Digital forensic analysis and validation

Assignment Help Computer Engineering
Reference no: EM132650067

BN309 Computer Forensics - Melbourne Institute of Technology

Assessment - Validating and Testing Computer Forensics Tools and Evidence

Learning Outcome 1: Systematically collect evidence at private-sector incident scenes.
Learning Outcome 2: Document evidence and report on computer forensics findings.
Learning Outcome 3:
Implement a number of methodologies for validating and testing computer forensics tools and evidence
Learning Outcome 4: Understand the cross-examination of a legal process

Assignment Questions:

Objective:

The objectives of this assignment are to gain theoretical and practical knowledge and skills in different computer forensics and anti-forensics techniques such as image acquiring and data hiding. The students should apply appropriate computer forensics tools and techniques, and write a report on their findings. Marks will be awarded based on the sophistication and in-depth exploration of the selected techniques.

Case Study:
You are investigating a murder case related to drug dealing. You have acquired the USB drive from the crime scene.

Assignment Specification:

Prepare a report and video demonstration on the following sections related to the case study. You can use your own files for data hiding and analysis. Provide the list of references using IEEE referencing style at the end of the report.

Section 1: Data hiding in graphic file

Do an Internet search to list five of steganography tools. Choose one of the steganography tools to hide data in an image file. Explain each step with the help of screenshots for the tool you used. (250 words)

Section 2: Digital forensic analysis and validation

The computer drive under investigation contains several password-protected files and other files with headers that do not match the extensions. Write a report describing the procedures to retrieve the evidence with your selected forensics tools. Explain how to identify the file headers and determine how their extensions are mismatched. Then discuss what techniques and tools you can use for recovering passwords from the protected files. (500 words)

Section 3: Anti-forensics

Research on anti-forensics techniques and write a report on your findings on these techniques. Compare the pros and cons of these techniques in different contexts. Use one of the anti-forensic technique on your files and explain how useful it is. Please explain your methods with the help of screenshots. (750 words)

Demonstration:

Demonstrate your work. You should appear in the video (You Tube or similar) at the first and last 30 secs to introduce yourself and draw a conclusion on your experience with the different computer forensics and anti-forensics techniques.

Attachment:- Computer Forensics.rar

Reference no: EM132650067

Questions Cloud

Find the change in squawk box accounting method : Find the change in Squawk Box's accounting method will require an adjustment of income under IRC §481 and determine the timing of the recognition
What are the key features of the urban inner-city areas : What are the key features of the urban inner-city areas that Elijah Anderson and Victor Rios study in their article?
Describe the basic elements of the selected subculture : Using the concepts involved in the study of culture, specifically with Hispanics within the larger United States society.
Discuss the definition of deviance as related to cultural : Discuss the definition of deviance as related to cultural variation.
Digital forensic analysis and validation : Prepare a report and video demonstration on the following sections related to the case study. You can use your own files for data hiding and analysis
Moral codes of the amish community : What makes those who don't come back to the Amish faith "polluted"? How does this reinforce the moral codes of the Amish community?
Find how ethical conduct improve profitability of a company : How can ethical conduct improve profitability of a company? Give an example of (a) planning (b) decision making. What is employee empowerment ?
Provide two positive developments from neoliberalism : 1. Define Neoliberalism (provide two specific characteristics).
Why is feedback necessary in management process : Why is feedback necessary in management process? What are the two factors that can prevent a manager to maximize profit ?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd