Record, administer and document digital forensics

Assignment Help Computer Engineering
Reference no: EM132845957

MN624 Digital Forensic - Melbourne Institute of Technology

Assessment - Data Acquisition, Data Analysis and Data Validation

Learning Outcome 1: Record, administer and document digital forensics in social media.

Assignment 1 is divided into two parts. Part A focuses on recent digital forensics crime. Part B is to prepare a forensic image, forensics analysis and data validation.

Assignment 1a: Recent digital forensics crime

You need to research one recent digital forensics crime that requires digital forensics investigation, such as malware, embezzlement, extortion, cyberbullying, murder, kidnap, drug trafficking, intellectual property theft, espionage, employment misconduct, fraud, forgeries, inappropriate email and internet use in the workplace. Prepare a report on the following:

1. Provide a detailed description of the case.
a. Summary of the offence being investigated.
b. Report who was involved in the crime, i.e. who was the criminal(s), the suspect(s) and the victim(s)?
c. Identify and report what type of evidence was used in the criminal investigation of the case;
d. Explain two acquisition methods that you should use in this case study.
e. Discuss some options that can be used for preserving the data.
2. Explain the importance of a chain of custody for digital forensic evidence. Be sure to explain the process of documenting, collecting and storing evidence from the crime scene you're investigating (e.g. a laptop computer). Describe the consequences of not following a proper chain of custody.
3. Critically evaluate the forensic tool(s) and discuss their capacity in various categories of functions, including acquisition, validation, and verification, extraction, reconstruction, and reporting.

Assignment 1b: Data Preparation, Data Acquisition, Data Analysis and Data Validation

The objective of assignment part b is to acquire data from a drive, perform data recovery using different techniques and tools, analysing it and finally performing the validation of acquired data. In addition, students are required to properly document all steps in a report, the report should be formal so that it can be used in a legal process. Prepare a report on the following sections:

Section 1: Data Preparation

You need aUSB; it is expected to have very important information related to the case. The USB contains several Excel files, a couple of image files and some text files. You need to use your own USB to create and delete files as the following:

1. On your USB drive, create a word file named your Student ID, where the blank should be filled with your name, mobile, citizen, address and some other information.
The file should contain the following sentence: "I have enrolled for MN624 Digital Forensic T1 2021." The first blank in the sentence should be filled in with your Full name and the second blank with the date when you registered for this unit.
2. On the same drive, create an excel file named "StudentID.xls", where the First column should be filled with your unit's name that you had at MIT last semester and the second column should be filled with your marks with those units.
3.Modify the extension of one of the doc file to .jpeg.
4. Create a password word document. Hint. Click the File menu, select the Info tab, and then select the Protect Document button. Click Encrypt with Password. Enter your password then click OK. Enter the password again to confirm it and click OK.
5. Store your current Photo on a USB drive and save it in JPG format or other images format.
6. Take a screenshot of your Windows Explorer window showing the content of the USB's folder hosting the three files. Include this screenshot in your final report!
7. Now delete those filesincluding the file you have modified its extension, and then take another screenshot.

Section 2: Data Acquisition
Prepare a forensic image (bit stream copy) with the record of data deletion. Explain the method and tool you used for acquiring data. You will need this image to perform consecutive tasks.
Use two computer forensics tools from table 1 to Acquire an Image of a USB Drive. In the report, you need to include the screenshots of each step.

Section 3: Data Recovery
The suspect has deleted two image files from the USB, recover the files and explain the method (with screenshots) and tool you used. Use two computer forensics tools from table 1 to Recover Deleted Images and to verify which files have changed of extension. In the report, you need to include the screenshots of each step.

Section 4: Data Analysis
Inspect all files in the USB, use a hex editor and analyse if there is any hidden data in files. Provide screenshots of your analysis.Discuss what techniques and tools that can be used to recover the passwords. Use one of these techniques to recover the passwords from the protected files.

Section 5: Data Validation
Explain different methods of data validation and use one of them to validate data on USB.

Section 4: Comparison of the digital forensics tools
Comparison of the digital forensics tools that you used in this work. Your comparison could include:
- Digital forensics features
- Time is taken to detect acquire threat
- Ease of usage

Attachment:- Digital Forensic.rar

Reference no: EM132845957

Questions Cloud

Assignment- Lab- Configure IPv6 Addresses on Network Devices : Assignment - Lab - Configure IPv6 Addresses on Network Devices - Why can the same link-local address, fe80::1, be assigned to both Ethernet interfaces on R1
How much is the total manufacturing cost : Costs of goods manufactured of ABC Company are shown below: Beginning work in process: $15,000. How much is the total manufacturing cost
Compute the Cost of Goods Manufactured for the year : Donahoo Manufacturing Company had the following information available for the year: Compute the Cost of Goods Manufactured for the year
Experiment - Discrete and Integrated Adders-Subtractor : Experiment - Discrete & Integrated Adders/Subtractor - Analyze, understand, and build a 2-bit Half adder (HA) & a 2-bit full adder (FA)
Record, administer and document digital forensics : Record, administer and document digital forensics in social media and Identify and report what type of evidence was used in the criminal investigation
Experiment - Logic Gates, De-Morgans, Universal NAND : Experiment - Logic Gates, De-Morgan's, Universal NAND/NOR - Determine the truth table for the AND, NAND, OR NOR, EX-OR & EX-NOR
Experiment - Number Systems - Design a logic circuit : Experiment - Number Systems - Design a logic circuit that will decode a BCD number and display it on a seven-segment display
25705 Financial Modelling and Analysis Assignment : 25705 Financial Modelling and Analysis Assignment Help and Solution, University of Technology Sydney - Assessment Writing Service
Determine the forward and reverse voltage for silicon : Determine the forward and reverse voltage for silicon(1N4002) diode using DMM by choosing the diode test function

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a recursive function pattern that accepts one argument

Write a recursive function pattern that accepts one argument, an integer that is a power of 2, and prints the following patterns.

  Write a program that implements radix sort on an array

Write a program that implements radix sort on an array of int values. You will need to make 10 passes, because an int can store numbers up to 2,147,483,648.

  Derive the state diagram for an odd parity checker

Derive the state diagram for an odd parity checker. The input arrives on a single input line, X, one bit at a time. The circuit should produce an output.

  Is computer security a technical issue

Is computer security a technical issue, a business issue or both

  Establishing a security cultureusing given information

Review the section on Establishing a Security Culture. Review the methods to reduce the chances of a cyber threat noted in the textbook.

  Derive an expression for the number of two-input and gates

Derive an expression for the number of 2-input AND gates required to implement an m-to-T" line tree decoder.

  Write down a dbn that represents the dynamics of the model

We track K moving objects u1, . . . , uK, using readings obtained over a trajectory of length T. Write down a DBN that represents the dynamics of this model.

  Simulate a clock that prints out minutes and seconds

Write a MIPS assembly program that simulates a clock that prints out minutes and seconds on the screen.

  Write down or copy or paste the complete problem narrative

Write down or copy/paste the complete problem narrative, including tables. Show your Lindo model. Show your Lindo output. Answer all questions pertaining to the problem.

  Describe the various data analysis and reporting techniques

RESEARCH METHODS-Year 2 Semester II-Provide knowledge of how to conduct research that achieves pre-determined objectives.

  Write pseudocode for an algorithm that will get a string

Write pseudocode for an algorithm that will get a string of digits as input, and then output a new string which "describes" the previous one using only digits.

  What software and hardware infrastructure will be necessary

What would be the advantages of selecting an Internet-based architecture for the Personal Trainer's system?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd