ITC597 Digital Forensics Assignment

Assignment Help Computer Engineering
Reference no: EM132522778 , Length: word count:2500

ITC597 Digital Forensics - Charles Sturt University

Assessment - Tasks and Forensics Report

Learning outcome 1: be able to determine and explain the legal and ethical considerations for investigating and prosecuting digital crimes.

Learning outcome 2: be able to formulate a digital forensics process.

Learning outcome 3: be able to evaluate the technology in digital forensics to detect, prevent and recover from digital crimes.

Learning outcome 4: be able to analyse data on storage media and various file systems.

Learning outcome 5: be able to collect electronic evidence without compromising the original data.

Learning outcome 6: be able to critique and compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation.

Learning outcome 7: be able to prepare and defend reports on the results of an investigation.

Task 1: Recovering scrambled bits

For this task I will upload a text file with scrambled bits on the suject interact2 site closer to the assignment due date. You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment.

Deliverable: Describe the process used in restoring the scrambled bits and insert plain text in the assignment.

Task 2: Digital Forensics Report

In this major task you are asked to prepare a digital forensic report for the following scenario after carefully reading the scenario and looking at textbook figures as referred below:

You are investigating a possible intellectual property theft by a new employee of Superior Bicycles, Inc. This employee, Tom Johnson, is the cousin of Jim Shu, an employee who had been terminated. Bob Aspen is an external contractor and investor who gets a strange e-mail from Terry Sadler about Jim Shu's new project (shown in Figure 8-5 of the textbook on p. 350). Bob forwards the e-mail to Chris Robinson (the president of Superior Bicycles) to inquire about any special projects that might need capital investments. Chris forwards the e-mail to the general counsel, Ralph Benson, asking him to look into it. He also forwards it to Bob Swartz, asking him to have IT look for any e-mails with attachments. After a little investigation, Bob Swartz forwards an e-mail IT found to Chris Robinson (shown in Figure 8-6 of the textbook on p. 350).

Chris also found a USB drive on the desk Tom Johnson was assigned to. Your task is to search for and determine whether the drive contains any proprietary Superior Bicycles, Inc. data in the form of any digital photograph as an evidence. In particular, you may look for graphic files such as JPEG on the USB drive hidden with different format. Note for the USB drive image, you need to download the "C08InChp.exe" file from the download section of Chapter 8 on the student companion site of the textbook (Nelson, Phillips, & Steuart, 6/e, 2019).

Your task is to search all possible places data might be hidden (e-mails and USB drive) and recover and present any digital evidence in the report.

Deliverable: For this forensic examination, you need to provide a report of 1800-2000 words (approximately 5 A4 pages).

Attachment:- Digital Forensics.rar

Reference no: EM132522778

Questions Cloud

Identify two different conditions under which the regression : Identify two different conditions under which the regression line should not be used to make predictions.
Compute the required EPS amount : The company has 230,000 common shares outstanding as of January 1, 2020, and declared a 1-for-2 reverse stock split on March 31. Compute the required EPS amount
Asymmetric and symmetric encryption : Examine the fundamental differences and similarities between asymmetric and symmetric encryption.
What was the purpose or rationale of the research : This week, you will select an agency for, and begin the preliminary research associated with, completing your Final Project. Prior to beginning work on this.
ITC597 Digital Forensics Assignment : ITC597 Digital Forensics Assignment Help and Solution, Charles Sturt University - Assessment Writing Service - formulate a digital forensics process
Find what is the ninty-day forward rate : The 90-day forward rate is quoted at a premium of 5.00 percent on the euro. What is the 90-day forward rate? (Round answer to 6 decimal places)
What is the required rate of returns on msft stock : What is the required rate of returns on MSFT stock if its beta is 1.24. Currently, 3-month T-bill rate is 4% and expected returns on S&P 500 index is 16%
Probability of the event : For a random variable X, if V( X ) = 1, then the probability of the event: (X - E(X) )2 > 4,
Business value dashboard : What are the most important parts of this dashboard? How do these parts help the business managers? How do they help the individual contributors?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd