Discuss different methods of data validation

Assignment Help Case Study
Reference no: EM133713976

MBIS5005 Cyber Intelligence

Report and Presentation

Case Study

Learning Outcom 1: Outline a comprehensive process of digital forensics theory and practice and document evidence and report on computer forensics findings.
Learning Outcom 2: Administer appropriate tools and techniques to carry out a digital forensics investigations including recovery, validation and presentation of evidence.
Learning Outcom 3: Perform a practical investigation into computer forensics, including industry and legal procedures with respect to data acquisitions.

Assessment Description

Report
Overview

Assume a USB drive have been found in the company working site whereas none of the employee is supposed to carry a pen drive. The employees are allowed to use only company supplied USB. The manager suspects that some crucial information have been leaked or illegally downloaded. The USB contains different types of files including excel, image files of various formats, doc files and few text files.
Your manager assigns you the role to investigate and produce a forensics report based on your investigation. As part of the investigation, you will work on two phases, i.e. phase A and phase B. The details of phase A and phase B are described below:

Phase A
In this phase, you are required to conduct research on the current computer forensics tool that can be used for this kind of case study. Prepare a report containing the following information for each tool and state you would prefer to use:
Forensics vendors name
Tool name and latest version number
Features of the product

Pros and cons of the products

Phase B
In this phase, based on the research conducted in Phase A, install two forensics tool in your machine and compare the outcome at various phases. The detail plans and steps of the work are as follow:

Data Formulation
Get a USB of your own, approximately 8 to 16 Gb and follow the steps:

You will create six files type (pdf, excel and word documents). Name these files in a proper convention such as: groupnumber_unitcode_AssessmentNo_*, where "*" depends on the file type. Furthermore, the attributes of these files need to be changed to describe the Metadata which holds data such as your groupno as an author, organization name (any preferred name; could be AIH), computer name based on your terminal name, date/time created and comments such as "created for Assesment3".
Modify the extension of one of the doc file to .jpeg
Then delete 3 files including the file you have modified its extension, one of each type.
Take the necessary screenshots of each steps to be included in your report.

Part 1: Data Acquisition

Based on the installed tools, prepare a forensics image (bit stream copy) with the record of deleted data.
Include the screenshots of each step in the report.
Use this image to carry out the next part of activities.
In your report, cover the challenges to make successful acquisition and what are the relevant format to use and why.
Describe steps required for search and seizure.

Part 2: Data Recovery
As part of data recovery, consider the scenario where three image files of the USB have been deleted.
Recover the deleted images and explain the method based on the tool you use.
Provide sufficient screenshots.
In addition, recover the data from recycle bin, explain the procedure with screenshots. Recover the metadata of these files.

Part 3: Data Analysis
Use a hex editor and inspect all the files.
Check if there is any hidden files.
Take necessary screenshots of your working method.
Discuss about the tool, which can used for analysing the deleted files.
Would you be doing any windows registry analysis? Why?

Part 4 : Data Validation
Discuss different methods of data validation.
Use one the methods to validate the data of your USB.
How to verify file extension? Remember you have modified a file extension.
Validate and use screenshots to proof file extension alteration.

Presentation
Students are required to deliver a group presentation based on their case study performed in Assessment 3 (Report). All of the group members need to contribute and present the findings. In preparation of the presentation, the following steps should be taken into consideration:

Reference no: EM133713976

Questions Cloud

Perform a depth-first search recording start and finish time : Remove all the back edges from the graph so it becomes a DAG. Perform a depth-first search recording the start and finish times.
Discuss how diagnostic errors made by radiology : Discuss how diagnostic errors made by radiology impact the NPs ability to develop accurate diagnoses and treatment plans for patients.
Multiple skin lesions to the scalp-elbows and trunk : The client is seen today for assessment of multiple skin lesions to the scalp, elbows, and trunk.
Which two are the most important for spiritual maturity : Feldmeier discusses Jack Kornfield's A Path with a Heart, where he lists ten qualities of spiritual maturity.
Discuss different methods of data validation : Conduct research on the current computer forensics tool that can be used for this kind of case study - Discuss different methods of data validation
Identify the various sources for the product : This is where you identify the various sources for this product, along with critical information about their abilities to source the product.
Explaining what is meant by community-family education : Begin by explaining what is meant by community/family education. What is the role of community/family education in a client's recovery process?
Unconscious and accompanied by nurse from medical floor : A middle-aged man is transported to the emergency department unconscious and accompanied by a nurse from the medical floor.
Why it important to integrate evm in agile or hybrid project : QSO 420- Describe why it is important to integrate EVM in Agile or Hybrid projects. Identify what elements of EVM are already present in Agile or Hybrid project

Reviews

Write a Review

Case Study Questions & Answers

  From the scenario, prioritize the attributes of golds reling

From the scenario, prioritize the attributes of Golds Reling's brand from the brand map presented in the scenario according to the attributes that you believe would be most important to the new tablet's target market. Provide support for your respons..

  Discuss critically infosys current and future strategy

Discuss critically Infosys current and future strategy. What advice would you give Kris Gopalakrishnan and KShop has resulted in information overload among staff. What operational measures would you suggest to overcome such challenges?

  Review tarmac business case for diversity

Review Tarmac's Business Case for Diversity and the Learning Resources. Think about Tarmac's approach to managing diversity and how it relates to organisational behaviour concepts and human resource processes.

  Enron case shared activity

Enron was the first nationwide natural gas pipeline network in the United States. As the company grew, executives shifted the company's primary focus from energy delivery and infrastructure to investing in the stock market.

  Ebay inc internet success or fairy tale

Read the case study "eBay Inc.: Internet Success or Fairy Tale? "and answer the question below,   Use the 2002 financial statement data to replicate the Meyer's report calculations that illustrate the conclusion based on the 2001 data reached in the ..

  Mintendo game girl case study

Which option delivers the maximum profit for the supply chain: Sandra's plan, Bill's plan, or no promotion plan at all? How does the answer change if a discount of $10 must be given to reach the same level of impact that the $5 discount received?

  Splash soft drinks case study

Splash Soft Drinks Inc. (SSD) has recently achieved sales that exceeded its expectations after it introduced a new beverage that was greatly welcomed by their customers. The company is currently considering opening a new plant to which some of the pr..

  Details of the task using tesco plc

Details of the task Using Tesco plc (www.tesco.com) as a case study, prepare a report of no more than 2,500 words that:

  What are the common manifestations of alcoholic cirrhosis

What are the common manifestations of alcoholic cirrhosis? Which of these are secondary to hepatocellular failure? Which are secondary to portal hypertension?

  Judge the extent to which the marketing plan at just us

From the case study, judge the extent to which the marketing plan at Just Us! is outdated. Propose two (2) ways that Just Us! could improve the customer experience and thus sustain future growth.

  Read natasha kingery case and answer the questions

Read the DATA CASE on pages 126-127 about Natasha Kingery who is considering furthering her education and is seeking financial advice. Determine the interest rate she is currently earning on her inheritance by going to Yahoo!

  Identify the relevant facts of the case study

Imagine you are the financial controller of XYZ Ltd a corporation that is a very large donor to HOHO. You have recently become aware that its TV advertising has resulted in the charity violating the 25% expenditure ratio for its charity drive.    Id..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd