Digital evidence relating to graphic files

Assignment Help Other Subject
Reference no: EM133196706

MyHeritage Company is an online medical services platform founded in 2015, which provides various services to patients, such as DNA tests, etc. On 10th November 2018, the company found that the majority of its user's records were breached, where online servers were compromised due to a DDoS attack. As a result, they have assigned the case to a forensic investigator who has conducted some investigations into evidence collection and identification of perpetrators.

The investigator seized the manipulated workstations. The initial investigations have shown that some of the workstations were compromised due to a Malvertising, in which some records were lost a few months before the cyberattack was launched. The forensic examiner has found logic bombs in some workstations in which the cyberattacks could have been linked to those programs. Some of the web browsers had malicious extensions violating the company's policy.  Many of the workstations had no proper antivirus protection and firewalls configured.

The company used Google Drive as its means of sharing online records with staff. Windows 10 was the main OS on the workstations. However, some staff were using Mac OS on their laptops. They could work remotely from any public network, but they were recommended to use private VPNs. Staff were also using iCloud for storing some of the company's data. VMWare was used on some of the workstations for specific applications installed on Ubuntu, but it was not supported by the company's IT services.

The examination has shown that some of the email accounts were hacked by spear-phishing, login credentials were stolen, and some amounts were transferred to some accounts which are not traceable. The Fedwire system was used in the attack which allowed cybercriminal/s to transfer the funds to the intermediary banks. The email attachments showing transactions and communications were successfully extracted by the investigator.

The investigation has shown that NetWitness was installed on some of the workstations. The users of the applications cannot be detected. Also, USB Oblivion was found on a few workstations. VeraCrypt has been installed on the workstations to hide some encrypted files. Many documents including word files excel files, and image files were recovered.

Mobile phones of suspects were seized and investigated. The operating systems on the mobile phones were Android and iOS. The investigated applications were Hotspot Shield, EncryptMe, Photoshop Express, WhatsApp, and some other photo editing and remote desktop tools. Graphic files stored on the mobile phones were png, and gif files. Cloud data applications, e.g. iCloud, were also installed on mobile phones for sharing image files and other sensitive data.

The investigator has done imaging of all hard disks. Most of the data files were collected and analysed through FTK Imager, in which the examiner constantly verified integrity checking.

Given the scenario and seized pieces of evidence by the investigators, it is your role as an investigator to prove or disprove the allegations of any criminal activities, but also of evidence tampering. Answer the following questions in relation to the scenario given. In your answers, you may wish to consider the following points:

It is critically important that you explain why a specific digital forensic evidence from the scenario falls into a particular category, such as network, email, operating system, etc.

Sometimes a particular digital forensic evidence from the scenario can fall into multiple categories. If you wish to use forensic evidence to answer a question, you must adapt your answer to discuss how the forensic evidence is related to the particular digital forensic investigation.

Questions.

1. Identify and discuss any digital evidence relating to graphic files as outlined in the scenario. Make a recommendation on how to search for the evidence and any appropriate tools that can be used, including the pros and cons of the tools.

2. Discuss the steps (standard procedures) that need to be taken to collect the evidence relating to the allegation and any challenges or issues that you might face.

Reference no: EM133196706

Questions Cloud

Create ppt about the impact of long-term trauma on the brain : Create 7 to 10 slides PowerPoint presentation about the impact of long-term trauma on the brain. Include the following in your presentation:
What are the advantages of implanting an arp : ADM 3028 Université du Québec, Montréal Second case: We can see that technological progress in medicine can lead to an increase in the cost of care.
Write an essay on the Role of Technology and Innovation : MGT325 Management of Technology Assignment - Role of Technology and Innovation in the Realization of Vision 2030 KSA Essay, Saudi Electronic University
Draft a discussion post on your stance on private prisons : Draft a discussion post on your stance on private prisons. Should incarceration be left to the government?
Digital evidence relating to graphic files : ICT 378 Murdoch University MyHeritage Company is an online medical services platform founded in 2015, which provides various services to patients, such as DNA t
Simple distributed mimo system : Linear combiner and precoder in this system, try both MRT/MRC and ZF. Add some AWGN to the received signals, as you feel is appropriate
How do you feel about the discipline in the local schools : How do you feel about the discipline in the local school (to teachers: at the school where you teach)- is it too strict, not strict enough, or just about right?
Briefing paper for the Red Clay senior leadership : Then, prepare a two-page briefing paper for the Red Clay senior leadership and Red Clay corporate board that addresses planning, programming
Early childhood department : ECD 1513 UNITAR International University Referring to the above statement. discuss the scope of curriculum provided for Infants and toddlers in Malaysia.

Reviews

Write a Review

Other Subject Questions & Answers

  Create an interesting and educational presentation

Create an interesting and educational PowerPoint presentation, which contains a critical narrative that integrates aspects of the various theories.

  Analyze the basic tenets of the symbolic interaction

Analyze the basic tenets of the symbolic interaction perspective, according to the work of GH Mead, paying special attention to the concept of "the self";

  Minimum-security state facility for male offenders

You are a correctional case manager working in a minimum-security state facility for male offenders.

  Discuss any ethical and legal implications

Discuss any ethical and legal implications that can arise from the selected issue and the impact on the patient and the healthcare professional.

  Books of job-ecclesiastes and proverbs

Does Theodicy mean the same in the Books of Job, Ecclesiastes and Proverbs? Our study group is having a difficult time distinguishing the difference.

  What the design selection means for participant recruitment

In addition to considering alignment, when researchers select a research design, they must also consider the ethical implications of their choice, including.

  What are strengths and weaknesses of questionnaire overall

What are the strengths and weaknesses of the questionnaire overall? Consider how the items are worded and the response choices, if applicable, are provided.

  Prevalence of prostate cancer

The prevalence of prostate cancer is 16% among men. Out of 20,000 men screened with the prostate specific antigen (PSA) test, 400 men with prostate cancer had a negative test results and 800 of the men without prostate cancer had positive test res..

  Are destined to be forever the victim of a grand delusion

Are you destined to be forever the victim of a grand delusion perpetrated by the computer that stimulates your brain? What can you know for sure?

  Is the era of cheap oil nearly over consider whether or

is the era of cheap oil nearly over? consider whether or not new discoveries can keep pace and whether current trends

  Review article - fidelity of implementing embedded formative

Review this article - On the Fidelity of Implementing Embedded Formative Assessments and Its Relation to Student Learning

  What is the current method of sampling

Sampling method - What is the current method of sampling? What are the advantages and disadvantages of the current sampling method

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd