Assignment - Create and Delete Files on USB Drive

Assignment Help Computer Network Security
Reference no: EM132487666

MN624 Digital Forensic Assignment - Melbourne Institute of Technology, Australia

Assignment Description - It is to note that this assignment consists of two parts a) Assignment 1a and b) Assignment 1b.

Assignment 1a: Leaving Clues to a Crime

In this Assignment 1a you will create a pretended crime scenario that needs computer forensic analysis. Along with the crime scenario, create digital clues that may be left on a small portable storage device.

IMPORTANT: Any names of persons or organizations in the crime scenario should be pretended; DO NOT use the names of real people or businesses. Also, DO NOT develop a crime scenario involving child pornography or anything that can be interpreted as a threat to the public. Acceptable topics include theft, embezzlement, kidnapping a fictitious character, the murder of a fictitious character, etc.

Questions - The chosen crime scenario must be discussed according to the following questions:

Q1) You will leave your digital "clues" on a flash/thumb drive. Provide your thumb drive (containing your digital clues) for analysis as an image by using software such as ProDiscover.

Include this screenshot in your final report!

Your digital clues must include at least one of each of the following:

- Hidden file

- Deleted file

- Graphic file

- Password-protected file

- Web access (browser history)

- Change extension of one file such as .docs to .pdf

Q2) Discuss what should you consider when determining which data acquisition method to use.

Q3) Discuss some options that can be used for preserving the data in this situation

Q4) Explain two acquisition methods that you should use in this situation.

Assignment 1b: Create and Delete Files on USB Drive

In this Assignment 1b, you need to find any evidence of the Assignment 1a, and any data that might have been generated from the suspect's hard drive, so that, it may be presented in a court of law. To create your digital clues, please do the following task:

1. On your USB drive, create a word file named your Student ID, where the blank should be filled with your name, mobile, citizen, address and some other information.

The file should contain the following sentence: "I have enrolled for MN624 Digital Forensic." The first blank in the sentence should be filled in with your Full name and the second blank with the date when you registered for this unit.

2. On the same drive, create an excel file named "StudentID.xls", where the First column should be filled with your units name that you had at MIT last semester and the second column should be filled with your marks with those units.

3. Store your current Photo on a USB drive and save it in JPG format or other images format.

4. Take a screenshot of your Windows Explorer window showing the content of the USB's folder hosting the three files.

Include this screenshot in your final report! Now delete those files, and then take another screenshot of the respective folder's content (after the two files have been deleted). Include this screenshot in your final report.

Table 1: Digital forensics Tools (You can choose any two tools for your demonstration with your tutor's consent)

Serial #

Name of the security tool

1

The Sleuth Kit (Autopsy)

2

FTK Imager

3

X-Ways Forensics

4

CAINE (Computer Aided Investigative Environment)

5

SANS Investigative Forensic Toolkit (SIFT)

Table 1

Q1) Use two computer forensics tool from table 1 to Acquire an Image of USB Drive. In the report, you need to include the screenshots of each step.

Q2) Use two computer forensics tool from table 1 to Recover Deleted Images and to verify which files have changed of extension. In the report, you need to include the screenshots of each step.

Q3) validate your results by using hash algorithms.

Q4) Comparison of the digital forensics tools that you used in this work. Your comparison could include:

- Digital forensics features

- Time is taken to detect acquire threat

- Ease of usage

Q5) Demonstration of the two digital forensics tools that you used in this work on week 7.

Reference no: EM132487666

Questions Cloud

Prepare in good form a multiple-step income statement : Prepare in good form a multiple-step income statement for the year 2019. Assume a 20 percent tax rate and that 50,000 shares of common stock
Speculate on what changes you think will occur in census : Speculate on what changes you think will occur in census racial categories over the next fifty years, keeping in mind that census categories always reflect
Do you think people who resist using online social networks : Do you think people who resist using online social networks such as Facebook and Twitter are an unusual minority in this country. Support your position
Provisions of the patient protection and affordable care act : What Three provisions of the Patient Protection and Affordable Care Act that are of particular interest to people living with mental disability
Assignment - Create and Delete Files on USB Drive : Create and Delete Files on USB Drive. Comparison of the digital forensics tools that you used in this work. Demonstration of two digital forensics tools
Perpetuate social inequality from a conflict perspective : How does education makes and perpetuate social inequality from a conflict perspective? Support answer with examples.
Create an organizational chart : Create an Organizational Chart outlining the functional areas of business including, but not limited to: Accounting/Finance, Information Technology
How deviance plays a role in everyday life and apply : Discus how deviance plays a role in everyday life and apply the various theories to your thoughts. Can deviance be good?
Explanation for the social fact : Why suicides happen, particularly in prosperous and healthy societies, has puzzled social scientists for decades. Listen to the Freakonomics podcast found

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd