Perform a forensic investigation into digital evidence

Assignment Help Software Engineering
Reference no: EM133141428

CO4514 Digital Forensic Technology - University of Central Lancashire

Evidence Chain of Custody Tracking

Assignment - Perform a forensic investigation into digital evidence.

Audience: Non-technical client/investigation commissioner

You are provided with an evidence file available on Blackboard.

Perform and report on individual parts of a digital forensic investigation.

• Check that the disk acquisition has been performed correctly
• Maintain investigative documentation
• Use forensic tools to analyse and interpret digital data.
• Create an expert report containing the findings from your investigation
• Keep contemporaneous notes

This is a simulated investigation and doesn't include the analysis of lots of irrelevant data. The evidence that is provided is small and doesn't include any tricks. You will however need to interpret the data/evidence and draw your own conclusions based on the evidence you find.

You will create an expert report to communicate your findings. See the scenario below for further information about your investigation. You will keep notes of your investigative actions contemporaneously; they should be as long as is necessary but should reflect your investigation process accurately.

Assignment Scenario
You are a forensic investigator working for the UCLAN High Tech Crime Unit. You have been contacted by the Managing Director of the company ‘Vamos Solutions'. One of their employees has been accused of stealing company secrets.

The employee has attempted to smuggle company secrets out of the work building by copying company secrets onto a USB data storage device. While leaving the building the employee was detained by on-site security and the USB storage device was discovered. This USB storage device has been processed by a forensic imaging technician and the forensic image has been obtained.

You have been provided with a forensic image of the USB data storage device. This is called exhibit CST/001. This is available for download via Blackboard and is available under CO4514->assignments->co4514ass2year3.e01. This is anevidence file that contains the USB image file and must be viewed in forensic software such as Autopsy.

You have been asked to answer the following questions.

Question 1 - Is there any evidence to suggest that the company secrets have been copied onto the USB pen?

Question 2 - Is there any evidence to suggest that the suspect has tried to hide any data?

Question 3 - Any evidence to suggest the reason why the suspect has attempted to steal this data?

Question 4 - What further evidence may be needed by the investigation team to support any of the facts discovered during your investigation?

Note: question 4 is not about the evidence that you will find during your investigation; it is about identifying what further evidence could possibly be found if you had access to other evidence sources (for example, the suspect's office computer).

Attachment:- Digital Forensic Technology.rar

Reference no: EM133141428

Questions Cloud

Explain purpose of each account to your specific business : List at least three asset accounts and three liability accounts you would expect your new business to have. Explain the purpose of each account
Prepare a schedule which shows expected cash receipts : Past experience indicates that 70% of sales each month are on credit. Prepare a schedule which shows expected cash receipts
Disabled in diversity plan : Address the importance of including the disabled in the diversity plan.
Determine the percentage increase in annual profits : c. Determine the percentage increase in annual profits if North Corporation increases its selling price by 20% and all other factors remain constant
Perform a forensic investigation into digital evidence : Perform a forensic investigation into digital evidence and What further evidence may be needed by the investigation team to support any of the facts discovered
Description of the data breach : Description of the data breach, including outcomes for the affected organization. Clear and thorough description of the data breach and outcomes for affected
Compute the predetermined overhead rate : The actual overhead is $16,000,000 and the actual machine hours are 330,000 hours. Compute the predetermined overhead rate based on machine hours
Calculate the weighted average flotation costs : The company is planning to do an expansion project for $5,000,000 plus $200,000 of installation costs. Calculate the weighted average flotation costs
Prepare the entry in journal form with explanation : On July 1, 2010, Boston Corporation issued bonds with a face value of $500,000. Prepare the entry in journal form with explanation

Reviews

Write a Review

Software Engineering Questions & Answers

  Review the agile and systems development life cycle

Review the agile and systems development life cycle (SDLC) software development methodologies.

  Demonstrate an understanding of the systems development

using the internet or strayer university databases research health care organizations providers that have recently had

  Create a use case based on relating functional requirements

Describe (in a one to two (1-2) page narrative) a use case, complete with typical and alternate courses, that documents the event of a bank customer withdrawing money from an ATM.

  Describing how the internet works

Describing how the Internet works. For the Internet activities explained above, describes Internet risks and actions that various organization take to reduce risks arising from operating online

  Explain changes needed to implement the new functionalities

Analysing and designing the changes needed to implement the new functionalities in the sample solution. Before we can start the implementation we need to analyse the project and describe the changes we will be implementing

  Write a program to simulate the scheduling of cpu

In this project, write a program to simulate the scheduling of CPU. The program will randomly generate process CPU burst based on user's setting. Performance is measured and analyzed in a report.

  Creating a flowchart and pseudocode

You have a document with the grades of students from Starting Programming, along with the students data. Your part of the program has to loop through records,

  Conduct a forensic investigation to recover any pdf files

CSCI 681 Lab-Statement of Work Project: Forensic Recovery. Conduct forensic investigation to recover any PDF files deleted from one of its networked workstation

  Determine business requirements throughout the sdlc

Effectively communicate with stakeholders to determine, manage, and document business requirements throughout the SDLC, Perform modeling to assist with analysis and decision making

  Explain tool used to infer the conceptual model

Another tool used to infer the conceptual model are the end user's forms. The form below will help you identify the entities and relationships.

  Sketch the use case diagram for stillwater antiques

Sketch the use case diagram for the following circumstances Stillwater Antiques purchases and sells one-of-a-kind antiques of all kinds.

  Journey beyond hells gate

This text based game was created to further our knowledge of java, sql and the software development cycle as well as to satisfy the requirements - The game functions will be controlled through a graphical user interface which will consist of a com..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd