ITC597 - Digital Forensics Assignment Problem

Assignment Help Other Subject
Reference no: EM132382954 , Length: word count:2000

ITC597 - Digital Forensics Assignment - Charles Sturt University, Australia

Abstract - This subject provides an in-depth study of the rapidly changing and fascinating field of computer forensics. It combines both the technical expertise and the knowledge required to investigate, detect and prevent digital crimes. The subject covers the knowledge on digital forensics legislations, digital crime, forensics processes and procedures, data acquisition and validation, e-discovery tools, e-evidence collection and preservation, investigating operating systems and file systems, network forensics, art of steganography and mobile device forensics, email and web forensics, presenting reports and testimony as an expert witness.

Learning outcomes - Upon successful completion of this subject, students should:

  • be able to determine and explain the legal and ethical considerations for investigating and prosecuting digital crimes;
  • be able to formulate a digital forensics process;
  • be able to evaluate the technology in digital forensics to detect, prevent and recover from digital crimes;
  • be able to analyse data on storage media and various file systems;
  • be able to collect electronic evidence without compromising the original data;
  • be able to evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab;
  • be able to critique and compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation;
  • be able to prepare and defend reports on the results of an investigation.

Assessment 1 - Tasks and Research Project

Task -

Task 1: Investigating Hashing software and the basic usage

In this task, you need to find three hashing identify software or utilities regardless MS Windows and/or Linux platforms these tools can run on and provide three quick samples or procedures or steps that to show how to use this three software or utilities to identify a hash string. Three (3) marks for each software or utility named and a sample of how to identify a hash string. You can use MD5, SHA varieties or a hash string at your choice.

Deliverable: Three software or utility named and provided details of how to identify a hash string from each of software or utilities. Provide figure number and a short description for each snapshot. All three software or utilities need at least a reliable reference for each.

Task 2: Case Project

Complete the Hands-on Project 9-4. (Nelson, Phillips, & Steuart, 6th edition, 2019, p. 411) Deliverable: Write a 300-500 words paper explaining the importance of hash values used in the files you examined. Provide screenshots of the steps completed in the project.

Task 3: Research Project

You're investigating a case involving a 2 GB drive that you need to copy at the scene. Describe the three types of acquisitions - physical, logical, and sparse that you can use to copy the drive accurately. Be sure to include your software and media choices.

Deliverable: Write a 300-500 word report that outlines standard investigation management and data validation methods.

Note: Combine deliverables of all three tasks mentioned above in a single document (only MS Word (preferable) or pdf, please note other formats e.g. *.zip, *.rar etc are NOT allowed).

Assessment 2 - Tasks and Forensics Report

Task -

Task 1: Recovering scrambled bits

For this task I will upload a text file with scrambled bits on the suject interact2 site closer to the assignment due date. You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment.

Deliverable: Describe the process used in restoring the scrambled bits and insert plain text in the assignment.

Task 2: Digital Forensics Report

In this major task you are assumed a digital forensics investigator and asked to prepare a digital forensic report for the following scenario: You are investigating a real-world situation, an Enron scandal. Research Kenneth Lay's role in the Enron case and then examine his emails.

Student needs to obtain the archived file for this case around 18.0 GB and with a minimal registration or can make a copy from your lecturer. For further hints and the best software or utilities to accelerate the information searching should refer to Hands-on 11-1 and 11-2 on p.p 488-490, Nelson, Phillips, & Steuart, 6/e, 2019.

Your task is to search all possible data that might relate to Enron founder, Kenneth Lay, recover and present any digital evidence in the report.

Deliverable: For this forensic examination, you need to provide a report of 1800-2000 words in the format described in presentation section below.

Presentation - The following should be included as minimum requirements in the report structure:

Executive Summary or Abstract

This section provides a brief overview of the case, your involvement as an examiner, authorisation, major findings and conclusion

Table of Contents

Introduction

Background, scope of engagement, forensics tools used and summary of findings

Analysis Conducted

  • Description of relevant programs on the examined items
  • Techniques used to hide or mask data, such as encryption, steganography, hidden attributes, hidden partitions etc
  • Graphic image analysis

Findings

This section should describe in greater detail the results of the examinations and may include:

  • Specific files related to the request
  • Other files, including any deleted files that support the findings
  • String searches, keyword searches, and text string searches
  • Internet-related evidence, such as Web site traffic analysis, chat logs, cache files, e-mail, and news group activity
  • Indicators of ownership, which could include program registration data.

Conclusion

Summary of the report and results obtained

References

You must cite references to all material you have used as sources for the content of your work

Glossary

A glossary should assist the reader in understanding any technical terms used in the report.

Use a generally accepted source for the definition of the terms and include appropriate references.

Appendices

You can attach any supporting material such as printouts of particular items of evidence, digital copies of evidence, and chain of custody documentation.

Note - Need only 2000 words Assessment 2 - Task 2: Digital Forensics Report.

Attachment:- Digital Forensics Assignment File.rar

Reference no: EM132382954

Questions Cloud

What is the after-tax interest rate that david is paying : a. What is the before-tax interest rate (per year) on David's loan? b. What is the after-tax interest rate that David is paying?
How many shares of stock will be outstanding after the split : The firm just announced a 5-for-2 stock split. How many shares of stock will be outstanding after the split?
What will the stock price per share be after the stock : DE's is going to use all of its excess cash to repurchase shares of stock. What will the stock price per share be after the stock repurchase is completed?
Compare vertical and horizontal integration : Compare and contrast vertical and horizontal integration. What are some of the variables make each of these integrations valuable? Provide an example.
ITC597 - Digital Forensics Assignment Problem : ITC597 - Digital Forensics Assignment Help and Solution, Assessment Help - Charles Sturt University, Australia - Digital Forensics Report
Loan proceeds to repurchase shares : The tax rate is 30 percent. What will the value of BC Co. be if the firm borrows $20,000 and uses the loan proceeds to repurchase shares?
What are the core resources and capabilities of emerging : What are the core resources and capabilities of emerging multinationals from emerging economies? Some of the copycat strategies embraced by emerging multination
Firms unlevered cost of equity capital : Its WACC is 15 percent, and its cost of debt is 6 percent. The corporate tax rate is 30 percent. What is the firm's unlevered cost of equity capital?
How each method benefits multilayered access control : Identify what implementation method(s) can be used to incorporate multilayer access control. Describe and how each method benefits multilayered access control.

Reviews

Write a Review

Other Subject Questions & Answers

  Define the major legislative aspects of the nrf

Define the major legislative aspects of the NRF and these might impact and/or guide the overall responses by the Department of Homeland Security.

  An initial draft of your methods and results sections

An initial draft of your Methods and Results sections. Now that you have completed your data collection, it is important to revise your methods section.

  Define the use of non-renewable resources in the region

How the use of the renewable resources has changed the use of non-renewable resources in the region? Format your paper according to APA guidelines.

  Design a research study on the topic of the study

Review the Example Research Proposal provided in the course materials. Design a research study on the topic of the study selected in Week One and critiqued.

  Research a judge who is currently serving on the courts

To learn more about these individuals who are involved in the court system, select and research a judge who is currently serving on the courts in your state.

  How does systems thinking apply to an organizations culture

Organizations are rarely composed of just a single person or a single organization that functions without interacting with other people or organizations.

  Choose one classmates own response to the interviewers

"Explain a specific example in which you used critical thinking/problem solving strategies to solve a problem in the real world."

  Why a process is particularly important in health care

Suggest the major reasons why a well-integrated communication process is important. Why such a process is particularly important in health care organizations.

  What search patterns may be utilized at this crime scene

Why did you make the choice to use this particular search pattern for your recovery efforts?If you had a secondary choice of search patterns, what would that search pattern be, and why?Why is having a strong foundation in report writing a key charact..

  Determining factor for the company success

Explain what practical, and implementable, initiatives a corporate CEO and the company's senior executive team, can undertake to drive a company to greater.

  Critical summary of introduction to christian apologetics

Critical summary of Introduction to Christian Apologetics - This summary should reflect what you have understood. Though 1000 is the minimum length

  How theory might be applied to manage employee behavior

Using organizational behavior theory, discuss how the theory might be applied practically to manage employee behavior to bring about positive.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd