Describe the process used in restoring the scrambled bits

Assignment Help Other Subject
Reference no: EM132311764

Assessment - Tasks and Forensics Report

Task 1: Recovering scrambled bits

For this task I will upload a text file with scrambled bits on the suject interact2 site closer to the assignment due date. You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment.

Deliverable: Describe the process used in restoring the scrambled bits and insert plain text in the assignment.

Task 2: Digital Forensics Report

In this major task you are assumed a digital forensics investigator and asked to prepare a digital forensic report for the following scenario:

You are investigating a possible intellectual property theft by a new employee of Superior Bicycles, Inc. This employee, Tom Johnson, is the cousin of Jim Shu, an employee who had been terminated. Bob Aspen is an external contractor and investor who gets a strange e-mail from Terry Sadler about Jim Shu's new project (shown in Figure 8-5 of the textbook on p. 350). Bob forwards the e-mail to Chris Robinson (the president of Superior Bicycles) to inquire about any special projects that might need capital investments. Chris forwards the e-mail to the general counsel, Ralph Benson, asking him to look into it. He also forwards it to Bob Swartz, asking him to have IT look for any e-mails with attachments. After a little investigation, Bob Swartz forwards an e-mail IT found to Chris Robinson (shown in Figure 8-6 of the textbook on p. 350).

Chris also found a USB drive on the desk Tom Johnson was assigned to. Your task is to search for and determine whether the drive contains any proprietary Superior Bicycles, Inc. data in the form of any digital photograph as an evidence. In particular, you may look for graphic files such as JPEG on the USB drive hidden with different format. Note for the USB drive image, you need to download the "C08InChp.exe" file from the download section of Chapter 8 on the student companion site of the textbook (Nelson, Phillips, & Steuart, 6/e, 2019).

Your task is to search all possible places data might be hidden (e-mails and USB drive) and recover and present any digital evidence in the report.

Verified Expert

The assignment is a law related assignment looking at the issue of digital forensics and intellectual property rights.It discuss various aspects of digital forensics, analyzes a case example and provides solutions for the digital forensics investigator.The task also discusses the steps to be taken to determine whether a person is in breach of intellectual property rights.I confirm it is the right solution for the task.

Reference no: EM132311764

Questions Cloud

Analyse and present a comprehensive business case : BO1BSRE301 Business Strategy kent institute australia-Analyse and present a comprehensive business case in groups and submit individual self-reflective summary
Price elasticity of demand for product : Find the prices and output levels that maximise profits; the price elasticity of demand for each product at the profit maximising prices.
Development and testing of this product improvement : What type of appropriation should be used to pay for the development and testing of this product improvement?
Two events on the market for flax seed : Given this information and holding everything else constant, what is the impact of these two events on the market for flax seed?
Describe the process used in restoring the scrambled bits : ITC597 - Digital Forensics - Charles Sturt University - Describe the process used in restoring the scrambled bits and insert plain text in the assignment
Is money actually a motivator in the workplace : Does money motivates CEOs more or less than employees within the same companies? Why? Explain
Greatly from that of their employers or governments : What can happen when a population's collective value system differs greatly from that of their employers or governments?
Critical evaluation of your experience undertaking a project : A critical evaluation of your experience undertaking a project, with reference to theory. BRIEFLY describe the situation/s you are going to discuss
Most regulated and examined industries : Why are banks one of the most regulated and examined industries in the U.S?

Reviews

len2311764

5/25/2019 4:01:00 AM

Glossary A glossary should assist the reader in understanding any technical terms used in the report. Use a generally accepted source for the definition of the terms and include appropriate references. • Appendices You can attach any supporting material such as printouts of particular items of evidence, digital copies of evidence, and chain of custody documentation. Follow the referencing guidelines for APA 6 as specified in Referencing Guides.

len2311764

5/25/2019 4:00:53 AM

Findings This section should describe in greater detail the results of the examinations and may include: o Specific files related to the request o Other files, including any deleted files that support the findings o String searches, keyword searches, and text string searches o Internet-related evidence, such as Web site traffic analysis, chat logs, cache files, e-mail, and news group activity o Indicators of ownership, which could include program registration data. • Conclusion Summary of the report and results obtained • References You must cite references to all material you have used as sources for the content of your work

len2311764

5/25/2019 4:00:48 AM

The following should be included as minimum requirements in the report structure: Executive Summary or Abstract This section provides a brief overview of the case, your involvement as an examiner, authorisation, major findings and conclusion • Table of Contents • Introduction Background, scope of engagement, forensics tools used and summary of findings • Analysis Conducted o Description of relevant programs on the examined items o Techniques used to hide or mask data, such as encryption, steganography, hidden attributes, hidden partitions etc o Graphic image analysis

len2311764

5/25/2019 4:00:19 AM

Findings: specific files/images, type of searches, type of evidence, indicators of ownership (5 marks) A greater detail of findings is provided. Keywords and string searches are listed very clearly. Evidence found is very convincing. Indication of ownership is very clear.Conclusion: Summary, Results (3 marks) High level summary of results is provided which is consistent with the report. References: Must cite references to all material used as sources for the content (2 marks) APA 6th edition referencing applied to a range of relevant resources. No referencing errors. Direct quotes used sparingly. Sources all documented.

len2311764

5/25/2019 3:59:48 AM

Criteria Successfully recovering the scrambled bits to their original order (5 marks) HD 100% - 85% Scrambled bits are restored to the original text. Tool used to decode the text is mentioned and justification to use the tool is also provided. The process to restore the scrambled bits is clearly described with screenshots inserted of all steps. Task 2: Forensics report (20 marks) Criteria Introduction: Background, scope of engagement, tools and findings (3 marks) All elements are present, well expressed, comprehensive and accurate. Analysis: relevant programs, techniques, graphics (5 marks) Description of analysis is clear and appropriate programs and techniques are selected. Very good graphic image analysis.

len2311764

5/25/2019 3:58:51 AM

Deliverable: For this forensic examination, you need to provide a report of 1800-2000 words in the format described in presentation section below. Rationale This assessment task will assess the following learning outcome/s: be able to determine and explain the legal and ethical considerations for investigating and prosecuting digital crimes. be able to formulate a digital forensics process. be able to evaluate the technology in digital forensics to detect, prevent and recover from digital crimes. be able to analyse data on storage media and various file systems. be able to collect electronic evidence without compromising the original data. be able to critique and compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation. be able to prepare and defend reports on the results of an investigation.

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd