Provide an outline of the forensic analysis procedures

Assignment Help Other Subject
Reference no: EM13845888

Assessment- Case study

Word Limit: 2000-2500 words excluding references

Objectives

This assessment item relates to the course learning outcome 1 to 9 as stated on page 1 of the course profile.

Enabling objectives

1. Apply the digital forensics methodologies.

2. Write an analysis of a case study.

3. Prepare an outline of a professional digital forensic plan.

Instructions

The Case - A Digital Forensic Investigation Plan

Summary:

Impact Financial Services Australia (IFSA) is a specialist provider of high quality, consumer finance services to a global network of customers. It has been operating since 1990 and employs more than 1500 employees worldwide. IFSA serves more than 5 million customers globally. The company's main office is situated in Melbourne with other branch offices located in all major cities in Australia.

IFSA has invested heavily in information technology for supporting its global business operations and achieving competitive advantages over its competitors. Major investments were made by the company in 2001 but management has lost focus in updating the networks and application infrastructure that supports the business operation in recent years. The network environment between all of IFSA offices is flat and relatively unrestricted. Users from one office can access systems and servers from another office. Workstations and servers are typically UNIX/LINUX-based. Firewalls and network segmentation are implemented poorly throughout the environment. Intrusion detection and logging exist on systems but they are not effectively used.

One of the employees Richard at the Sydney office went in to work early and when he got connected to his computer, he found that someone was already connected to his computer with several windows opened. As he stared at it, his computer system got disconnected. He then tried to get connected again, but he was logged out. He called the IT manager, who followed a plan for such incidents. This includes disabling Richard's account and examining the server security logs. The IT manager found that the IP address of the computer that was connected to John's computer belongs to a computer used to run a data projector at the Melbourne office. He quickly rang the Melbourne office to check who has used the computer and requested the logs of people who have swiped into the building. He found out that even that machine was compromised. An urgent meeting with the management concluded that security breach has occurred and Forensic team will be set up to investigate this matter and stop reoccurrence of such issues. As an information security officer, you are asked by the management to investigate to find out the extent of this security breach and Richard's activities, if others are involved, who is affected and whether criminal charges need to be laid.

Requirements:

Your task is to prepare digital forensics investigative plan to enable a systematic collection of evidence and subsequent forensic analysis of the electronic and digital data. Assuming all systems are UNIX/LINUX based, this plan should detail following:

• justify why use of the digital forensic methodology and approach is warranted including appropriate procedures for corporate investigations such as this.

• describe the resources required to conduct a digital forensic investigation, including skill sets and required tools of the team members.

• outline an approach for data/evidence identification and acquisition that would occur in order to prepare the auditors for review of the digital evidence.

• outline an approach and steps to be taken during the analysis phase making the assumption the computer system is a UNIX/LINUX-based computer.

• make a recommendation on the action that the company needs to take against the offender.

Tips for preparing your digital forensics investigative plan

In writing the digital forensics investigative plan, students need to address following points. Do note that points listed below are not exhaustive and need to be considered as helpful tips.

• Justify a need for digital forensics methodology and consider scope of the case including nature of alleged misconduct leading to consideration of how electronic and digital evidence may support the investigation. The plan should consider how digital forensics differs from other techniques (such as network forensics, data recovery) and detail the overall steps for the systematic digital forensics approach.

• Consider the required resources and include details regarding preparation plan for evidence gathering (such as evidence forms, types, storage media and containers), forensics workstation and peripherals needed, software/tools for analysis depending on the type of evidence to be gathered including rationale for selected tools, and consideration of team member skills in digital analysis (such as OS knowledge, skills for interviewing, consultation, working as per the needs of the auditing team and understanding of law and corporate policies).

• Detail the approach for data acquisition including the different types of evidence that can be gathered and their source depending upon the nature of the case and scope of investigation, develop a plan for data acquisition including rationale for selected plan and contingency planning, detail type of data acquisition tools needed including rationale and an outline for the data validation & verification procedures.

• Provide an outline of the forensic analysis procedures/steps depending upon the nature of evidence to be collected, and detail the validation approach. This can include techniques to counter data hiding, recovering deleted files, procedures for network and e-mail analysis.

• Prepare a recommendation on the action that the company needs to take against the offender.

• Table of contents for the investigative plan should consider what to include in report, structure of report, focus or scope of the report including supporting material to be provided and references. This table of contents should include headings and sub-headings pertaining to the aspects addressed in the above dot points.

• Prepare a professional report with an Executive Summary, a Word generated table of contents, an Introduction, a body of report with proper headings and sub-headings, and a Conclusion.

Reference no: EM13845888

Questions Cloud

Calculate the area and perimeter of a rectangle : Design and write a program, using functions, that calculates the area and perimeter of a rectangle whose dimensions (length and width) are provided by a user.
Identify and analyze the main issues in given problem : Identify and analyze the main issues and discuss them in the context of relevant developmental theory, as well as societal influences. Why is this data and the information you researched important to understand in the context of child development
What is the optimal ordering quantity : What is the optimal ordering quantity? What is the tradeoff in your mind between a larger order quantity and a small one?
Describe ways in which $ru could use social networking : Describe ways in which $RU could use Social Networking and What are challenges and potential risks for $RU of engaging with customers through Social Networking?
Provide an outline of the forensic analysis procedures : Provide an outline of the forensic analysis procedures/steps depending upon the nature of evidence to be collected, and detail the validation approach.
Marketing for a large national bank : In this assignment, you are to assume that you are in marketing for a large national bank and that you have been tasked with achieving a key growth objective for the organization
Prepare an estimate of electricity costs : Using the high-low method, prepare an estimate of electricity costs for July, assuming 53,500 units are expected to be produced in July.
Journalize the entries to record the payroll : Journalize the entries to record (a) the payroll and (b) the employer's payroll tax expense for the month.  The state unemployment tax rate is 3.1%, and the federal unemployment tax rate is 0.8%.  Only $25,000 of salaries are subject to unemployme..
What are quicken loans key goals and values : Define the problem: What are Quicken Loans key goals and values? Do additional research about working at Quicken Loans to get more than just the company's view from its website.

Reviews

Write a Review

Other Subject Questions & Answers

  Significant information regarding multiculturalism

How may you apply approaches of multiculturalism and/or diversity to raise understanding and sensitivity toward culturally diverse individuals?

  Disagreement among cultures than really is about matters

Which of the following does rachels offer as a reason that people often think there is more disagreement among cultures than there really is about matters of morality?

  Way that allows you to access the resources of other company

Describe the methods or technologies you would use to protect those resources so that only authorized users can access the necessary resources. Provide a rationale for chosen methods / technologies

  What are the positive and negative results of upenn land

Do some research about UPenn land acquisition along time. Also find out the influence the the expansion caused. Is the neighborhood happy or unhappy? Is there any boundaries between original residence and UPenn student/faculty's dorm/house?

  Need a cover letter and a letter of interest to become a

need a cover letter and a letter of interest to become a part-time online adjunct professor for business. below is the

  Actor-observer effect and their personal example

When you get to the webpage, scroll down a bit and click the "VoD" link to the right of the program description for Video #19 called "The Power of the Situation". This video is about 27-minutes in length. Point out which part of the video you foun..

  Influences of heredity and environment

Distinguish between the influences of heredity and environment on (Oprah Winfrey) psychological development.

  Describe about the unique cultural-political-economic

Describe about the unique Cultural, Political, Economic and Legal aspects of doing business in Denmark in essay format -Cultural Aspects - Political Aspects - Economic Aspects - Legal Aspects

  Mix varies between north america-asia-geographic locations

What mix of incentives and compensation are most effective in each of the geographic locations where firms in your industry have plants?  Why do you think the mix varies between North America and Asia?

  Coach a person to engage in behaviors

Identify how you could coach a person to engage in behaviors that might elicit higher levels of those antecedents in followers. Describe how the strategies might change depending on what the setting might be.

  Specifying the termination of an employment relationship

He tells Paula that he will continue to employ her as his secretary if he passes the exam. If he fails the exam, the employment relationship has been terminated in what way?

  Part of theology that is technically known as theodicy

Define the part of theology that is technically known as theodicy. Pick an example of extraordinary evil in the world and present it briefly. Use your example to explain the relevance of the problem of theodicy. Why is theodicy said to be more cen..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd