Reference no: EM133848217
Advanced Digital Forensics
Assessment 1
Forensics Report
Task 1: Reflection on Hands-on Projects
Complete the following hands-on projects from your textbook:
Hands-on Project 1-1
Hands-on Project 1-2
Hands-on Project 1-4
Hands-on Project 1-5
Hands-on Project 1-6
Deliverable: Write a 500-1000 words (up to two A4 pages) report on lessons learned from these projects. Comment on each project individually within the two page limit. You can write one lesson learned from each of the projects. Hire best assignment help now!
Task 2: Case Project
Complete the Hands-on Project 5-2 from your textbook (Nelson, Phillips, & Steuart, 6th edition, 2019, p. 260-261). Inthis project you will explore the MFT and learn howto locate time and date values in the metadata of a file you create during this project.
Deliverable: Writea 500-1000 words paper after completing this project and report what metadata you have discovered from the file you analysed using WinHex editor. Provide screen shots of the steps completed in the project showing the results of date and time values you have recorded. Briefly describe the main steps that you think are necessary and important to locate date and time values while analysing the file.
Task 3: Research Project
You have been assigned a digital forensics case to investigate involving a potential monetary fraud in an organisation. The CTO of the organisation has given you access to the workstation and other necessary hardware, e.g. USB, of one of his employees who she thinks is potentially involved in this fraud. Your job as a digital forensics examiner is to conduct this investigation. Youare required to createa (investigation) plan and describe the standard practice procedure that is used in such investigations. Your plan must include the procedures for collecting the digital data, securing the evidence that you may collect and then describing the method to validate the collected data, e.g. calculating hash values and specifying the hash algorithm that you intendto use, e.g. SHA-3, MD5 etc. You can make some reasonable assumptions if required when describing your plan / procedures.
RATIONALE
This assessment task will assess the following learning outcome/s:
be able to determine and explain the legal and ethical considerations for investigating and prosecuting digital crimes.
be able to formulate a digital forensics process.
be able to evaluate the technology in digital forensics to detect, prevent and recover from digital crimes.
be able to analyse data on storage media and various file systems.
be able to collect electronic evidence without compromising the original data.
be able to prepare and defend reports on the results of an investigation.
Assessment 2:
Assessment - Video Forensics Techniques
Title: Report on a Real-Life Security Incident
Objective:
To analyze a real-life security incident.
To advise on the forensic techniques and tools that can be applied to investigate the incident.
Instructions:
Incident Selection: Select a real-life security incident. This can be a well-documented case or a hypothetical scenario based on real events.
Incident Description: Provide a detailed description of the incident, including how it was discovered, the nature of the breach, the impact, and the response.
Forensic Techniques and Tools:
Identify and describe the forensic techniques that should be applied to investigate the incident.
Recommend specific forensic tools for each technique and justify your choices.
Analysis and Conclusion: Analyze the effectiveness of the chosen techniques and tools in resolving the incident. Provide a conclusion with recommendations for preventing similar incidents in the future.
References: Include at least 5 references from credible sources to support your analysis.
Length: The report should be 1250-1500 words.
Assessment - Presentation
Students need to record the presentation on the Assessment 3 how they have completed and what were the difficulties they faced in the Project.
Section A - Assessment Information
TASK
Task 1: Recovering scrambled bits
For this task I will upload a text file with scrambled bits on the subject interact2 site closer to the assignment due date. You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment.
Task 2: Digital Forensics Report
In this major task you are asked to prepare a digital forensic report for the following scenario after carefully reading the scenario and looking at textbook figures as referred below:
You are investigating a possible intellectual property theft by a new employee of Superior Bicycles, Inc. This employee, Tom Johnson, is the cousin of Jim Shu, an employee who had been terminated. Bob Aspen is an external contractor and investor who gets a strange e-mail from Terry Sadler about Jim Shu's new project (shown in Figure 8-5 of the textbook on p. 350). Bob forwards the e-mail to Chris Robinson (the president of Superior Bicycles) to inquire about any special projects that might need capital investments. Chris forwards the e-mail to the general counsel, Ralph Benson, asking him to look into it. He also forwards it to Bob Swartz, asking him to have IT look for any e-mails with attachments. After a little investigation, Bob Swartz forwards an e-mail IT found to Chris Robinson (shown in Figure 8-6 of the textbook on p. 350).
Chris also found a USB drive on the desk Tom Johnson was assigned to. Your task is to search for and determine whether the drive contains any proprietary Superior Bicycles, Inc. data in the form of any digital photograph as an evidence. In particular, you may look for graphic files such as JPEG on the USB drive hidden with different format. Note for the USB drive image, you need to download the "C08InChp.exe" file from the download section of Chapter 8 on the student companion site of the textbook (Nelson, Phillips, & Steuart, 6/e, 2019).
Your task is to search all possible places data might be hidden (e-mails and USB drive) and recover and present any digital evidence in the report.
RATIONALE
This assessment task will assess the following learning outcome/s:
be able to determine and explain the legal and ethical considerations for investigating and prosecuting digital crimes.
be able to formulate a digital forensics process.
be able to evaluate the technology in digital forensics to detect, prevent and recover from digital crimes.
be able to analyze data on storage media and various file systems.
be able to collect electronic evidence without compromising the original data.
be able to critique and compose technical tactics in digital crimes and assess the steps involved in a digital forensics' investigation.
be able to prepare and defend reports on the results of an investigation.