forensics scenario which can be examination of a storage media (HDD, USB Drive etc), spoofed email, unscrambling bits, revealing information from an image or any other appropriate scenario you can think of.

Rationale

This assessment task covers data validation, e-discovery, steganography, reporting and presenting, and has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to:

Determine the legal and ethical considerations for investigating and prosecuting digital crimesanalyse data on storage media and various file systemscollect electronic evidence without compromising the original data;evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab;compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation;prepare and defend reports on the results of an investigation

Successfully revealing hidden text from an image

Hidden text is revealed. Tool used to reveal the text is mentioned and justification to use the tool is also provided. The process to reveal the text is clearly described with screenshots inserted of all steps.

Hidden text is revealed. Tool used to reveal the text is mentioned but the justification is not very clear. The process to restore the text is described with some screenshots.

Hidden text is revealed. Tool used to reveal the text is mentioned but the justification is not very clear. The process to restore the text is described but no screenshots provided.

Hidden text is revealed. No justification of tool used is provided, process seems to be somewhat vague. 

Hidden text is revealed but not matching with the original text. Tool is not mentioned and process is not described.

Task 3: Forensics report

Criteria

HD

100% - 85%

DI

84% - 75%

CR

74% - 65%

PS

64% - 50%

FL

50% - 0

Introduction:

Background, scope of engagement, tools and findings

All elements are present, well expressed, comprehensive and accurate.

All elements are present and largely accurate and well expressed.

All elements are present with few inaccuracies.

Most elements are present possibly with some inaccuracies.

Fails to satisfy minimum requirements of introduction.

Analysis: relevant programs, techniques, graphics

Description of analysis is clear and appropriate programs and techniques are selected. Very good graphic image analysis.

Description of analysis is clear and mostly appropriate programs and techniques are selected. Good graphic image analysis.

Description of analysis is clear and mostly appropriate programs and techniques are selected. Reasonable graphic image analysis.

Description of analysis is not completely relevant. Little or no graphics image analysis provided.

Fails to satisfy minimum requirements of analysis.

Findings:

specific files/images, type of searches, type of evidence, indicators of ownership

A greater detail of findings is provided. Keywords and string searches are listed very clearly. Evidence found is very convincing. Indication of ownership is very clear.

Findings are provided, keywords and string searchers are listed. Evidence is sound. Ownership is clear.

Findings are provided, some keywords are listed. Evidence is reasonable which relates to the ownership.

Findings are provided but are somewhat vague. Keywords and strings are not very clear. Evidence found may be questionable.

Fails to satisfy minimum requirements providing findings.

Conclusion:

Summary, Results

High level summary of results is provided which is consistent with the report.

Well summarised results and mostly consistent with the findings. 

Good summary of results.

Able to relate the results with findings. No new material is included.

Satisfies the minimum requirements. Results are not really consistent with the findings.

Fails to satisfy minimum requirements of summarising the results.

Reference no: EM13730600

Questions Cloud

Transcription is the production of rna from dna : Transcription is the production of RNA from DNA. It reads one strand of DNA, called the template, to create a new RNA strand. The nucleotides are added to the growing RNA strand in a 3' to 5' direction from the DNA strand.1. Transcribe the following ..
Shares of equity via general cash offering to raise funds : The Huang Corporation needs to raise $72 million to finance its expansion into new markets. The company will sell new shares of equity via general cash offering to raise the needed funds. The offer price is $55 per share and the company's underwriter..
Explain motivate positive organizational behavior : How do these needs motivate. How are these needs addressed in an organizational context. Provide an example from your current organization. How well does it address the needs of its organizational members. What best practices can you suggest for o..
Scientists create life : Years ago, a newspaper headline read "Scientists Create Life." Scientists had strung together a chain of nucleotides to make a strand of DNA. This was the first time DNA had been synthesized in a laboratory; it has been synthesized many times since t..
Describe the process used in restoring the scrambled bits : Describe the process used in restoring the scrambled bits and determine the legal and ethical considerations for investigating and prosecuting digital crimesanalyse data.
After tax cash flow from the sale of this asset : Consider an asset that costs $369,600 and is depreciated straight-line to zero over its 7-year tax life. The asset is to be used in a 4-year project; at the end of the project, the asset can be sold for $46,200. If the relevant tax rate is 32 percent..
Project to improve its production efficiency : CSM Machine Shop is considering a four-year project to improve its production efficiency. Buying a new machine press for $495,000 is estimated to result in $194,000 in annual pretax cost savings. The press falls in the MACRS five-year class (MACRS Ta..
Construct implementation strategy for hypothetical company : Construct an implementation strategy for your hypothetical company in which you specify the essential activities and responsibilities. Include a timetable for completion of each component of your strategy
Calculate the return of a security with a beta : The risk-free rate is 4% and the expected rate of return on the market portfolio is 9%. Calculate the return of a security with a beta of 1.28 and an expected rate of return of 12% (rounded to 2 decimal places). Is the security overpriced or underpri..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd