Prepare digital forensics investigative plan

Assignment Help Basic Computer Science
Reference no: EM131504458

Assessment-Case study

Objectives

This assessment item relates to the course learning outcome 1 to 9 as stated on page 1 of the course profile.

Enabling objectives
1. Apply the digital forensics methodologies.
2. Write an analysis of a case study.
3. Prepare an outline of a professional digital forensic plan.

Instructions
The Case - A Digital Forensic Investigation Plan

Summary:
Delta Financial Services (DFS) is a multinational company that provides financial services for employees, individuals and companies. DFS employs around 250 employees and the company serves more than 3 million customers in Australia and New Zealand.

DFS has invested heavily in information technology for supporting its business operations and achieving competitive advantages over its competitors. Major investments were made by the company in the early 2000s but management has lost focus in updating the networks and application infrastructure that supports the business operation in recent years. The network environment between all of DFS offices is flat and relatively unrestricted. Users from one office can access systems and servers from another office. Workstations and servers are typically Macintosh-based. Firewalls and network segmentation are implemented poorly throughout the environment. Intrusion detection and logging exist on systems but they are not effectively used.

John Stuart at the Perth office comes in to work early one day and when he connects to his server, he finds that someone is already connected with several windows open. As he stares at it, the window disconnects. He connects again, but is logged out. He calls the IT manager, who follows a plan for such incidents. This includes disabling John's account and examining server security logs. He finds the IP address of the computer that is connected to John's computer and finds it belongs to a computer used to run a data projector at the New Zealand office. He rings the New Zealand office to identify the user of the computer and the logs of who has swiped into the secure building. There were four people in the building at the time, but one has since swiped out and called in sick - Tom Wills. A swift meeting with management concludes that Tom has at least violated company policy by accessing a colleague's account, but are unsure if he has violated any other policy or engaged in criminal activity, such as embezzlement. They wish to investigate and find out the extent of Tom's activities, if others are involved, who is affected and whether criminal charges need to be laid.

A team of auditors is formed by the Information Security Office to investigate the incident at the New Zealand office. Apart from reviewing paper based company documents, the auditing team is tasked to undertake digital forensic analysis of the computer systems at the Perth office. This involves gathering digital evidence from relevant desktop PC's and e-mail accounts.

Requirements:
As part of the auditing team in capacity of a Digital Forensics expert, your task is to prepare digital forensics investigative plan to enable a systematic collection of evidence and subsequent forensic analysis of the electronic and digital data. Assuming all systems are Macintosh-based, this plan should detail the following:
- propose the appropriate digital forensic methodology for the investigation and provide justification for proposing this digital forensic methodology
- describe the resources required to conduct a digital forensic investigation, including skill sets and required tools of the team members.
- outline an approach for data/evidence identification and acquisition that would occur in order to prepare the auditors for review of the digital evidence.
- outline an approach and steps to be taken during the analysis phase making the assumption the computer system is a Macintosh-based computer.
- outline an approach to recover the files that have been deleted from the computer.
- develop relevant security policies for the company.
- provide recommendations to the company for dealing with the problem.

Tips for preparing your digital forensics investigative plan
In writing the digital forensics investigative plan, students need to address the following points. Do note that points listed below are not exhaustive and need to be considered as helpful tips.
- Justify a need for digital forensics methodology and consider scope of the case including nature of alleged misconduct leading to consideration of how electronic and digital evidence may support the investigation. The plan should consider how digital forensics differs from other techniques (such as network forensics, data recovery) and detail the overall steps for the systematic digital forensics approach.
- Consider the required resources and include details regarding preparation plan for evidence gathering (such as evidence forms, types, storage media and containers), forensics workstation and peripherals needed, software/tools for analysis depending on the type of evidence to be gathered including rationale for selected tools, and consideration of team member skills in digital analysis (such as OS knowledge, skills for interviewing, consultation, working as per the needs of the auditing team and understanding of law and corporate policies).
- Detail the approach for data acquisition including the different types of evidence that can be gathered and their source depending upon the nature of the case and scope of investigation, develop a plan for data acquisition including rationale for selected plan and contingency planning, detail type of data acquisition tools needed including rationale and an outline for the data validation & verification procedures.
- Provide an outline of the forensic analysis procedures/steps depending upon the nature of evidence to be collected, and detail the validation approach. This can include techniques to counter data hiding, recovering deleted files, procedures for network and e-mail analysis.
- Provide an outline of the approach to recover the files that have been deleted from the computer.
- Develop suitable security policies for the company.
- Provide appropriate recommendations to the company for dealing with the problem.
- Prepare a professional report with an Executive Summary, a Word generated table of contents, an Introduction, a body of report with proper headings and sub-headings, and a Conclusion.

Verified Expert

The assignment is about creation of a digital forensic investigation plan and all the nuances, advantages as well as cons attached with it. The work has been designed in the form of a case study about an investment management company and the incident of digital information security breache.

Reference no: EM131504458

Questions Cloud

What is bad boys cost of capital : If Bad Boys, Inc. raises capital using 30% debt, 5% preferred stock, and 65% common stock, what is Bad Boys cost of capital?
Congressional delay in future re-authorizations : What measures could the international aviation industry employ to protect itself from a Congressional delay in future re-authorizations?
How much would you need today to pay off the mortgage : Assuming a 5.6% stated annual interest rate for the mortgage, how much would you need today to pay off the mortgage?
What is the all-in cost : Having discussed with Bank of America (BOA), you find out that a 0.45% acceptance fee is charged on that banker's acceptance which can be sold at a discount.
Prepare digital forensics investigative plan : prepare digital forensics investigative plan to enable a systematic collection of evidence and subsequent forensic analysis of the electronic and digital data
The competing visions of health care administration : Write a paper that compares and contrasts the competing visions of health care administration among stakeholders, identifies the areas where they conflict.
Growth of health care expenditures in our nation : What could be done to slow, stop, or even reverse the growth of health care expenditures in our nation?
Lists the top five elements of the health care system : Write a paper that lists the top five elements of the health care system that most need reform, in your opinion.
Entrepreneurial marketing and strategic management process : To what extent are entrepreneurial marketing and the strategic management process consistent?

Reviews

inf1504458

6/16/2017 6:18:38 AM

I simply want to update feedback about my involvement with your organization. It is essentially magnificent, and I have as of now prescribed it to some of my associates. I got the task in an opportune manner, and I was given full credit on it

inf1504458

6/16/2017 6:17:25 AM

Weighting 45% Assessment Criteria you are assessed mainly against: 1. The justification of using the computer forensic methodology and approach. 2. Providing the resources required for a digital forensic investigation, including the skill set of team members and the tools. 3. Outlining an approach for evidence identification and acquisition. 4. Outlining the steps to be taken during the analysis phase. 5. Presenting the full investigative report. Further details are available on Moodle. Referencing Style Harvard (author-date)

inf1504458

6/16/2017 6:17:16 AM

3 Practical and Written Assessment Assessment Title Written Assignment 2 - Case Study Task Description The purpose of this assignment is to produce a report based on a given case study. In this assessment, you will be specifically asked to: 1. Apply the computer forensics methodologies. 2. Write an analysis of a case study. 3. Prepare an outline of a professional computer forensic plan. Details of the case study, the questions, what you are required to submit and guidelines for approaching the assignment will be available on Moodle unit website. Assessment Due Date Week 12 Friday1:45 PM AEST Return Date to Students Written assignment 2 marks will be released at the Certification of Grades.

len1504458

5/23/2017 1:37:00 AM

Criteria Performance levels Beginning 1 Developing 2 Improving 3 Accomplished 4 Exemplary 5 Justification – Is the justification of “why use of the digital forensic methodology and approach is warranted” sound? Resources – Are the resources required to conduct a digital forensic investigation completely listed? Approach – Is the approach for evidence identification and acquisition reasonable? Steps – Are steps to be taken during the analysis phase reasonable? Recovery - Are steps to be taken during the recovery phase reasonable? Policies – Are they suitable for the company? Recommendations – Are they appropriate? References – Are the references correctly cited? Formatting and readability – Is the paper consistently formatted with balanced structure?

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd