Validating and testing digital forensics tools and evidence

Assignment Help Computer Network Security
Reference no: EM132486768

MN624 Digital Forensic - Melbourne Institute of Technology

Assessment - Validating and testing digital forensics tools and evidence

Learning Outcome 1: Record, administer and document digital forensics in social media.

Assignment 1a: Leaving Clues to a Crime

In this Assignment 1a you will create a pretended crime scenario that needs computer forensic analysis. Along with the crime scenario, create digital clues that may be left on a small portable storage device.

The chosen crime scenario must be discussed according to the following questions:

Question 1) You will leave your digital "clues" on a flash/thumb drive. Provide your thumb drive (containing your digital clues) for analysis as an image by using software such as ProDiscover.
Include this screenshot in your final report!

Your digital clues must include at least one of each of the following:

- Hidden file
- Deleted file
- Graphic file
- Password-protected file
- Web access (browser history)
- Change extension of one file such as .docs to .pdf

Question 2) Discuss what should you consider when determining which data acquisition method to use.

Question  3) Discuss some options that can be used for preserving the data in this situation

Question 4) Explain two acquisition methods that you should use in this situation.

Assignment 1b: Create and Delete Files on USB Drive

In this Assignment 1b, you need to find any evidence of the Assignment 1a, and any data that might have been generated from the suspect's hard drive, so that, it may be presented in a court of law. To create your digital clues, please do the following task:

Part 1. On your USB drive, create a word file named your Student ID, where the blank should be filled with your name, mobile, citizen, address and some other information.
The file should contain the following sentence: "I have enrolled for MN624 Digital Forensic." The first blank in the sentence should be filled in with your Full name and the second blank with the date when you registered for this unit.

Part 2. On the same drive, create an excel file named "StudentID.xls", where the First column should be filled with your units name that you had at MIT last semester and the second column should be filled with your marks with those units.

Part 3. Store your current Photo on a USB drive and save it in JPG format or other images format.

Part 4. Take a screenshot of your Windows Explorer window showing the content of the USB's folder hosting the three files. Include this screenshot in your final report! Now delete those files, and then take another screenshot of the respective folder's content (after the two files have been deleted). Include this screenshot in your final report.

Table 1: Digital forensics Tools (You can choose any two tools for your demonstration with your tutor's consent)

Serial #

Name of the security tool

1

The Sleuth Kit (Autopsy)

2

FTK Imager

3

X-Ways Forensics

4

CAINE (Computer Aided Investigative Environment)

5

SANS Investigative Forensic Toolkit (SIFT)

Question 1) Use two computer forensics tool from table 1 to Acquire an Image of USB Drive. In the report, you need to include the screenshots of each step.
Question 2) Use two computer forensics tool from table 1 to Recover Deleted Images and to verify which files have changed of extension. In the report, you need to include the screenshots of each step.
Question 3) validate your results by using hash algorithms.

Question 4) Comparison of the digital forensics tools that you used in this work. Your comparison could include:
- Digital forensics features
- Time is taken to detect acquire threat
- Ease of usage
Question 5) Demonstration of the two digital forensics tools that you used in this work on week 7.

Attachment:- Digital Forensic.rar

Reference no: EM132486768

Questions Cloud

Create a pretended crime scenario : Validating and testing digital forensics tools and evidence and administer and document digital forensics in social media - create a pretended crime scenario
Heterozygous for pigment expression : Predict the offspring of a heterozygous black lab and a chocolate lab that are both heterozygous for pigment expression.
How dose-response data are utilized for risk assessment : Describe one current event (within the last six to eight months) that exemplified the relationship between toxicology and environmental safety and health
Show the genotype of the parents in the cross : Show the genotype of the parents in the cross, punnett square and the phenotype ratio.
Validating and testing digital forensics tools and evidence : Validating and testing digital forensics tools and evidence - create a pretended crime scenario that needs computer forensic analysis
List the percent of color and the number of individuals : Now cross two individuals both with the genotype AaBb. List the percent of color and the number of individuals in each as the result of such a cross.
How urban planners are addressing the issues : How urban planners, research scientists, water managers, environmental groups, etc. are addressing the issues facing the San Francisco Bay estuary
What pros and cons with going through with preservation : What are the pros and cons with going through with Development? Make sure to identify the future implications of developing the land.
How does rhizobium benefit from this association : Question 1: Where are the bacteria? Are they between cells or inside cells? Question 2: Why is this relationship between a plant and bacterium called a mutuali

Reviews

Write a Review

Computer Network Security Questions & Answers

  What are three major aspects of intrusion prevention

There are many components in a typical security policy. Describe three important components. What are three major aspects of intrusion prevention?

  Increment value in one cell in excel

Discuss how to increment value in one cell in Excel if another cell is populated. or example, I have cell A that has values such as 1, 2, 3, 4 etc...

  Determine the design issues with the new system

Analyze the new system and determine the design issues with this new system. Describe how you would correct the design issues with the system to make the restaurant managers happy.

  Analyze the major ways that cryptography can help

Analyze the major ways that cryptography can help alleviate risks that exist when using cloud computing.

  Explain cross site scripting attack

Explain Cross Site Scripting attack

  Explain the purpose of the law

Also, don't forget to keep up with references to include on the powerpoint. note: I'm a member in group of the persons .My part is 6 slides.So. the slides must just have info about the topic . could you please help me with that ?

  Identify software needed to secure your choice of networks

Assignment: LAN/WAN Paper- Identify hardware and software needed to secure your choice of networks against all electronic threats.

  Security management

Choose a topic from your major field of study. For example, if you pursuing a degree in education, your topic will come from the education field.

  An information security changes required in the environment

A description of how you will provide disaster recovery in this infrastructure. A discussion of the information security changes required in this environment and the steps taken to monitor and control these changes

  Discuss dns and procedures for configuring dns zones

Discuss procedures for configuring and using Encrypting File System (EFS). Discuss procedures for configuring and implementing Advanced Audit Policies. Discuss DNS and procedures for configuring DNS Zones.

  Compare and contrast frequency spectrum and bandwidth

How is information sent across a transmission medium from the physical layer? Compare and contrast frequency spectrum and bandwidth.

  Treats to a companies intellectual property

Day by day threats to a company's intellectual property have grown to an alarming rate over the years. After looking at your network security, structure there are three specific threats that we will focus on that could have a Hughimpact on your bu..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd