Formulate a digital forensics process

Assignment Help Computer Network Security
Reference no: EM132936420 , Length: word count:1500

ITC597 Digital Forensics - Charles Sturt University

Learning outcome 1: be able to determine and explain the legal and ethical considerations for investigating and prosecuting digital crimes;
Learning outcome 2: be able to formulate a digital forensics process;
Learning outcome 3: be able to evaluate the technology in digital forensics to detect, prevent and recover from digital crimes;
Learning outcome 4: be able to analyse data on storage media and various file systems;
Learning outcome 5: be able to collect electronic evidence without compromising the original data;
Learning outcome 6: be able to evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab;
Learning outcome 7: be able to critique and compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation; and
Learning outcome 8: be able to prepare and defend reports on the results of an investigation.

Assessment item - Hands-On Practical Projects and Research Report

TASK

This assessment has two components, hands-on practical projects and a research report.

Assessment Submission Notes: Prepare an MS Word document for this assessment and include both tasks in that document. Make sure that you write subject name and code, assessment number, your name, SID and email address at the front page. Start each task from a new page. For task 1, address all three hands-on projects separately. For task 2, address all questions asked in the research project along with the information that you think is necessary.

There is no word or page limit for task 1, however, your submission should be reasonable and logical. Do not make it too long or too short. See specific deliverables under each hands-on project or task.

Task # 1: Hands-on Practical Projects
Complete the following hands-on projects from the textbook (Guide to Computer Forensics and Investigations, 6/e, Nelson, Phillips, & Steuart, 2019)

1. Hands-on Project 1-3, Forensic Examination of Digital Media
Deliverables: Include screen shots of the hands-on project in your assessment and insert C1Prj03 in your assignment as well. Also, provide a short summary (up to 1 page) of your findings from this project. This summary should include your reflection on findings as well. For example, you may write as a reflection that after your investigations you could not find (or you may have found) any evidence that the former employee was involved in taking the company proprietry photographs with him.
With the screen shots of your working, show/include your i2 login and/or username at least in one of the screen shots as a proof of your own work.
2. Hands-on Project 4-3, Examining M57 Patent Case

Deliverables: In this project you are examining 'Terry's work USB' to find if Terry has been involved in anything illicit or against company policy. While your main focus will be investigating for any images in the USB, you also should look if there is any other suspecious material / activity record on the USB. Write a report with the investigation screen shots and explaining the importance of the files you examined and how might they affect the patent case. While providing screen shots of your working, include a short description about the information that is given in the screen shot. For example, if you did a key word search to find any images in the USB and you got results, describe what was your search term? What did you find as a search result? With the screen shots of your working, show/include your i2 login and/ or username at least in one of the screen shots as a proof of your own work.

3. Hands-on Project 5-2, Exploring MFT and Exploring Metadata of File

Deliverable: Write an MS Word report after completing this project describing what metadata you have discovered from the file you analysed using WinHex editor. Note that if you like, you can use any other Hex editor as well such as HxD or Neo. Provide screen shots of the steps completed in the project showing the results of date and time values you have recorded.
Provide a brief description of each screen shot about the information it contains. Briefly describe the main steps that you think are necessary and important to locate date and time values while analysing the file.

Task # 2: Research Project and Report

You have been assigned a digital forensics case to investigate involving a potential monetary fraud in an organisation. The CTO of the organisation has given you access to the workstation and other necessary hardware, e.g. USB, of one of his employees who she thinks is potentially involved in this fraud. Your job as a digital forensics examiner is to conduct this investigation. You are required to create a (investigation) plan and describe the standard practice procedure that is used in such investigations. Your plan must include the procedures for collecting the digital data, securing the evidence that you may collect and then describing the method to validate the collected data, e.g. calculating hash values and specifying the hash algorithm that you intend to use, e.g. SHA-3, MD5 etc. You can make some reasonable assumptions if required when describing your plan / procedures.

Deliverable: Write a 1000-1500 word report (approximately 2-3 pages) that outlines the investigation plan, procedures to secure the digital evidence, and data validation methods. Your plan should include steps that you may take to conduct this investigation. There is no need to provide detailed explanation of each of the tasks that you think are necessary for this investigation and are listed in your plan. For example, one of the steps in your plan can be 'Making forensic copy of the digital evidence'. The descriptiono of this step could be: 'After acquiring the digital evidence and securing it properly, a forensic copy of the digital evidence will be made using a proper standardised forensic tool such as Autopsy or OSForensics'.

However, the plan itself should be detailed and as comprehensive as you can think of covering all possible steps, starting from collecting the evidence, securing it, investigating / analysing it and then preparing the report of your investigation. If you use any references, make sure you cite those references at the end of your plan document.

RATIONALE
This assessment task will assess the following learning outcome/s:
• be able to formulate a digital forensics process.
• be able to evaluate the technology in digital forensics to detect, prevent and recover from digital crimes.
• be able to analyse data on storage media and various file systems.
• be able to collect electronic evidence without compromising the original data.
• be able to evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab.

• be able to critique and compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation.
• be able to prepare and defend reports on the results of an investigation.

Reference no: EM132936420

Questions Cloud

What was the number of equivalent units of production : The Made Rite Shoe Corporation uses a process costing system. What was the number of equivalent units of production for direct materials?
What is the second year depreciation expense : The popper produced 14,000 buckets of popcorn. What is the second year depreciation expense on the popcorn popper assuming units of output depreciation?
Calculate the net income and sales : Assume that the average margin of maintenance service firms is 2.5%, and that the average ROI for such firms is also 18%. Calculate the net income, sales
What is the accumulated depreciation after the second year : Celebrity Allures Inc, What is the accumulated depreciation after the second year on the popcorn popper assuming straight line depreciation?
Formulate a digital forensics process : Determine and explain the legal and ethical considerations for investigating and prosecuting digital crimes - formulate a digital forensics process
What is the monthly operating income advantage : The Production Division has no alternative use for the facilities used to manufacture the stuffing. What is the monthly operating income advantage
How much is the cost of the copy machine : Pineapple also bought a maintenance package which will be billed at $35 a month beginning in May. How much is the cost of the copy machine?
What is the present value of this security : What is the present value of this security if the first payment is made two years from now? (The security still makes annual payments after that as before.)
What is the target cost : Sheltar's sales are currently? 100,000 televisions per year. What is the target cost if target operating income is? 25% of? sales

Reviews

Write a Review

Computer Network Security Questions & Answers

  What could have been done to prevent the attack

MITS 5004 IT Security Assignment, Victorian Institute of Technology, Australia. What could have been done to prevent the attack

  Why are background checks important to information security

Be sure to list your two required references at the end of your post. References must be in APA citation format. Answer the following questions below must be a minimum of 300 words combined. Why are background checks important to information securi..

  Ssl for http traffic

SSL Record protocol of the SSL protocol stack, RADIUS, networks for access control, DNS poisoning, Spear Phishing attacks, centralised or decentralised access control, encrypt email data

  Discuss how this and other information security

write a 1400- to 2100-word paper that describes the security authentication process.discuss how this and other

  Encrypt the plaintext sendmoremoney with the key stream

Explores the use of a one-time pad version of the Vigenère cipher. In this scheme, the key is a stream of random numbers between 0 and 26. For example, if the key is 3 19 5..., then the first letter of plaintext is encrypted with a shift of 3 lett..

  Direct costs of a data breach to an organization

Information technology security breaches costs an organization millions of dollars. Identify any two (2) direct costs of a data breach to an organization

  Network security question

What are the predominant electronic and physical threats to communications networks?

  Information security for document management systems

The system is authenticated by using our LDAP accounts. Each employee is assigned to a security group but the documentation is manually entered into the proper category because we rely on the employee to assign the group we are at risk of confide..

  How to create one overall network

Complete research project, you must do several things - gain sufficient background knowledge to provide a basis for understanding the topic - find sources of information on the topic.

  Identify different categories of network security attacks

Identify different categories of network security attacks in LAN and WAN environments - apply specific security solutions for different types of attacks

  Encrypt an input string of lowercase letters

It is a type of substitution cipher in which each letter in the plaintext is replaced by a letter some fixed number of positions down the alphabet.

  Analyze ing solution for providing security

Read the case study titled "ING Life". Analyze ING's solution for providing security to determine if the solution is adequate or inadequate

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd