Describe the process used in restoring the scrambled bits

Assignment Help Other Subject
Reference no: EM131967201

Assignment - Tasks and Forensics Report

Task 1: Recovering scrambled bits

For this task I will upload a text file with scrambled bits on the Interact site closer to the assignment due date. You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment.

Describe the process used in restoring the scrambled bits and insert plain text in the assignment.

Task 2: Digital Forensics Report

In this major task you are assumed a digital forensics investigator and asked to prepare a digital forensic report for the following scenario:

You are investigating a possible intellectual property theft by a contract employee of Exotic Mountain Tour Service (EMTS). EMTS has just finished an expensive marketing and customer service analysis with Superior Bicycles, LLC. Based on this analysis, EMTS plans to release advertising for its latest tour service with a joint product marketing campaign with Superior Bicycles. Unfortunately, EMTS suspects that a contract travel consultant, Bob Aspen, might have given sensitive marketing data to another bicycle competitor. EMTS is under a nondisclosure agreement with Superior Bicycles and must protect this advertising campaign material.

An EMTS manager found a USB drive on the desk Bob Aspen was assigned to. Your task is to determine whether the drive contains proprietary EMTS or Superior Bicycles data. The EMTS manager also gives you some interesting information he gathered from the Web server administrator. EMTS filters all Web-based e-mail traffic traveling through its network and detects suspicious attachments. When a Web-based e-mail with attachments is received, the Web filter is triggered. The EMTS manager gives you two screen captures, shown in Figures 8-5 and 8-6 (Textbook page 327), of partial e-mails intercepted by the Web filter that lead him to believe Bob Aspen might have engaged in questionable activities. (Nelson, Phillips, & Steuart, 2015, p. 326-327)

Deliverable: For this forensic examination, you need to search all possible places data might be hiding and submit a digital forensics report of 1800-2000 word.

Rationale
This assessment task covers data validation, e-discovery, steganography, reporting and presenting, and has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess the learning outcomes:
- determine the legal and ethical considerations for investigating and prosecuting digital crimes
- analyse data on storage media and various file systems
- collect electronic evidence without compromising the original data;
- evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab;
- compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation;
- prepare and defend reports on the results of an investigation

Presentation

The following should be included as minimum requirements in the report structure:
- Executive Summary or Abstract
This section provides a brief overview of the case, your involvement as an examiner, authorisation, major findings and conclusion
- Table of Contents
- Introduction
Background, scope of engagement, forensics tools used and summary of findings
- Analysis Conducted
o Description of relevant programs on the examined items
o Techniques used to hide or mask data, such as encryption, steganography, hidden attributes, hidden partitions etc
o Graphic image analysis
- Findings
This section should describe in greater detail the results of the examinations and may include:
o Specific files related to the request
o Other files, including deleted files that support the findings
o String searches, keyword searches, and text string searches
o Internet-related evidence, such as Web site traffic analysis, chat logs, cache files, e-mail, and news group activity
o Indicators of ownership, which could include program registration data.
- Conclusion
Summary of the report and results obtained
- References
You must cite references to all material you have used as sources for the content of your work
- Glossary
A glossary should assist the reader in understanding any technical terms used in the report. Use a generally accepted source for the definition of the terms and include appropriate references.
- Appendices
You can attach any supporting material such as printouts of particular items of evidence, digital copies of evidence, and chain of custody documentation.

Apa referencing style

Verified Expert

The digital forensics report is provided discussing about the legal and ethical considerations, analysis of data on storage, collecting electronic evidence evaluation of functions and features of digital forensics equipment. the environment and the tools, technical tactics in digital crimes, introduction, analysis, findings and conclusion of the cyber crime. The paper is prepared for 1800 words. Referencing in APA format.

Reference no: EM131967201

Questions Cloud

Explain the specific sex offender registration laws : Provide a brief history of the sex offender notification/registration in the United States and explain the specific sex offender registration laws.
What will cash flow be under the proposed capital structure : What will Allison's cash flow be under the proposed capital structure of the firm? Assume she keeps all 300 of her shares.
Oldowan and acheulean toolmakers : What do you think about the relative cognitive capacities of Oldowan and Acheulean toolmakers? Which one is harder to make?
Percent of a population is immune : If ninety percent of a population is immune to a particular disease they protect the susceptible ten percent by a concept known as?
Describe the process used in restoring the scrambled bits : You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment
Discuss the different sets of accounting rules : Summarize the difference in income, total assets , and total stockholders' equity using the two different sets of accounting rules over the two year period.
What is a normal baseline fetal heart rate : There is no consensus about the normal fetal heart rate. Current international guidelines What is the first stage of labor along with its phases and dilatations
Prepare t-accounts and entries for the given account : Prepare T-accounts and entries for the following account related to these transactions: Accounts Payable (€).
Are they a member of any specific criminal organization : How do they do what they do (equipment, funding, etc.)? Under what psychological theories and profiles do they fall?

Reviews

inf1967201

6/19/2018 5:47:00 AM

Here is the reply of my teachers 28914046_1EA14A6C3-8099-4532-808D-946C92DFED2E.jpeg 28914054_22B981606-B270-4EF4-8C54-42F76D937638.jpeg I am told to read chapter 9 of Nelson, B., Phillips, A., & Steuart, C. (2015). Guide to Computer Forensics and Investigations (5/e). Boston, MA. Course Technology in order to scramble bit and then please do the task2 the way my friend has done ( the sample has been provided) I have only one day please help me you are required to scramble the bits in the first task then implement all the required task in the task2 as mentioned in the assignment. in order to scramble bit look out chapter 9 of the prescribed book which I have provided you before.

inf1967201

6/19/2018 5:42:19 AM

I have sent two assignments. I have already made few assignments from you people before. I received the task 2 but there is two task and task 1 I am yet to receive now. I will give the feedback once I get back from my teacher meanwhile please send me task 2. I have attached the task 1 file 8914050_1Assi3 Task1 Scrambled.txt WinHex software is a tool. please use it. I have a sample assignment of my friend if you need it please let me know. 8914019_1moshin masood khan 11620023df assignemnt 2.docx Thanks for competing for the task 1. Now could you please go through the task2. In the task2 we have to discuss about the case related to task1 as well.please go through my friend’s assignments eventually you’ll come to know thanks Hi need to talk to the teacher then I’ll let you know tomorrow thanks for the concern. Hi after emailing my teacher, he said the boys has to be scrambled and you must apply correct techniques to make the bits even.

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd