Reference no: EM133761269
Digital Forensics
Assessment - Forensic Report - Findings and Recommendations
Your Task
This assessment is to be completed individually. In this assessment, you will write a forensic report and perform a digital forensics investigation that discovers concealed information and evaluates data recovered from a digital device for the purpose of drawing hypotheses.
Assessment Description
In this assessment, you will engage in an advanced digital forensics investigation and data evaluation. You will be provided with a complex real or hypothetical case involving digital evidence. Your task is to conduct a comprehensive digital forensics investigation to discover concealed information and critically evaluate the recovered data to draw hypotheses about the case. Through this assessment, you will demonstrate advanced practical skills in digital forensics and critical thinking in data analysis and interpretation.
Learning outcome 1: Perform a digital forensics investigation that discovers concealed information.
Learning outcome 2: Evaluate data recovered from a digital device for the purpose of drawing hypotheses.
Assessment Instructions
Students must conduct research externally and included references in order to produce a well referenced assessment. You should use at least ten (10) sources of information and reference these in accordance with the Kaplan Harvard Referencing Style. These may include websites, social media sites, industry reports, census data, journal articles, and newspaper articles. These references should be presented as in-text citations and a referencing list at the end of your assessment (not included in the word limit). Wikipedia and other ‘popular' sites are not to be used.
You must submit your report in Word document or in PDF format.
The report should be well-structured and organised. Prepare a detailed digital forensics investigation report that includes your findings, analysis, and hypotheses. Include screenshots and/or excerpts from the digital evidence to support your claims.
Advanced Digital Forensics Investigation:
Acquisition and Preservation: Utilise advanced digital forensics tools and techniques to acquire and preserve the data from various sources, ensuring the integrity and authenticity of the evidence. Provide detailed documentation of the acquisition process.
Concealed Information Discovery: Conduct an in-depth investigation of the acquired data to identify and recover concealed information, deleted files, and encrypted data. Justify the selection and application of advanced techniques and tools used in the investigation.
Data Evaluation and Hypotheses:
Data Analysis and Interpretation: Analyse and interpret the recovered data from multiple sources, considering the complexities of the cyber attack and the nature of the stolen intellectual property. Apply advanced data analysis methods and tools to extract meaningful insights.
Hypotheses Development: Formulate well-reasoned hypotheses based on the analysis of the digital evidence, providing plausible explanations for the cyber attack and the motives behind it. Support your hypotheses with compelling evidence and analysis.
The report should be properly referenced using appropriate academic sources.
Provide examples and illustrations to support your analysis.
Use clear and concise language to communicate your ideas effectively.