Digital evidence relating to graphic files

Assignment Help Other Subject
Reference no: EM133196706

MyHeritage Company is an online medical services platform founded in 2015, which provides various services to patients, such as DNA tests, etc. On 10th November 2018, the company found that the majority of its user's records were breached, where online servers were compromised due to a DDoS attack. As a result, they have assigned the case to a forensic investigator who has conducted some investigations into evidence collection and identification of perpetrators.

The investigator seized the manipulated workstations. The initial investigations have shown that some of the workstations were compromised due to a Malvertising, in which some records were lost a few months before the cyberattack was launched. The forensic examiner has found logic bombs in some workstations in which the cyberattacks could have been linked to those programs. Some of the web browsers had malicious extensions violating the company's policy.  Many of the workstations had no proper antivirus protection and firewalls configured.

The company used Google Drive as its means of sharing online records with staff. Windows 10 was the main OS on the workstations. However, some staff were using Mac OS on their laptops. They could work remotely from any public network, but they were recommended to use private VPNs. Staff were also using iCloud for storing some of the company's data. VMWare was used on some of the workstations for specific applications installed on Ubuntu, but it was not supported by the company's IT services.

The examination has shown that some of the email accounts were hacked by spear-phishing, login credentials were stolen, and some amounts were transferred to some accounts which are not traceable. The Fedwire system was used in the attack which allowed cybercriminal/s to transfer the funds to the intermediary banks. The email attachments showing transactions and communications were successfully extracted by the investigator.

The investigation has shown that NetWitness was installed on some of the workstations. The users of the applications cannot be detected. Also, USB Oblivion was found on a few workstations. VeraCrypt has been installed on the workstations to hide some encrypted files. Many documents including word files excel files, and image files were recovered.

Mobile phones of suspects were seized and investigated. The operating systems on the mobile phones were Android and iOS. The investigated applications were Hotspot Shield, EncryptMe, Photoshop Express, WhatsApp, and some other photo editing and remote desktop tools. Graphic files stored on the mobile phones were png, and gif files. Cloud data applications, e.g. iCloud, were also installed on mobile phones for sharing image files and other sensitive data.

The investigator has done imaging of all hard disks. Most of the data files were collected and analysed through FTK Imager, in which the examiner constantly verified integrity checking.

Given the scenario and seized pieces of evidence by the investigators, it is your role as an investigator to prove or disprove the allegations of any criminal activities, but also of evidence tampering. Answer the following questions in relation to the scenario given. In your answers, you may wish to consider the following points:

It is critically important that you explain why a specific digital forensic evidence from the scenario falls into a particular category, such as network, email, operating system, etc.

Sometimes a particular digital forensic evidence from the scenario can fall into multiple categories. If you wish to use forensic evidence to answer a question, you must adapt your answer to discuss how the forensic evidence is related to the particular digital forensic investigation.

Questions.

1. Identify and discuss any digital evidence relating to graphic files as outlined in the scenario. Make a recommendation on how to search for the evidence and any appropriate tools that can be used, including the pros and cons of the tools.

2. Discuss the steps (standard procedures) that need to be taken to collect the evidence relating to the allegation and any challenges or issues that you might face.

Reference no: EM133196706

Questions Cloud

Create ppt about the impact of long-term trauma on the brain : Create 7 to 10 slides PowerPoint presentation about the impact of long-term trauma on the brain. Include the following in your presentation:
What are the advantages of implanting an arp : ADM 3028 Université du Québec, Montréal Second case: We can see that technological progress in medicine can lead to an increase in the cost of care.
Write an essay on the Role of Technology and Innovation : MGT325 Management of Technology Assignment - Role of Technology and Innovation in the Realization of Vision 2030 KSA Essay, Saudi Electronic University
Draft a discussion post on your stance on private prisons : Draft a discussion post on your stance on private prisons. Should incarceration be left to the government?
Digital evidence relating to graphic files : ICT 378 Murdoch University MyHeritage Company is an online medical services platform founded in 2015, which provides various services to patients, such as DNA t
Simple distributed mimo system : Linear combiner and precoder in this system, try both MRT/MRC and ZF. Add some AWGN to the received signals, as you feel is appropriate
How do you feel about the discipline in the local schools : How do you feel about the discipline in the local school (to teachers: at the school where you teach)- is it too strict, not strict enough, or just about right?
Briefing paper for the Red Clay senior leadership : Then, prepare a two-page briefing paper for the Red Clay senior leadership and Red Clay corporate board that addresses planning, programming
Early childhood department : ECD 1513 UNITAR International University Referring to the above statement. discuss the scope of curriculum provided for Infants and toddlers in Malaysia.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd