ITC597 Digital Forensics Assignment

Assignment Help Computer Engineering
Reference no: EM132522778 , Length: word count:2500

ITC597 Digital Forensics - Charles Sturt University

Assessment - Tasks and Forensics Report

Learning outcome 1: be able to determine and explain the legal and ethical considerations for investigating and prosecuting digital crimes.

Learning outcome 2: be able to formulate a digital forensics process.

Learning outcome 3: be able to evaluate the technology in digital forensics to detect, prevent and recover from digital crimes.

Learning outcome 4: be able to analyse data on storage media and various file systems.

Learning outcome 5: be able to collect electronic evidence without compromising the original data.

Learning outcome 6: be able to critique and compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation.

Learning outcome 7: be able to prepare and defend reports on the results of an investigation.

Task 1: Recovering scrambled bits

For this task I will upload a text file with scrambled bits on the suject interact2 site closer to the assignment due date. You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment.

Deliverable: Describe the process used in restoring the scrambled bits and insert plain text in the assignment.

Task 2: Digital Forensics Report

In this major task you are asked to prepare a digital forensic report for the following scenario after carefully reading the scenario and looking at textbook figures as referred below:

You are investigating a possible intellectual property theft by a new employee of Superior Bicycles, Inc. This employee, Tom Johnson, is the cousin of Jim Shu, an employee who had been terminated. Bob Aspen is an external contractor and investor who gets a strange e-mail from Terry Sadler about Jim Shu's new project (shown in Figure 8-5 of the textbook on p. 350). Bob forwards the e-mail to Chris Robinson (the president of Superior Bicycles) to inquire about any special projects that might need capital investments. Chris forwards the e-mail to the general counsel, Ralph Benson, asking him to look into it. He also forwards it to Bob Swartz, asking him to have IT look for any e-mails with attachments. After a little investigation, Bob Swartz forwards an e-mail IT found to Chris Robinson (shown in Figure 8-6 of the textbook on p. 350).

Chris also found a USB drive on the desk Tom Johnson was assigned to. Your task is to search for and determine whether the drive contains any proprietary Superior Bicycles, Inc. data in the form of any digital photograph as an evidence. In particular, you may look for graphic files such as JPEG on the USB drive hidden with different format. Note for the USB drive image, you need to download the "C08InChp.exe" file from the download section of Chapter 8 on the student companion site of the textbook (Nelson, Phillips, & Steuart, 6/e, 2019).

Your task is to search all possible places data might be hidden (e-mails and USB drive) and recover and present any digital evidence in the report.

Deliverable: For this forensic examination, you need to provide a report of 1800-2000 words (approximately 5 A4 pages).

Attachment:- Digital Forensics.rar

Reference no: EM132522778

Questions Cloud

Identify two different conditions under which the regression : Identify two different conditions under which the regression line should not be used to make predictions.
Compute the required EPS amount : The company has 230,000 common shares outstanding as of January 1, 2020, and declared a 1-for-2 reverse stock split on March 31. Compute the required EPS amount
Asymmetric and symmetric encryption : Examine the fundamental differences and similarities between asymmetric and symmetric encryption.
What was the purpose or rationale of the research : This week, you will select an agency for, and begin the preliminary research associated with, completing your Final Project. Prior to beginning work on this.
ITC597 Digital Forensics Assignment : ITC597 Digital Forensics Assignment Help and Solution, Charles Sturt University - Assessment Writing Service - formulate a digital forensics process
Find what is the ninty-day forward rate : The 90-day forward rate is quoted at a premium of 5.00 percent on the euro. What is the 90-day forward rate? (Round answer to 6 decimal places)
What is the required rate of returns on msft stock : What is the required rate of returns on MSFT stock if its beta is 1.24. Currently, 3-month T-bill rate is 4% and expected returns on S&P 500 index is 16%
Probability of the event : For a random variable X, if V( X ) = 1, then the probability of the event: (X - E(X) )2 > 4,
Business value dashboard : What are the most important parts of this dashboard? How do these parts help the business managers? How do they help the individual contributors?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Search on the various office suites available in the market

Johanna is doing an online course in IT. She wants to submit her assignments to her instructor, who reviews them and provides feedback in the document. Johanna also wants to include charts, graphs, and diagrams in her assignments.

  What are several reasons why planning ahead may have helped

The rapid development face-off was a competition between rapid application development (RAD) teams from the leading consulting firms in the United States. What are several reasons why planning ahead may have helped E&Y win?

  Create functions and put all the code in the main

TresKom was hired by the previous government to account for expenses in the Choliseo VIP lounge.

  Write a simple program to do matrix computations

Write a simple program to do matrix computations. It should commence by inputting two 2 times 2 matrices, then which operation to perform.

  Create a questionnaire and present to current employees

Create a questionnaire and present to current employees. Create a model showing the current data flow of the mail-order catalog business.

  Write a second function whose name is passed to fzero

A call of the form root - fzero('f' ,xO) can be used to compute a zero of the function I(x) near x = xo. Write a MATLAB function z - cubeRoot.

  Prepare an opening statement that specifies organization

The graphically depicted solution is not included in the required page length. Explain what the client can expect from your services.

  Research and write a short description of internet

research and write a short description of internet technologies 3-4 pages not including cover page or reference list

  Deduce a set of boundary-layer differential equations

Starting with the general viscous energy equation, show by a succession of steps how and why it reduces to the classic heat-conduction equation for a solid.

  Explain the properties of the impulse signal

Use properties of the impulse signal d(t) and the unit-step signal u(t) to perform the simplifications. Be careful to distinguish between multiplication.

  In brief describe rudimentary nms

Briefly explain rudimentary NMS (network management system) software components and the software applications that are required to support a network system.

  Describe the concept and purpose of the star schema

Describe the concept and purpose of the star schema. What does a Fact represent in a star schema? What doDimensions represent in a start schema?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd