Reference no: EM132650067
BN309 Computer Forensics - Melbourne Institute of Technology
Assessment - Validating and Testing Computer Forensics Tools and Evidence
Learning Outcome 1: Systematically collect evidence at private-sector incident scenes.
Learning Outcome 2: Document evidence and report on computer forensics findings.
Learning Outcome 3: Implement a number of methodologies for validating and testing computer forensics tools and evidence
Learning Outcome 4: Understand the cross-examination of a legal process
Assignment Questions:
Objective:
The objectives of this assignment are to gain theoretical and practical knowledge and skills in different computer forensics and anti-forensics techniques such as image acquiring and data hiding. The students should apply appropriate computer forensics tools and techniques, and write a report on their findings. Marks will be awarded based on the sophistication and in-depth exploration of the selected techniques.
Case Study:
You are investigating a murder case related to drug dealing. You have acquired the USB drive from the crime scene.
Assignment Specification:
Prepare a report and video demonstration on the following sections related to the case study. You can use your own files for data hiding and analysis. Provide the list of references using IEEE referencing style at the end of the report.
Section 1: Data hiding in graphic file
Do an Internet search to list five of steganography tools. Choose one of the steganography tools to hide data in an image file. Explain each step with the help of screenshots for the tool you used. (250 words)
Section 2: Digital forensic analysis and validation
The computer drive under investigation contains several password-protected files and other files with headers that do not match the extensions. Write a report describing the procedures to retrieve the evidence with your selected forensics tools. Explain how to identify the file headers and determine how their extensions are mismatched. Then discuss what techniques and tools you can use for recovering passwords from the protected files. (500 words)
Section 3: Anti-forensics
Research on anti-forensics techniques and write a report on your findings on these techniques. Compare the pros and cons of these techniques in different contexts. Use one of the anti-forensic technique on your files and explain how useful it is. Please explain your methods with the help of screenshots. (750 words)
Demonstration:
Demonstrate your work. You should appear in the video (You Tube or similar) at the first and last 30 secs to introduce yourself and draw a conclusion on your experience with the different computer forensics and anti-forensics techniques.
Attachment:- Computer Forensics.rar