Perform a forensic investigation into digital evidence

Assignment Help Software Engineering
Reference no: EM133141428

CO4514 Digital Forensic Technology - University of Central Lancashire

Evidence Chain of Custody Tracking

Assignment - Perform a forensic investigation into digital evidence.

Audience: Non-technical client/investigation commissioner

You are provided with an evidence file available on Blackboard.

Perform and report on individual parts of a digital forensic investigation.

• Check that the disk acquisition has been performed correctly
• Maintain investigative documentation
• Use forensic tools to analyse and interpret digital data.
• Create an expert report containing the findings from your investigation
• Keep contemporaneous notes

This is a simulated investigation and doesn't include the analysis of lots of irrelevant data. The evidence that is provided is small and doesn't include any tricks. You will however need to interpret the data/evidence and draw your own conclusions based on the evidence you find.

You will create an expert report to communicate your findings. See the scenario below for further information about your investigation. You will keep notes of your investigative actions contemporaneously; they should be as long as is necessary but should reflect your investigation process accurately.

Assignment Scenario
You are a forensic investigator working for the UCLAN High Tech Crime Unit. You have been contacted by the Managing Director of the company ‘Vamos Solutions'. One of their employees has been accused of stealing company secrets.

The employee has attempted to smuggle company secrets out of the work building by copying company secrets onto a USB data storage device. While leaving the building the employee was detained by on-site security and the USB storage device was discovered. This USB storage device has been processed by a forensic imaging technician and the forensic image has been obtained.

You have been provided with a forensic image of the USB data storage device. This is called exhibit CST/001. This is available for download via Blackboard and is available under CO4514->assignments->co4514ass2year3.e01. This is anevidence file that contains the USB image file and must be viewed in forensic software such as Autopsy.

You have been asked to answer the following questions.

Question 1 - Is there any evidence to suggest that the company secrets have been copied onto the USB pen?

Question 2 - Is there any evidence to suggest that the suspect has tried to hide any data?

Question 3 - Any evidence to suggest the reason why the suspect has attempted to steal this data?

Question 4 - What further evidence may be needed by the investigation team to support any of the facts discovered during your investigation?

Note: question 4 is not about the evidence that you will find during your investigation; it is about identifying what further evidence could possibly be found if you had access to other evidence sources (for example, the suspect's office computer).

Attachment:- Digital Forensic Technology.rar

Reference no: EM133141428

Questions Cloud

Explain purpose of each account to your specific business : List at least three asset accounts and three liability accounts you would expect your new business to have. Explain the purpose of each account
Prepare a schedule which shows expected cash receipts : Past experience indicates that 70% of sales each month are on credit. Prepare a schedule which shows expected cash receipts
Disabled in diversity plan : Address the importance of including the disabled in the diversity plan.
Determine the percentage increase in annual profits : c. Determine the percentage increase in annual profits if North Corporation increases its selling price by 20% and all other factors remain constant
Perform a forensic investigation into digital evidence : Perform a forensic investigation into digital evidence and What further evidence may be needed by the investigation team to support any of the facts discovered
Description of the data breach : Description of the data breach, including outcomes for the affected organization. Clear and thorough description of the data breach and outcomes for affected
Compute the predetermined overhead rate : The actual overhead is $16,000,000 and the actual machine hours are 330,000 hours. Compute the predetermined overhead rate based on machine hours
Calculate the weighted average flotation costs : The company is planning to do an expansion project for $5,000,000 plus $200,000 of installation costs. Calculate the weighted average flotation costs
Prepare the entry in journal form with explanation : On July 1, 2010, Boston Corporation issued bonds with a face value of $500,000. Prepare the entry in journal form with explanation

Reviews

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd