Procedures of a digital forensic investigation

Assignment Help Computer Network Security
Reference no: EM132713464

CTEC5806 Digital Forensics: Principles & Practice DL - De Montfort University

Learning outcome 1: Discuss the principles underpinning digital forensic practice & their importance;

Learning outcome 2: Explain the main stages & the associated procedures of a digital forensic investigation;

Learning outcome 3: Apply the principles & practices of digital forensics to given scenarios;

Learning outcome 4: Analyse forensic images of different formats using a suitable selection of tools;

Learning outcome 5: Prepare a suitable report to present your findings and professional opinion of a given scenario;

Learning outcome 6: Critically evaluate & reflect upon your own learning in relation to digital forensics & your future learning needs to be successful in the field of digital forensics;

Tasks to be undertaken:

Use the Coursework Questions page and complete the questions in the identified sections of your report.

You will also need the coursework forensic image file that is available to download from the link on the assessment page on Blackboard. It is a large file so you will need to leave it downloading and check you have ALL of the files before starting to work on the coursework.

You will need to use Autopsy to analyse the coursework forensic image then answer the questions based on your examination, question 6 will therefore be quite a large chunk of your work so you will need to add some sub headings of your choosing.

1. A completed report of no more than 5000 words, that answers each question as set out on the questions page of the coursework packet.

2. Please Note:
a. When completed, you must PDF your report before submitting
to the Turnitin link.
This will reduce the file size and ensure the layout has been correctly saved in the PDF so there are no pictures obscuring any of the text and you can read all of the report.

Coursework Introduction

1. As a Digital Forensics Investigator, you are expected to follow several principles that are a combination of legal, ethical/moral and general guidelines.

- Discuss what these principles are and why they are important.

2. Explain the main stages of a Digital Forensic investigation, giving examples of what tasks, activities and the tools where appropriate, you would complete or use at each stage.
Background

3. Summarise the case you have been asked to investigate in your own words. State the case hypothesis.

4. What will you be looking for? Where will you expect to find such artefacts?

5. What tools are you going to use? How will they help you investigate? How do you use these tools?
Main Body - Biggest Section

6. Analyse the forensic image and illustrate step by step the process of what you did and what you found.

7. Assemble your findings in relation to what you have been asked to investigate.

8. Based on your findings, does the evidence support or refute the case hypothesis? Why? Back up your answer with demonstrable reasons and evidence.
Conclusions

9. What have you learnt during this assignment?

10. If you had to do the assignment again, what would you do differently? Why would this help you?
Appendices - each appendix should be on a separate page and have a title, plus a paragraph to explain what it is showing (except B and C which should just have a title) A. References;
B. Spreadsheet and written details about their proposed lab setup and field kit;
C. Incident Response plan;
D. E. F. etc. Screenshots you think will support your report that do not fit in the main body of your assignment.

Reference no: EM132713464

Questions Cloud

How does media influence the way view modern culture : How does media influence the way you view modern culture? Provide specific examples. Use the criteria in this week's assigned readings
What are the strengths and weakness of the scientific : What are the strengths and weakness of the scientific and the critical cultural approach to media studies? Which one is most desirable for studying the media?
Critical factors that fueled the need for it governance : What do you think were the critical factors that fueled the need for IT governance? In what ways did ISO affect the standards for network security?
Calculate its book value using straight-line depreciation : An asset costs 16,000 dollars and has a scrap value of 3,200 dollars after seven years. Calculate its book value using straight-line depreciation
Procedures of a digital forensic investigation : Apply the principles & practices of digital forensics to given scenarios and Analyse forensic images of different formats using a suitable selection of tools
Separation of leadership and management : What are some recommendation to approaches to the separation of leadership and management within scientific literature?
What ways will the skill of being able to evaluate quality : What ways will the skill of being able to evaluate the quality of reasoning on all sides better enable you to discover what is true and to make better choices
Record the collection of the note and interest by McGraw : Hill honors the note on May 9. Record the collection of the note and interest by McGraw assuming that no interest has been accrued
Distinguish between informal and formal leadership : Distinguish between informal and formal leadership. Explain how informal leaders influence others and how this impacts a health care organization.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What the Key differences between PIPEDA and the Privacy Act

CST8230 Security & Laws Assignment - What are some of the key differences between PIPEDA and the Privacy Act? List at least 2 key differences between them

  What levels of security appropriate to secure information

Determine what levels of security are appropriate to secure the information system while allowing a maximum amount of uninterrupted work flow.

  Identify one cyberattack that occurred in the last two years

Identify one cyberattack that occurred in the last 2 years. What caused the cyberattack? Do not repeat an example that has been posted previously.

  Network security hii need the attached assignment done by

hi ltbrgti need the attached assignment done by 120914. please quote the best price. the assignment should be completed

  Analyze the importance of having acceptable use policies

Analyze the importance of having acceptable use policies, remote access policies, and network security control policies. Choose one acceptable use policy, remote access policy, or network security control policy.

  Identify at least four functions of the cio using the ebk

Identify at least four functions of the CIO using the EBK as a guide. Provide examples of how the CIO would execute these functions within an organization.

  ITC513 Wireless Networking Concepts Assignment problem

ITC513 - Wireless Networking Concepts Assignment help and solution, Charles Sturt University, Assessment writing Service - provide a report on selected wireless

  How many intermediate authorities do they employ

How many intermediate authorities do they employ? How many certificates have they signed? Do not limit yourself to these questions, but provide a thorough overview of how the CA is run.

  Does the resulting scheme satisfy perfect secrecy

Consider the one time pad encryption scheme to encrypt a 1-bit message m with a 1-bit key k. Replace the XOR operation with another operation X. For which X(m,k) does the resulting scheme satisfy perfect secrecy?

  Analyze design process for defining a customized security

Analyze the design process for defining a customized security solution. Give your opinion as to which step in this design process is most significant.

  Describe the main elements of fisma in the management

From the e-Activity, describe the main elements of FISMA in the management and governance of federal information systems.

  Describe various functions within information systems area

Describe the various functions and activities within the information systems area, including the role of IT management and the CIO, structuring of IS management within an organization, and managing IS professionals within the firm.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd