Investigate involving a potential monetary fraud

Assignment Help Other Subject
Reference no: EM133848217

Advanced Digital Forensics

Assessment  1

Forensics Report

Task 1: Reflection on Hands-on Projects
Complete the following hands-on projects from your textbook:
Hands-on Project 1-1
Hands-on Project 1-2
Hands-on Project 1-4
Hands-on Project 1-5
Hands-on Project 1-6
Deliverable: Write a 500-1000 words (up to two A4 pages) report on lessons learned from these projects. Comment on each project individually within the two page limit. You can write one lesson learned from each of the projects. Hire best assignment help now!

Task 2: Case Project
Complete the Hands-on Project 5-2 from your textbook (Nelson, Phillips, & Steuart, 6th edition, 2019, p. 260-261). Inthis project you will explore the MFT and learn howto locate time and date values in the metadata of a file you create during this project.

Deliverable: Writea 500-1000 words paper after completing this project and report what metadata you have discovered from the file you analysed using WinHex editor. Provide screen shots of the steps completed in the project showing the results of date and time values you have recorded. Briefly describe the main steps that you think are necessary and important to locate date and time values while analysing the file.

Task 3: Research Project
You have been assigned a digital forensics case to investigate involving a potential monetary fraud in an organisation. The CTO of the organisation has given you access to the workstation and other necessary hardware, e.g. USB, of one of his employees who she thinks is potentially involved in this fraud. Your job as a digital forensics examiner is to conduct this investigation. Youare required to createa (investigation) plan and describe the standard practice procedure that is used in such investigations. Your plan must include the procedures for collecting the digital data, securing the evidence that you may collect and then describing the method to validate the collected data, e.g. calculating hash values and specifying the hash algorithm that you intendto use, e.g. SHA-3, MD5 etc. You can make some reasonable assumptions if required when describing your plan / procedures.

RATIONALE
This assessment task will assess the following learning outcome/s:
be able to determine and explain the legal and ethical considerations for investigating and prosecuting digital crimes.
be able to formulate a digital forensics process.
be able to evaluate the technology in digital forensics to detect, prevent and recover from digital crimes.
be able to analyse data on storage media and various file systems.
be able to collect electronic evidence without compromising the original data.
be able to prepare and defend reports on the results of an investigation.

Assessment 2:

Assessment - Video Forensics Techniques

Title: Report on a Real-Life Security Incident

Objective:
To analyze a real-life security incident.
To advise on the forensic techniques and tools that can be applied to investigate the incident.

Instructions:
Incident Selection: Select a real-life security incident. This can be a well-documented case or a hypothetical scenario based on real events.
Incident Description: Provide a detailed description of the incident, including how it was discovered, the nature of the breach, the impact, and the response.

Forensic Techniques and Tools:
Identify and describe the forensic techniques that should be applied to investigate the incident.
Recommend specific forensic tools for each technique and justify your choices.
Analysis and Conclusion: Analyze the effectiveness of the chosen techniques and tools in resolving the incident. Provide a conclusion with recommendations for preventing similar incidents in the future.
References: Include at least 5 references from credible sources to support your analysis.

Length: The report should be 1250-1500 words.

Assessment - Presentation

Students need to record the presentation on the Assessment 3 how they have completed and what were the difficulties they faced in the Project.

Section A - Assessment Information

TASK

Task 1: Recovering scrambled bits

For this task I will upload a text file with scrambled bits on the subject interact2 site closer to the assignment due date. You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment.

Task 2: Digital Forensics Report
In this major task you are asked to prepare a digital forensic report for the following scenario after carefully reading the scenario and looking at textbook figures as referred below:

You are investigating a possible intellectual property theft by a new employee of Superior Bicycles, Inc. This employee, Tom Johnson, is the cousin of Jim Shu, an employee who had been terminated. Bob Aspen is an external contractor and investor who gets a strange e-mail from Terry Sadler about Jim Shu's new project (shown in Figure 8-5 of the textbook on p. 350). Bob forwards the e-mail to Chris Robinson (the president of Superior Bicycles) to inquire about any special projects that might need capital investments. Chris forwards the e-mail to the general counsel, Ralph Benson, asking him to look into it. He also forwards it to Bob Swartz, asking him to have IT look for any e-mails with attachments. After a little investigation, Bob Swartz forwards an e-mail IT found to Chris Robinson (shown in Figure 8-6 of the textbook on p. 350).

Chris also found a USB drive on the desk Tom Johnson was assigned to. Your task is to search for and determine whether the drive contains any proprietary Superior Bicycles, Inc. data in the form of any digital photograph as an evidence. In particular, you may look for graphic files such as JPEG on the USB drive hidden with different format. Note for the USB drive image, you need to download the "C08InChp.exe" file from the download section of Chapter 8 on the student companion site of the textbook (Nelson, Phillips, & Steuart, 6/e, 2019).

Your task is to search all possible places data might be hidden (e-mails and USB drive) and recover and present any digital evidence in the report.

RATIONALE
This assessment task will assess the following learning outcome/s:
be able to determine and explain the legal and ethical considerations for investigating and prosecuting digital crimes.
be able to formulate a digital forensics process.
be able to evaluate the technology in digital forensics to detect, prevent and recover from digital crimes.
be able to analyze data on storage media and various file systems.
be able to collect electronic evidence without compromising the original data.
be able to critique and compose technical tactics in digital crimes and assess the steps involved in a digital forensics' investigation.
be able to prepare and defend reports on the results of an investigation.

Reference no: EM133848217

Questions Cloud

Sexually transmitted infection : A patient has a sexually transmitted infection (STI) but does not want you or the doctor to contact any former sex partners.
Normal scheduled services : The current COVID-19 pandemic has caused many churches to close and alter their normal scheduled services.
Decrease the incidence of smoking : Within your community, there has been a large increase in teenage smoking, and community leaders are developing a plan to decrease the incidence of smoking
Patient taking mood disorder therapy : Discuss assessment data a nurse would gather for a patient taking mood disorder therapy.
Investigate involving a potential monetary fraud : Investigate involving a potential monetary fraud in an organisation. The CTO of the organisation has given you access to the workstation
Effective to treat hypertension and heart failure : Is Angiotensin receptor blockers (ARBs) safe and and effective to treat hypertension and heart failure?
Behaviors in individual with decline in cognition : Discuss interventions used to address agitation, distress, and challenging behaviors in an individual with a decline in cognition.
How many grams of ibuprofen is the client consuming daily : A client is prescribed ibuprofen 600 mg PO q6hr for joint pain. How many grams of ibuprofen is the client consuming daily?
Discuss the four stages of alzheimers disease : Discuss the Four Stages of Alzheimer's Disease. Feel free to also share any experiences working with Alzheimer patients

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd