Explain the main stages of a digital forensic investigation

Assignment Help Computer Networking
Reference no: EM132556853 , Length: 4500 words

CTEC5806 Digital Forensics: Principles and Practice DL - De Montfort University

Digital Forensics Report

Learning outcome 1. Discuss the principles underpinning digital forensic practice & their importance;

Learning outcome 2. Explain the main stages & the associated procedures of a digital forensic investigation;

Learning outcome 3. Apply the principles & practices of digital forensics to given scenarios;

Learning outcome 4. Analyse forensic images of different formats using a suitable selection of tools;

Learning outcome 5. Prepare a suitable report to present your findings and professional opinion of a given scenario;

Learning outcome 6. Critically evaluate & reflect upon your own learning in relation to digital forensics & your future learning needs to be successful in the field of digital forensics;

Digital Forensics: Principles & Practice Distance Learning Coursework

Introduction

1. As a Digital Forensics Investigator, you are expected to follow several principles that are a combination of legal, ethical/moral and general guidelines.
• Discuss what these principles are and why they are important.

2. Explain the main stages of a Digital Forensic investigation, giving examples of what tasks, activities and the tools where appropriate, you would complete or use at each stage.

Background

3. Summarise the case you have been asked to investigate in your own words. State the case hypothesis.

4. What will you be looking for? Where will you expect to find such artefacts?

5. What tools are you going to use? How will they help you investigate? How do you use these tools?

Main Body - Biggest Section

6. Analyse the forensic image and illustrate step by step the process of what you did and what you found.

7. Assemble your findings in relation to what you have been asked to investigate.

8. Based on your findings, does the evidence support or refute the case hypothesis? Why? Back up your answer with demonstrable reasons and evidence.

Conclusions

9. What have you learnt during this assignment?

10. If you had to do the assignment again, what would you do differently? Why would this help you?
Appendices - each appendix should be on a separate page and have a title, plus a paragraph to explain what it is showing (except B and C which should just have a title)

A. References;

B. Spreadsheet and written details about their proposed lab setup and field kit;

C. Incident Response plan;

D. E. F. etc. Screenshots you think will support your report that do not fit in the main body of your assignment.

Particulars of the case:

Victim Steven James Neilson (AKA Stevie) has been murdered but it is not clear who the killer is. In addition, there is no indication of the motive at present; a background check is being carried out.

Suspect Andie Green was at the site and phoned the Police, looks like there was an altercation between the deceased and suspect Andie Green, suspect Andie Green denies stabbing victim.

Victims' phone was recovered from his pocket at the scene.
Suspect Andie Green's phone was seized, no relevant evidence was found on this phone;
Suspect Andie Green gave her statement to Detective Ian Robert Edwards, from which we have another two suspects (Matthew Briggs and Adam Westland) in custody; their phones were seized to investigate further.

Detectives visited victims' home and seized the victims' laptop.

All digital devices that have been seized as part of the case have been handed over to the forensics lab technician to forensically image, the forensic images will be provided to you so you can analyse them and write up your report.

Leicestershire Police have requested your services in order to ascertain:

1. From the digital devices seized, is there evidence to support or refute each of the suspects' involvement in the case;

2. Where there is evidence supporting a suspect's involvement in the case, what was the suspect's involvement?

Please provide a timeline of events to assist the Police with the case.

You will need to use Autopsy to analyse the coursework forensic image then answer the questions based on your examination, question 6 will therefore be quite a large chunk of your work so you will need to add some sub headings of your choosing.

Attachment:- Digital Forensics.rar

Reference no: EM132556853

Questions Cloud

First step for ensuring control system is in place : The identification of all changes to a project is only the first step for ensuring a control system is in place.
What are the three cost reduction method : Can you discuss the life-cycle cost management and the role of target costing? What are the three cost reduction methods? Example.
Calculate the unit product costs of alt : Assuming the company uses activity-based costing to apply manufacturing overheads to production, calculate the unit product costs of ALT500
What is the risk or danger of the new office admin person : What is the risk/danger of the new office admin person not entering the copies made in the Delayed Charges
Explain the main stages of a digital forensic investigation : Based on your findings, does the evidence support or refute the case hypothesis? Why? Back up your answer with demonstrable reasons and evidence
Compute what will the new break-even point be : Compute What will the new break-even point be if fixed costs increase by 10 per cent? What was the company's net profit for the previous year?
Calculate using at least 4 decimal points : On January 1, 2013, your brother's business obtained a 30-year amortized mortgage loan for $350,000 at a nominal annual
Digging deep company common stock : Digging Deep Company's common stock is currently selling for $166.14 per share. Next year, the company dividend
What will the relevant cost of chemical y be : If the order is accepted, what will the relevant cost of chemical Y be? Discuss Current stock of chemical Y of 8 000 kg at $16.20 per kg.

Reviews

len2556853

6/27/2020 2:48:17 AM

Hello Team, Attached is the coursework question paper. Please read the paper entirely and especially following tab(Tasks to be undertaken & Deliverables to be submitted). For this forensic analysis that is to be done in Autopsy tool there are few files you need to download first. Here is the link for that. Download the files and please share report in doc & PDF kindly.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd