Validating and testing digital forensics tools and evidence

Assignment Help Computer Network Security
Reference no: EM132360650

Validating and testing digital forensics tools and evidence

Purpose of the assessment (with ULO Mapping) This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

b) Record, administer and document digital forensics in social media.

Assignment Description

Section I: Leaving Clues to a Crime

In this section you will create a pretended crime scenario that needs computer forensic analysis. Along with the crime scenario, create digital clues that may be left on a small portable storage device.

IMPORTANT: Any names of persons or organizations in the crime scenario should be pretended; DO NOT use the names of real people or businesses. Also, DO NOT develop a crime scenario involving child pornography or anything that can be interpreted as a threat to the public. Acceptable topics include theft, embezzlement, kidnapping a fictitious character, the murder of a fictitious character, etc.

The chosen crime scenario must be discussed according to the following questions:

Questions:

Q1) You will leave your digital "clues" on a flash/thumb drive. Provide your thumb drive (containing your digital clues) for analysis as an image by using software such as ProDiscover.
Include this screenshot in your final report!

Your digital clues must include at least one of each of the following:

- Hidden file
- Deleted file
- Email
- Graphic file
- Password-protected file
- Web access (browser history)

Q2) Discuss what should you consider when determining which data acquisition method to use. Q3) Discuss some options that can be used for preserving the data in this situation

Q4) Explain two acquisition method that you should use in this situation.

Secition II: Create and Delete Files on USB Drive

In this section, you need to find any evidence of the section 1, and any data that might have been generated from the suspect's hard drive, so that, it may be presented in a court of law. To create your digital clues, please do the following task:

1. On your USB drive, create a word file named your Student ID, where the blank should be filled with your name, mobile, citizen, address and some other information.
The file should contain the following sentence: "I have enrolled for MN624 Digital Forensic." The first blank in the sentence should be filled in with your Full name and the second blank with the date when you registered for this unit.

2. On the same drive, create an excel file named "StudentID.xls", where the First column should be filled with your units name that you had at MIT last semester and the second column should be filled with your marks with those units.

3. Store your current Photo on a USB drive and save it in JPG format or other images format.

4. Take a screenshot of your Windows Explorer window showing the content of the USB's folder hosting the three files. Include this screenshot in your final report! Now delete those files, and then take another screenshot of the respective folder's content (after the two files have been deleted). Include this screenshot in your final report.

Q1) Use ProDiscover Basic to Acquire an Image of USB Drive. In the report, you need to include the screenshots of each step.

Q2) Use ProDiscover Basic to Recover Deleted Images. In the report, you need to include the screenshots of each step.

Section III: Investing a Case

You're investing a case involving a 2 GB drive which you need to make a copy of its sensitive data at the scene. Write a report for designing three options you will do this task accurately. This report can range from 100-300 words. Be sure to include your software and media choices.

Reference no: EM132360650

Questions Cloud

Legal corporate governance compliance : Present the arguments for "Legal corporate governance compliance has greater impact corporate responsibility."
What are the leadership and management implications : The Institute of Medicine (IOM) Core Competencies for Health Professionals relate to recruitment and retention of staff. Having qualified staff that.
Goals plan to social media for a sport organization : What is the goals plan to social media for a sport organization? List list all goals for each area within the organization and explain your reasoning.
Write a program which can filter to make list whose elements : Write a program which can filter() to make a list whose elements are even number between 1 and 20 (both included).
Validating and testing digital forensics tools and evidence : MN624 - Digital Forensic - Validating and testing digital forensics tools and evidence - create a pretended crime scenario that needs computer forensic analysis
Compute the net present value of the project : Danton Company manufactures two products, Product F and Product G. The company expects to produce and sell 600 units of Product F.
Evaluated role of organizational behavior in organizations : Find three scholarly articles where the researchers evaluated the role of organizational behavior in organizations.
Business focus of maximisation of profit : Outline the tensions that exist between a business focus of maximisation of profit and that of the social and environmental responsibilities of an organisation.
What dietary recommendations should be made : The focus for this live classroom is a discussion about diet therapy for a 58 year old woman who experienced her first MI ( myocardial infarction).

Reviews

len2360650

8/25/2019 11:13:39 PM

Grade Mark HD 80%+ D 70%-79% Excellent Very Good Analysis Logic is clear and easy to follow with strong arguments Consistency logical and convincing Effort/Difficulties/ Challenges The presented solution demonstrated an extreme degree of difficulty that would require an expert to implement. The presented solution demonstrated a high degree of difficulty that would be an advance professional to implement. Explanation/ justification All elements are present and well integrated. Components present with good cohesion Reference style Clear styles with an excellent source of references. Clear referencing/ style Presentation Proper writing. Professionally presented Properly spoken, with some minor deficiencies

len2360650

8/25/2019 11:13:29 PM

Marking Criteria: Section to be included in the report Description Marks Create digital clues that may be left on a small, portable storage device 10 What should you consider when determining which data acquisition Section I method to use? 10 Write two options that can be used for preserving the data in this 10 situation? Which acquisition method should you use in this situation and why? 5 Use ProDiscover Basic to Acquire an Image of USB Drive. 20 Section II: Use ProDiscover Basic to Recover Deleted Images. 20 10 -Write three options you have to copy the drive accurately Section III -Write a clear conclusion of the case study. 5 Total 90

len2360650

8/25/2019 11:13:16 PM

Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font, and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd