Formulate a digital forensics process

Assignment Help Computer Network Security
Reference no: EM132936420 , Length: word count:1500

ITC597 Digital Forensics - Charles Sturt University

Learning outcome 1: be able to determine and explain the legal and ethical considerations for investigating and prosecuting digital crimes;
Learning outcome 2: be able to formulate a digital forensics process;
Learning outcome 3: be able to evaluate the technology in digital forensics to detect, prevent and recover from digital crimes;
Learning outcome 4: be able to analyse data on storage media and various file systems;
Learning outcome 5: be able to collect electronic evidence without compromising the original data;
Learning outcome 6: be able to evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab;
Learning outcome 7: be able to critique and compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation; and
Learning outcome 8: be able to prepare and defend reports on the results of an investigation.

Assessment item - Hands-On Practical Projects and Research Report

TASK

This assessment has two components, hands-on practical projects and a research report.

Assessment Submission Notes: Prepare an MS Word document for this assessment and include both tasks in that document. Make sure that you write subject name and code, assessment number, your name, SID and email address at the front page. Start each task from a new page. For task 1, address all three hands-on projects separately. For task 2, address all questions asked in the research project along with the information that you think is necessary.

There is no word or page limit for task 1, however, your submission should be reasonable and logical. Do not make it too long or too short. See specific deliverables under each hands-on project or task.

Task # 1: Hands-on Practical Projects
Complete the following hands-on projects from the textbook (Guide to Computer Forensics and Investigations, 6/e, Nelson, Phillips, & Steuart, 2019)

1. Hands-on Project 1-3, Forensic Examination of Digital Media
Deliverables: Include screen shots of the hands-on project in your assessment and insert C1Prj03 in your assignment as well. Also, provide a short summary (up to 1 page) of your findings from this project. This summary should include your reflection on findings as well. For example, you may write as a reflection that after your investigations you could not find (or you may have found) any evidence that the former employee was involved in taking the company proprietry photographs with him.
With the screen shots of your working, show/include your i2 login and/or username at least in one of the screen shots as a proof of your own work.
2. Hands-on Project 4-3, Examining M57 Patent Case

Deliverables: In this project you are examining 'Terry's work USB' to find if Terry has been involved in anything illicit or against company policy. While your main focus will be investigating for any images in the USB, you also should look if there is any other suspecious material / activity record on the USB. Write a report with the investigation screen shots and explaining the importance of the files you examined and how might they affect the patent case. While providing screen shots of your working, include a short description about the information that is given in the screen shot. For example, if you did a key word search to find any images in the USB and you got results, describe what was your search term? What did you find as a search result? With the screen shots of your working, show/include your i2 login and/ or username at least in one of the screen shots as a proof of your own work.

3. Hands-on Project 5-2, Exploring MFT and Exploring Metadata of File

Deliverable: Write an MS Word report after completing this project describing what metadata you have discovered from the file you analysed using WinHex editor. Note that if you like, you can use any other Hex editor as well such as HxD or Neo. Provide screen shots of the steps completed in the project showing the results of date and time values you have recorded.
Provide a brief description of each screen shot about the information it contains. Briefly describe the main steps that you think are necessary and important to locate date and time values while analysing the file.

Task # 2: Research Project and Report

You have been assigned a digital forensics case to investigate involving a potential monetary fraud in an organisation. The CTO of the organisation has given you access to the workstation and other necessary hardware, e.g. USB, of one of his employees who she thinks is potentially involved in this fraud. Your job as a digital forensics examiner is to conduct this investigation. You are required to create a (investigation) plan and describe the standard practice procedure that is used in such investigations. Your plan must include the procedures for collecting the digital data, securing the evidence that you may collect and then describing the method to validate the collected data, e.g. calculating hash values and specifying the hash algorithm that you intend to use, e.g. SHA-3, MD5 etc. You can make some reasonable assumptions if required when describing your plan / procedures.

Deliverable: Write a 1000-1500 word report (approximately 2-3 pages) that outlines the investigation plan, procedures to secure the digital evidence, and data validation methods. Your plan should include steps that you may take to conduct this investigation. There is no need to provide detailed explanation of each of the tasks that you think are necessary for this investigation and are listed in your plan. For example, one of the steps in your plan can be 'Making forensic copy of the digital evidence'. The descriptiono of this step could be: 'After acquiring the digital evidence and securing it properly, a forensic copy of the digital evidence will be made using a proper standardised forensic tool such as Autopsy or OSForensics'.

However, the plan itself should be detailed and as comprehensive as you can think of covering all possible steps, starting from collecting the evidence, securing it, investigating / analysing it and then preparing the report of your investigation. If you use any references, make sure you cite those references at the end of your plan document.

RATIONALE
This assessment task will assess the following learning outcome/s:
• be able to formulate a digital forensics process.
• be able to evaluate the technology in digital forensics to detect, prevent and recover from digital crimes.
• be able to analyse data on storage media and various file systems.
• be able to collect electronic evidence without compromising the original data.
• be able to evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab.

• be able to critique and compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation.
• be able to prepare and defend reports on the results of an investigation.

Reference no: EM132936420

Questions Cloud

What was the number of equivalent units of production : The Made Rite Shoe Corporation uses a process costing system. What was the number of equivalent units of production for direct materials?
What is the second year depreciation expense : The popper produced 14,000 buckets of popcorn. What is the second year depreciation expense on the popcorn popper assuming units of output depreciation?
Calculate the net income and sales : Assume that the average margin of maintenance service firms is 2.5%, and that the average ROI for such firms is also 18%. Calculate the net income, sales
What is the accumulated depreciation after the second year : Celebrity Allures Inc, What is the accumulated depreciation after the second year on the popcorn popper assuming straight line depreciation?
Formulate a digital forensics process : Determine and explain the legal and ethical considerations for investigating and prosecuting digital crimes - formulate a digital forensics process
What is the monthly operating income advantage : The Production Division has no alternative use for the facilities used to manufacture the stuffing. What is the monthly operating income advantage
How much is the cost of the copy machine : Pineapple also bought a maintenance package which will be billed at $35 a month beginning in May. How much is the cost of the copy machine?
What is the present value of this security : What is the present value of this security if the first payment is made two years from now? (The security still makes annual payments after that as before.)
What is the target cost : Sheltar's sales are currently? 100,000 televisions per year. What is the target cost if target operating income is? 25% of? sales

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd