ICT600 Cyber Forensics & Incident Response Assignment

Assignment Help Computer Network Security
Reference no: EM133112802 , Length: word count:3500

ICT600 Cyber Forensics & Incident Response - Murdoch University

2012 National Gallery DC

Assume that you're a Forensic Investigator given the attached case

Task Description

You should follow forensics procedures, such as taking a hash of the image before using it and checking regularly to ensure you have not modified it. You can select and use any proprietary or open source tools that you have been introduced to or find yourselves to perform the analysis and extract any evidence present.

Your report should detail the investigation process and the findings (including copies of relevant evidence), including obstacles and problems that you encountered and how you overcame them. You can assume that the reader has a light understanding of digital forensics, so any complicated terms/techniques/etc should be explained.

You must include some screenshots in your reports with the output of the tools or the processes and when necessary to support/show how you reached your conclusions. Screenshots should not be used to excess - they merely serve to demonstrate your understanding of the tools/processes and should be used to support written explanations (not in place of).

You will be marked based on the evidence you extract, the use of appropriate tools, the detail of the process, the explanation on its relevance to the case and documentation. Remember, you report should present the information in an unbiased way. Improper handling/validation of evidence would result in loss of marks except where accurately identified and corrected.

Question A. Discuss if there is any evidence of any theft and defacement. Explain your position on this. What evidence did you find if any? How sound / reliable do you believe your evidence collection to be?

Question B. Present any evidence in a timeline format, signposting the points where you believe any offence may have occurred and other significant dates/times in the case. Compare any evidence found and timeline information side by side with the different tools available to you (e.g. ProDiscover/ OSFOrensics/ FTK Imager/ Magnet Axiom/ Autopsy, etc) and highlight any differences. Be sure to state the pros and cons of using one tool over the other.

Question C. You were provided with some sets of hard drive images. What do you think has occurred here? What are the differences between the sets of the drive images? How do you think the sets of drive images were created?

Question D. A common defence is that the actions were committed unintentionally or that the perpetrator did not know the actions were illegal. With these possible defences in mind, address how you would respond to these defences. Are there any clues that indicate intent or knowledge of criminal activity?

Question E. Conduct some research into ways that image files (graphic images) could be "tampered with". Are there ways that are undetectable, or difficult to detect? Present your findings in a short section - written in a formal referenced style. You are only expected to have approximately 5 references (good quality: reputable journal or conference papers).

Sample Structure for Report

Outline: Use the following as a starting point to structure your report

Cover Page
• Title
• Date
• Student Name / Student Number

Table of Contents
• Main contents listed with page number
• Be sure to include visible page numbers on all pages

Executive summary
• Brief Description of the event
• Brief methodology of the investigation
• Brief evidence collection and preservation methods
• Conclusion with short, generalized reasons (like bullet-points)

Methodology details
• Investigation
• Evidence collection and preservation

Finding 1 - Description
• Discussion (e.g. Inculpatory or Exculpatory)
• Supporting evidence

Finding n - Description
• Discussion (e.g. Inculpatory or Exculpatory)
• Supporting evidence

Summary and Conclusion
• Discuss if there is there any evidence of illegal drug activity(Methamphetamine).
• How sound / reliable do you believe your evidence collection tobe?
• Is the person innocent or guilty? Explain your position.

• Association Diagram of persons of interest
• Evidence listing
• Evidence Timeline (present any evidence in a timeline format, signposting the points where you believe any offence may have occurred and other significant dates/times in the case).
• Software and tools used in the investigation
• Other important listings and information as needed

References:
Your report should be your own, and you should use appropriate citation and referencing formats. All sources that you use as supporting material to your reports must be referenced according to the convention. Failure to do so will result in the loss of marks! You should use APA as a referencing style. The IEEE format is also acceptable.

Attachment:- Cyber Forensics and Incident Response.rar

Reference no: EM133112802

Questions Cloud

Maintain a growth rate : The dividend payout rate is 0.2, and the ratio of total assets to sales is constant at 1.2 (Asset turnover rate). What should the profit margin be?
Minimum standard deviation portfolio : Given a pair of assets with different standard deviations, the minimum variance portfolio is defined as the portfolio that has the lowest variance among all pos
Determine the total cost accounted : In June, one of the processing departments at Furbush Corporation had ending work in process inventory of $12,000. Determine the total cost accounted
What is the value of the factory : A factory costs $510,000. You forecast that it will produce cash inflows of $155,000 in year 1, and $215,000 in year 2. What is the value of the factory
ICT600 Cyber Forensics & Incident Response Assignment : ICT600 Cyber Forensics & Incident Response Assignment Help and Solution, Murdoch University - Assessment Writing Service
What is beta predetermined overhead rate : Beta uses normal costing and applies overhead on the basis of direct labor hours. What is Beta predetermined overhead rate
Floating rate bond pays annual coupons : A three-year floating rate bond pays annual coupons of one-year Libor (set in arrears) and is capped at 5.600%. The Libor swap curve is as given in the below ta
Important characteristics of target market : What are the important characteristics of your target market? What are the features, benefits, or differentiation of your client's services?
Compare and contrast job order costing and process costing : Compare job order costing and process costing, giving specific details as to the flow of costs for direct materials, direct labor, and manufacturing overhead

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd