Reference no: EM132295841
Assessment - Tasks and Research Project
Task 1: Investigating Hashing Algorithms
Hashing algorithms play crucial role in any digital forensics investigation. As a digital forensics examiner, you are often required to use these algorithms. Your task is to:
Explain briefly what is a hashing algorithm?
Investigate about SHA-3 algorithm, describe its characteristics and requirements.
How does SHA-3 compare to SHA-1 and SHA-2? Provide your answer in the form of a comparison table.
Deliverable: Write a 200-300 words (no more than half A4 page) explanation of question 1. For question 2, briefly explain SHA-3 algorithm (200 - 300 words and no more than half A4 page). For question 3, provide a comparison table including SHA-1, SHA-2 and SHA-3 algorithms with their characteristics and limitations. Your answer should not be more than one A4 page.
Task 2: Case Project
Complete the Hands-on Project 4-3 the M57 Patents case. (Nelson, Phillips, & Steuart, 6th edition, 2019, p. 190)
Deliverable: Write a 300-500 words paper explaining the importance of the files you examined. How might they affect a patent case? Provide screen shots of the steps completed in the project.
Task 3: Research Project
As part of the duties of a digital forensics examiner, creating an investigation plan is a standard practice. Write a paper that describes how you would organise an investigation for a potential fraud case. Also, list the methods that you plan to use to validate collected data from storage devices such as MS Word, MS Excel and emails, with hashes. Specify the hash algorithm you plan to use, such as MD5 or any variant of SHA algorithms.
Deliverable: Write a 300-500 word report that outlines standard investigation management and data validation methods.
Rationale - This assessment task will assess the following learning outcome/s:
- be able to determine and explain the legal and ethical considerations for investigating and prosecuting digital crimes.
- be able to formulate a digital forensics process.
- be able to evaluate the technology in digital forensics to detect, prevent and recover from digital crimes.
- be able to analyse data on storage media and various file systems.
- be able to collect electronic evidence without compromising the original data.
- be able to evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab.
- be able to prepare and defend reports on the results of an investigation.