Find out the modification made to the excel spreadsheet

Assignment Help Computer Network Security
Reference no: EM13333635

Computer Forensics Cases Investigation:

Investigate the following cases and find the evidence and make a detailed report. Please try to be as professional as possible in your report. That is, you are assumed to present the evidence in court and the defending attorney may ask you all kinds of questions to invalidate your evidence. Please write each report in a separate page. (Attached to the assignment a virtual floppy drive image for every case); assignment deadline 1 day.

1- Boris Herman Cases:

This is a case of industrial espionage and an individual is suspected to transferring blueprints in form of image files on a floppy disk to the buyer. The suspect is skilled and well familiar with the file systems as well as shortcomings and limitations of most computer forensics software packages and has hidden the data well. The floppy disk was retrieved from the suspect's person at his home so the main point is to prove that he indeed took the company data with him.

Your mission, should you choose to accept it, is to recover an image file in its entirety from a seemingly empty floppy disk and document the method of recovery, tools used and explain probability and causes of success or failure by using off-the-shelf forensic tools on this task. You are required to produce a hash (MD5, SHA1 or SHA2) of the recovered file which will be cross-referenced with hashes of files on company internal servers to establish a causation.

File provided is a floppy disk image named boris-case-floppy.001 which is packaged and attached as a ZIP compressed file. Hashes for the image file are listed for integrity check.

MD5 = 7b9bd8069cd79e3fafb39f1091ae71da
SHA1= 110c37b641110eab1fcab3dc94f22c053f500255
SHA2 = 50baa86c4b2dcc127191da9a67f608ce64d6e2751e2611e138630f0264083f8b

2- Okuwa Cases:

A dissatisfied employee that is planning to leave an organization decides to delete a file from the server. He then copied an Excel Spreadsheet into another file, modifies the new file and deletes the old file. Can we retrieve the old file and find out the modification made to the Excel spreadsheet?

Reference no: EM13333635

Questions Cloud

How many years do the bonds have left until they mature : Martin Software has 10.0 percent coupon bonds on the market with 19 years to maturity. The bonds make semiannual payments and currently sell for 107.8 percent of par.
What is the energy delivered by this pulse : An electric eel develops a 440V potential difference between its head and tail. What is the energy delivered by this pulse
Explain what mass of solution contains : What mass of solution contains each of the following amounts of dissolved solute? 1.) 15.0g of sulfuric acid in a 25.0\% solution 2.)11.0g of acetic acid in a 5.00\% solution
How to use the following linux commands on a linux machine : Write a report on how to use the following Linux commands on a Linux machine.
Find out the modification made to the excel spreadsheet : A dissatisfied employee that is planning to leave an organization decides to delete a file from the server. He then copied an Excel Spreadsheet into another file, modifies the new file and deletes the old file.
Explain the concentration of f- in ppb in a water sample : A standard addition procedure is used to determine the concentration of F- (in ppb) in a water sample. To four 6.00 mL aliquots of a water sample were added 0.00 mL, 1.50 mL, 2.50 mL, and 3.50 mL of a standard NaF solution containing 12.0 ppb
What is the net present value-npv of the decision : The development costs are $850,000 immediately and another $850,000 at the end of two years. When the game is released, it is expected to make $1.2 million per year for years 3, 4, and 5.
Evaluate the mass/mass percent concentration : Calculate the mass/mass percent concentration for each of the following solutions. 1.) 1.05g NaCl in 95.0g of solution 2.) 2.00g K2Cr2O7 in 103.0g of solution 3.) 50.0g C6H12O6 in 125.0g of solution
Define what is the molecular formula of the hydrocarbon : which was then burned in excess oxygen, completely converting it to carbon dioxide and 2.41 g water. What is the molecular formula of the hydrocarbon

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain it director and staff to how to mange complexities

Host the discussion with IT director and staff and let them know what you believe to be most significant of these extra complexities and reasons why you believe them to be difficult to manage.

  Encrypt the plaintext by using vigenere cipher

Encrypt the following Plaintext using Vigenere cipher: Plaintext: stocks market is falling Key : one. Is Vigenere cipher monoalphabetic or polyalphabetic? Why?

  How to collect data for traffic analysis

Suppose a terrorist is known to use Skype for encrypted email from internet cafes, using a known email ID in small city. How could you collect data for traffic analysis (i. e, what kind of technology or access could you use)?

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  What is the principle of adequate protection

What is the difference between a threat and a vulnerability? Define each, and then give at least one example of a threat and of a vulnerability.

  Determine public values transmitted for message

Alice and Bob select the numbers 6 and 10 privately. What will be public values they transmit and what would be final secret computed?

  Finding decryption function and recovered plaintext

If you receive the ciphertext message YPHDCRPBEQTAA, decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this?

  What is a honeypot

How has honeypots been used in the field of national security?

  Explain the purpose of using cvss scores

Select a recent vulnerability from that Database and analyse it from the what problems they can cause (malicious activities an attacker may use them for, including attack types)

  Organization-severely lacks in appreciating need security

Organization that severely lacks in appreciating the need for security or a company that depends on equipment that is outdated and services from contractors that are low quality? Why?

  Project management to suppress the dissemination

The general method is to encourage timely communication of news to project stakeholders. However, can you envisage conditions where it may be necessary,

  Perspective of current hot topics in information security

Build an understanding and perspective of current hot topics in Information Security and build generic skills including

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd