Forensics data acquisition and analysis

Assignment Help Basic Computer Science
Reference no: EM132371561

Forensics Data Acquisition And Analysis

Assignment

Forensics Data Acquisition and Analysis is a methodological approach of preparing for an investigation, collecting and analysing digital evidence. This require investigator to have a good hands on experience of various digital forensics tools, hardware, software, Files and file systems, Operating systems and Networking. When collecting information computer forensic specialists must keep in mind the lifespan of the information, the importance of collecting evidence quickly, and the need to collect information at the bit level. They should know how to obtain evidence from hidden or deleted data and cope with counter-forensics activities that are designed to conceal the perpetrator's location, actions, or identity. Examples of counter-forensics include destruction/deletion, hiding, encryption, fabrication and falsification and file system alteration.

It is highly recommended that first responders must make a backup copy of any logs, damaged or altered files, and any files left by the suspect. If investigators arrive while the incident is in progress, they should immediately activate auditing or recording software. Investigators should work with a copy of the hard drive, not the original.Today, cybercrimes involve white-collar crimes, counterintelligence, economic espionage, counterfeiting, Identity theft, cyberstalking, Internet Fraud and cyberterrorism. Without proper documentation, a forensic specialist has difficulty presenting findings and courts are unlikely to accept investigative results. This methodology includes strong evidence-processing documentation and good chain-of-custody procedures.

You are hired as a junior forensics examiner by a UK based firm called Digital Eye (DE). The company provide new joiners training to forensics data acquisition and analysis process in their state-of-the-artforensics' lab located in suburbs of London. Your role is to conduct number of forensics experiments before you could be signed off for a field work and should include tasks below.

Assignment tasks and deliverables

This is not anexhaustive list of tasks and provide opportunity to explore more innovative digital crime investigations if required.

• Recovering deleted file from the evidence
• Generating hashes and checksum files
• Calculating the MD5 value of the selected file
• Viewing files of various formats
• Handling evidence data
• Creating a disk image file of a hard disk partition
• Analysing hard disk and investigating file systems
• Creating forensics images using AccessData FTK Imager
• Defeating Anti-forensics - cracking application password
• Analysing files hidden using steganography
• Discovering and extracting hidden forensic material on suspected computer using OSForensics
• Investigating processes using Windows Process explorer
• Analysing Events Logs
• Analysing Volatile Data in Linux Systems
• Network Forensics
• Email Forensics
• Web Attacks

Student need to perform at least 2 investigations. All finding from each should be complied in to a single report with walk through snippets of investigation carried out and commentary to provide critical evaluation of their tasks.

The report should follow the structure below.

1. Computer Emergency Response Team (CERT): a comprehensive plan to establish a CERT team for Digital Eye (DE). [no more than 300 words]

2. Expert Report: examples of what should be covered include (but not limited to) a suitable cover page; summary; expert witnesses, tools used, methodology and procedures; complete statement of all opinions and conclusions; supporting facts and data; witness CVs. [no more than 600 words]

3. Appendix 1 - Reflective Report: must produce a brief individual report to reflect on his/her role and challenges faced (if any). You could focus on limitations, errors or things that could have been done differently. [no more than 50 words per person]

4. Appendix 2 - Table of contribution: to show which tasks/sections was done by whom.

5. Appendix 3: Any other relevant material e.g. forms, templates

Reference no: EM132371561

Questions Cloud

?what happens to lipids in the liver as a result : What happens to protein synthesis following rough ER membrane damage? What happens to lipids in the liver as a result?
List the three types of macromolecules : List the three types of macromolecules that provide energy for biological organisms and the number of Calories provided by 1g of each macromolecule.
How is being on shark tank like being in plato cave : How is being on Shark Tank like being in Plato's Cave? Evaluate/assess the arguments made throughout the video. Does the person asking for funding do well.
What type of cell death did the young man cells : Following exposure to the CCL4, what type of cell death did the young man's cells undergo?
Forensics data acquisition and analysis : OMA053-6: Forensics Data Acquisition And Analysis - University of Bedfordshire - a comprehensive plan to establish a CERT team for Digital Eye (DE)
Describe the implementation of sei strategies : Spend time observing at least one content area classroom that services ELLs in a Title 1 setting. Let your mentors know that you are observing implementation.
Discussion about the management tool in brief : To help your team prepare for the expected debate, you have been asked to write a 3 to 5 paragraph response to the question "Why does Sifers-Grayson need.
Genetic code for this enzyme protein is within the dna : The enzyme, RNA polymerase, is needed to transcribe DNA into mRNA, which is then translated into proteins (such as the polymerase).
Express a clear opinion about the issue you are researching : Most mainstream news sites contain opinion sections, but these can be drawn from any source you'd like--as long as they express a clear opinion about the issue.

Reviews

len2371561

9/16/2019 4:07:42 AM

The assignment explanation mentioned in the attachment. You need to pick two topics from the investigation list and write a report base of the structure mentioned in the assignment. No introduction neither conclusion. References would ne required.

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd