Describe the process used in restoring the scrambled bits

Assignment Help Computer Network Security
Reference no: EM13730600

Task 1: Recovering scrambled bits

Scrambled bits on the subject site closer to the assignment due date. You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment.

Deliverable: Describe the process used in restoring the scrambled bits and insert plain text in the assignment.

Task 2: Revealing hidden information from an image

For this task I will provide an image with hidden information in it. You will be required to reveal the hidden information.

Deliverable: Describe the process used to reveal the hidden information from the image and copy the revealed information in the assignment in plain text.

Task 3: Forensics Report

In this major task you are assumed as a Digital Forensics Examiner. Considering a real or a hypothetical case you are required to produce a formal report consisting of facts from your findings to your attorney who has retained you. You are free to choose a forensics scenario which can be examination of a storage media (HDD, USB Drive etc), spoofed email, unscrambling bits, revealing information from an image or any other appropriate scenario you can think of.

Rationale

This assessment task covers data validation, e-discovery, steganography, reporting and presenting, and has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to:

Determine the legal and ethical considerations for investigating and prosecuting digital crimesanalyse data on storage media and various file systemscollect electronic evidence without compromising the original data;evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab;compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation;prepare and defend reports on the results of an investigation

Successfully revealing hidden text from an image

Hidden text is revealed. Tool used to reveal the text is mentioned and justification to use the tool is also provided. The process to reveal the text is clearly described with screenshots inserted of all steps.

Hidden text is revealed. Tool used to reveal the text is mentioned but the justification is not very clear. The process to restore the text is described with some screenshots.

Hidden text is revealed. Tool used to reveal the text is mentioned but the justification is not very clear. The process to restore the text is described but no screenshots provided.

Hidden text is revealed. No justification of tool used is provided, process seems to be somewhat vague. 

Hidden text is revealed but not matching with the original text. Tool is not mentioned and process is not described.

Task 3: Forensics report

Criteria

HD

100% - 85%

DI

84% - 75%

CR

74% - 65%

PS

64% - 50%

FL

50% - 0

Introduction:

Background, scope of engagement, tools and findings

All elements are present, well expressed, comprehensive and accurate.

All elements are present and largely accurate and well expressed.

All elements are present with few inaccuracies.

Most elements are present possibly with some inaccuracies.

Fails to satisfy minimum requirements of introduction.

Analysis: relevant programs, techniques, graphics

Description of analysis is clear and appropriate programs and techniques are selected. Very good graphic image analysis.

Description of analysis is clear and mostly appropriate programs and techniques are selected. Good graphic image analysis.

Description of analysis is clear and mostly appropriate programs and techniques are selected. Reasonable graphic image analysis.

Description of analysis is not completely relevant. Little or no graphics image analysis provided.

Fails to satisfy minimum requirements of analysis.

Findings:

specific files/images, type of searches, type of evidence, indicators of ownership

A greater detail of findings is provided. Keywords and string searches are listed very clearly. Evidence found is very convincing. Indication of ownership is very clear.

Findings are provided, keywords and string searchers are listed. Evidence is sound. Ownership is clear.

Findings are provided, some keywords are listed. Evidence is reasonable which relates to the ownership.

Findings are provided but are somewhat vague. Keywords and strings are not very clear. Evidence found may be questionable.

Fails to satisfy minimum requirements providing findings.

Conclusion:

Summary, Results

High level summary of results is provided which is consistent with the report.

Well summarised results and mostly consistent with the findings. 

Good summary of results.

Able to relate the results with findings. No new material is included.

Satisfies the minimum requirements. Results are not really consistent with the findings.

Fails to satisfy minimum requirements of summarising the results.

Reference no: EM13730600

Questions Cloud

Transcription is the production of rna from dna : Transcription is the production of RNA from DNA. It reads one strand of DNA, called the template, to create a new RNA strand. The nucleotides are added to the growing RNA strand in a 3' to 5' direction from the DNA strand.1. Transcribe the following ..
Shares of equity via general cash offering to raise funds : The Huang Corporation needs to raise $72 million to finance its expansion into new markets. The company will sell new shares of equity via general cash offering to raise the needed funds. The offer price is $55 per share and the company's underwriter..
Explain motivate positive organizational behavior : How do these needs motivate. How are these needs addressed in an organizational context. Provide an example from your current organization. How well does it address the needs of its organizational members. What best practices can you suggest for o..
Scientists create life : Years ago, a newspaper headline read "Scientists Create Life." Scientists had strung together a chain of nucleotides to make a strand of DNA. This was the first time DNA had been synthesized in a laboratory; it has been synthesized many times since t..
Describe the process used in restoring the scrambled bits : Describe the process used in restoring the scrambled bits and determine the legal and ethical considerations for investigating and prosecuting digital crimesanalyse data.
After tax cash flow from the sale of this asset : Consider an asset that costs $369,600 and is depreciated straight-line to zero over its 7-year tax life. The asset is to be used in a 4-year project; at the end of the project, the asset can be sold for $46,200. If the relevant tax rate is 32 percent..
Project to improve its production efficiency : CSM Machine Shop is considering a four-year project to improve its production efficiency. Buying a new machine press for $495,000 is estimated to result in $194,000 in annual pretax cost savings. The press falls in the MACRS five-year class (MACRS Ta..
Construct implementation strategy for hypothetical company : Construct an implementation strategy for your hypothetical company in which you specify the essential activities and responsibilities. Include a timetable for completion of each component of your strategy
Calculate the return of a security with a beta : The risk-free rate is 4% and the expected rate of return on the market portfolio is 9%. Calculate the return of a security with a beta of 1.28 and an expected rate of return of 12% (rounded to 2 decimal places). Is the security overpriced or underpri..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Find out the security risks with respect to phishing

mobile banking features have added several advantages for customers however there are security risks that come with

  Biggest new technology

Question 1: What are some problems with not adding data integrity for your input strings? Example: If you are asking for an amount and when you can put in a letter. Question 2: What is one security issue that can take place with an interface? Expla..

  What is ciphertext generated by encryption of character

A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes. What is the ciphertext (in binary form) generated by the encryption of the character D?

  Operations of an atm machine

Simulate the operations of an ATM machine. First, the customer is prompted to enter his personal identification number pin (for this case study, we test only if this pin is formed by 4 digits, otherwise a message like "Invalid PIN, try again..." w..

  Exchange keys out of band in symmetric encryption

In symmetric encryption, why is it significant to exchange keys "out of band"? Write down the difference between "digital signature" and "digital certificate"?

  Problem on network security planning

Securing a large internetwork remains a daunting challenge. Cloud computing and social networks add to this complexity. In two to three (2-3) pages, and using the CISCO SAFE reference architecture.

  Build on the systems development selected in week 2 and

build on the systems development selected in week 2 and design 1 to 2 user interfaces. explain how the user interface

  Perform an attack against the cipher

Perform an attack against the cipher based on a letter frequency count: How many letters do you have to identify through a frequency count to recover the key? What is the cleartext?

  Evaluate the importance of the nondisclosure agreement

Evaluate the importance of the Nondisclosure Agreement and other legal agreements to both parties -  Propose the main pre-penetration test steps that the penetration tester should perform before beginning the initial phases of the XYZ penetration t..

  Explaining asymmetric encryption algorithms

Using only asymmetric encryption algorithms, describe a process that would allow Alice to send a message that can only be read by Bob. You should include any steps taken by Bob that allow him to read the message.

  Implement client-server application to emulates ping utility

The goal of this assignment is to implement a client-server application which emulates the ping utility. It is also good practice because it implements the client-server architecture.

  Research on personally identifiable information

Learn to correctly use the tools and techniques within Word to format a research paper including using Word 2010/2013's citation tools. These skills will be valuable throughout students' academic career. The paper will require a title page, NO a..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd