Validating and testing computer forensics tools

Assignment Help Other Subject
Reference no: EM132755786

BN309 Computer Forensics - Melbourne Institute of Technology

Assessment - Validating and Testing Computer Forensics Tools and Evidence

Learning Outcome 1: Document evidence and report on computer forensics findings;

Learning Outcome 2: Exhibit and understand forensics ethical behaviour and professional conduct;

Learning Outcome 3: Implement a process to support the administration and management of computer forensics

Assignment Questions:

Objective:

The objectives of this assignment are to gain theoretical and practical knowledge and skills in different computer forensics and anti-forensics techniques such as image acquiring, analysis of email headers, temporary internet files and low-level text search of entire contents of the computer hard drive. The students should apply appropriate computer forensics tools and techniques, and write a report on their findings. Marks will be awarded based on the sophistication and in-depth exploration of the selected techniques.

Case Study:
A suspect was under investigation by police for a serious offence. The suspect based his innocence on an alibi stating that he could not have been present at the scene of the crime as he was at work using his computer to surf the internet when the crime took place. The validity of this alibi was questioned. Computers were forensically imaged and examined. Five sources of information were used to identify user activity. These included file data and time properties, program log files, email data files, internet usage, and text files containing relevant dates. Analysis of times and dates in email headers on the computer and the server failed to show any activity for the specific times. Examination of temporary internet files revealed that none had been created with the relevant time stamps. A low-level text search was conducted across the entire contents of all the computer hard drives to locate any reference to these critical dates. No records or test references could be found on any areas of the hard drive to support use of the computer for the times in question. In conclusion, the analysis strongly indicated that the computer was not used during the critical period. This was corroborated by records from the suspect's Internet Service Provider (ISP). The individual was convicted at trial of the criminal offence. The electronic evidence was a key factor in the proceedings

Assignment Specification:

Prepare a report and video demonstration on the following sections related to the case study. You can use your own files for data hiding and analysis. Provide the list of references using IEEE referencing style at the end of the report.

Section 1: Forensic imaging and examinations

Do an Internet search to list out effective tools for the above case study. Choose one of the tools to examine the forensic image and explain with screenshots how the tool can be useful. (250 words)

Section 2: Forensic analysis and validation

Write a report describing the procedures to retrieve the evidence with your selected forensics tools. Explain how to identify and analyse file data and time properties, program log files, email data files, internet usage, and text files containing relevant dates. Also explain how temporary internet files and low level text search were carried out in this investigation. (500 words)

Section 3: Anti-forensics

Research on anti-forensics techniques and write a report on your findings on these techniques. Compare the pros and cons of these techniques in different contexts. Use one of the anti-forensic technique on your files and explain how useful it is. Please explain your methods with the help of screenshots. (750 words)

Demonstration:
Demonstrate your work. You should appear in the video (You Tube or similar) at the first and last 30 secs to introduce yourself and draw a conclusion on your experience with the different computer forensics and anti-forensics techniques.

Attachment:- Computer Forensics.rar

Reference no: EM132755786

Questions Cloud

What is the project after-tax operating cash flows : $8,000 per year in depreciation of the required equipment. The firm's marginal tax rate is 40 percent. What is the project's after-tax operating cash flows
Beneficial for public transportation systems : What are some of intangible qualities that make it beneficial for public transportation systems in large cities to flourish, be around for long periods of time?
What is the new break-even point after including the effects : You are the plant accountant for a company, What is the new break-even point after including the effects of the increased advertising and higher variable costs?
Current events in health care administration leadership : It is increasingly vital that health care administration leaders are aware of the world around them.
Validating and testing computer forensics tools : Validating and Testing Computer Forensics Tools and Evidence - Implement a process to support the administration and management of computer forensics
Departmental project which outcome was successful : Employee engagement strategies to improve moral during the 2020 Pandemic. Departmental project which outcome was successful.
Business opportunity-including social entrepreneurship : A process for recognizing a business opportunity, including social entrepreneurship
What an appropriate discount rate for the project is : Backyard is considering a project with a beta of 1.7 and a project life of eight years. An appropriate discount rate for the project is
Which lever of control is zuzu emphasizing : Zuzu is a large manufacturer of snack cakes. Which lever of control is Zuzu emphasizing? What changes, if any, should be made?

Reviews

Write a Review

Other Subject Questions & Answers

  Issue of security challenges on the internet

Discuss the issue of security challenges on the Internet as that issue applies to a global enterprise. List at least five Internet security challenges.

  Discuss stephen flynns recommendations for security

Discuss Stephen Flynn's recommendations for effective homeland security. Do you agree with the recommendations?

  Research the literature and find the evidence

Write a 500-word paper using APA Format The first step in translating evidence into practice is to find the evidence.

  Leadership styles of fdr and hitler

Compare and contrast the leadership styles of FDR and Hitler what made both effective leaders despite their political differences

  Explain theory of development from another discipline

Competent social workers are able to construct a strong foundation upon which to build skills by understanding theories from a variety of disciplines.

  Develop outline for sex-education class for a group of teens

Develop an outline for a sex-education class for a group of teens. What type of education would be most effective and why?

  Does the author include sufficient supporting details

Is each paragraph organized around one key point or idea? Do topic sentences clearly indicate the focus of each paragraph? Does the author include sufficient

  Explain most critical threats to the global environment

The members of the United Nations found great value in the two analyses you provided. They are now asking you to develop a PowerPoint presentation.

  What specific sub-topics were considered in the project

Here you explain briefly the purpose of your project. What issue did you address? Why did you address it? You will need to provide enough background to enable the reader to understand the problem being investigated.

  Define ways to avoid the ethical issues

Write a 1,000-1,250-word paper discussing codes of practice and ethical issues that must be considered when using psychological assessments.

  Definition of physical security terms

Definition Of Physical Security Terms : Access control, Asset protection priorities, Corrected color temperature rating etc.

  BIZ101 Business Communications Presentation Assignment

BIZ101: Business Communications Presentation Assignment Help and Solution, Assessment Help, Laureate International Universities, Australia

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd