Assignment on digital forensics methodology

Assignment Help Basic Computer Science
Reference no: EM13844474

Enabling objectives

1. Apply the digital forensics methodologies.

2. Write an analysis of a case study.

3. Prepare an outline of a professional digital forensic plan.

InstructionsThe Case - A Digital Forensic Investigation PlanSummary:One World Finance (OWF) is a specialist provider of high quality, consumer finance services to a global network of customers.

Trading in Australia and New Zealand since 1990, the company employs more than 750 employees and the company serves more than 5 million customers. The company's main office is situated in Brisbane with other branch offices located in Sydney and Melbourne.OWF has invested heavily in information technology for supporting its global business operations and achieving competitive advantages over its competitors. Major investments were made by the company in 2001 but management has lost focus in updating the networks and application infrastructure that supports the business operation in recent years.

The network environment between all of OWF offices is flat and relatively unrestricted. Users from one office can access systems and servers from another office. Workstations and servers are typically Microsoft Windows-based. Firewalls and network segmentation are implemented poorly throughout the environment. Intrusion detection and logging exist on systems but they are not effectively used.

Last night, John Marsh at the Sydney office went in to work early and when he got connected to his computer, he found that someone was already connected to his computer with several windows opened. As he stared at it, his computer system got disconnected. He then tried to get connected again, but he was logged out. He called the IT manager, who followed a plan for such incidents. This includes disabling John's account and examining the server security logs. The IT manager found that the IP address of the computer that was connected to John's computer belongs to a computer used to run a data projector at the Melbourne office. He quickly rang the Melbourne office to check who has used the computer and requested the logs of people who have swiped into the building.

He found out that there were five people in the building at the time, but one employee, Andrew Gale has since swiped out and called in sick. An urgent meeting with the management concludes that Andrew Gale has at least violated company policy by accessing a colleague's account, but is unsure if he has violated any other policy or engaged in any criminal activity. As an information security officer, you are asked by the management to investigate to find out the extent of Andrew's activities, if others are involved, who is affected and whether criminal charges need to be laid.Requirements:Your task is to prepare digital forensics investigative plan to enable a systematic collection of evidence and subsequent forensic analysis of the electronic and digital data.

Assuming all systems are Windows based, this plan should detail following:?

justify why use of the digital forensic methodology and approach is warranted including appropriate procedures for corporate investigation.?

describe the resources required to conduct a digital forensic investigation, including skill sets and required tools of the team members.?

outline an approach for data/evidence identification and acquisition that would occur in order to prepare the auditors for review of the digital evidence.?

outline an approach and steps to be taken during the analysis phase making the assumption the computer system is a Microsoft Windows-based computer.?

make a recommendation on the action that the company needs to take against the offender.Tips for preparing your digital forensics investigative planIn writing the digital forensics investigative plan, students need to address following points. Do note that points listed below are not exhaustive and need to be considered as helpful tips.?

Justify a need for digital forensics methodology and consider scope of the case including nature of alleged misconduct leading to consideration of how electronic and digital evidence may support the investigation. The plan should consider how digital forensics differs from other techniques (such as network forensics, data recovery) and detail the overall steps for the systematic digital forensics approach.?

Consider the required resources and include details regarding preparation plan for evidence gathering (such as evidence forms, types, storage media and containers), forensics workstation and peripherals needed, software/tools for analysis depending on the type of evidence to be gathered including rationale for selected tools, and consideration of team member skills in digital analysis (such as OS knowledge, skills for interviewing, consultation, working as per the needs of the auditing team and understanding of law and corporate policies).?

Detail the approach for data acquisition including the different types of evidence that can be gathered and their source depending upon the nature of the case and scope of investigation, develop a plan for data acquisition including rationale for selected plan and contingency planning, detail type of data acquisition tools needed including rationale and an outline for the data validation & verification procedures.?

Provide an outline of the forensic analysis procedures/steps depending upon the nature of evidence to be collected, and detail the validation approach. This can include techniques to counter data hiding, recovering deleted files, procedures for network and e-mail analysis.? Prepare a recommendation on the action that the company needs to take against the offender? Table of contents for the investigative plan should consider what to include in report, structure of report, focus or scope of the report including supporting material to be provided and references.

Reference no: EM13844474

Questions Cloud

About preorder or postorder : Traverse this tree in inorder, preorder and postorder fashion (all three methods, both recursively and iteratively)
Proposals to improve the profitability : You have been asked to assess the expected financial impact of each of the following proposals to improve the profitability of credit sales made by your company.  Each proposal is independent of the other.  Answer all questions.  Showing your work..
Ways in which human resources can influence motivation : Observe theories of motivation in your lives and work- What are two ways in which Human Resources can influence motivation within an organization
Find the iteration formula for the secant method : Determine a polynomial function f(x) that has α as its true root - find the iteration formula for the Secant method.
Assignment on digital forensics methodology : digital forensics methodology
What hominid characteristic are discussed in the film : Watch the film and answer the questioins- What makes us unique as a species? What hominid characteristic(s) are discussed in the film? According to the film, what is the benefit of bipedalism
Analysis of personal and organizational ethics and values : Write a paper on Analysis of Personal and Organizational Ethics and Values
How the group interaction paralleled the topics : How the group interaction paralleled the topics of small group communications that were discussed in class. How decisions were made and in the event that conflict arose, how they were dealt with in order to solve them amicably
Short essay on sociology symbolic interaction : 400 to 600 words essay applying the theory symbolic interaction to the article i listed belowed it must be in ASA format

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a class named testscores

Write a class named TestScores . The class constructor should accept an array of test scores as its argument. The class should have a method that returns the average of the test scores. If any test score in the array is negative or greater than 10..

  Explaining statement for security policy

Write a statement for security policy for the following:Let LAN for small 100-person business, Pixel Inc. Business occupies one floor in office building. Everybody has a computer on his or her desk.

  What type of damage these computer infections can do

Write one to two paragraphs on each topic below, and describe how it applies to the realm of data communication. Also discuss what type of damage these computer infections can do to data in a computer.

  Pricing in one market depends on sales

12. A firm makes two products, x and y. Inverse demand for each shows that pricing in one market depends on sales in the other according to the equation:Px=1000 - 20x + 3y and Py = 500 - 5y + x.The firm faces joint fixed cost of $12,000 and constant ..

  Describe the graphical coordinate system in java

Describe the graphical coordinate system in Java. Where is the origin? What units apply to the x,y coordinates?

  Determine the hardware to be used and the installation

Determine the hardware to be used and the installation options. How will users log onto the systems. Explain.

  Generates all the possible n-node binary tree configurations

Implement a function that generates all the possible N-node binary tree configurations. The value N is a parameter to the function and the function should return a list of binary tree. Any container ADT (list, queue, vector, etc...) can be used to st..

  Distinguish distances that moved their shopping carts

Performing 200 Nm of work. Both Brian and Dawn are exerting same amount of force (20 N). Distinguish the distances that Brian and Dawn moved their shopping carts.

  Show how you would read the status of 100 students

Sample input and the results are shown below. Please enter 10 numbers: 10 31 2 73 24 65 6 87 18 9 Your numbers are: 10 9 31 18 2 87 73 6 24 65

  Write out a cfg

Write out a CFG for the following regular expression a n b m  | m > n > 0

  Calculate the sum of all the elements of firstarray

Calculate the sum of all the elements of FirstArray and put the sum in EAX. Use indirect addressing to access the elements of array.

  Discuss how you think learning more about excel will assist

Discuss how you think learning more about Excel will assist you in your school work and career. What types of spreadsheets have you created or do you plan to create now that you know more about Excel

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd