Validating and testing digital forensics tools and evidence

Assignment Help Other Subject
Reference no: EM132503176

MN624 Digital Forensic Assignment - Melbourne Institute of Technology, Australia

Assessment Title - Validating and testing digital forensics tools and evidence

Purpose of the assessment (with ULO Mapping) - This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

b) Record, administer and document digital forensics in social media.

Assignment Description - Assignment - Leaving Clues to a Crime

In this Assignment you will create a pretended crime scenario that needs computer forensic analysis. Along with the crime scenario, create digital clues that may be left on a small portable storage device.

IMPORTANT: Any names of persons or organizations in the crime scenario should be pretended; DO NOT use the names of real people or businesses. Also, DO NOT develop a crime scenario involving child pornography or anything that can be interpreted as a threat to the public. Acceptable topics include theft, embezzlement, kidnapping a fictitious character, the murder of a fictitious character, etc.

The chosen crime scenario must be discussed according to the following questions:

Questions -

Q1) You will leave your digital "clues" on a flash/thumb drive. Provide your thumb drive (containing your digital clues) for analysis as an image by using software such as ProDiscover.

Include this screenshot in your final report!

Your digital clues must include at least one of each of the following:

- Hidden file

- Deleted file

- Graphic file

- Password-protected file

- Web access (browser history)

- Change extension of one file such as .docs to .pdf

Q2) Discuss what should you consider when determining which data acquisition method to use.

Q3) Discuss some options that can be used for preserving the data in this situation

Q4) Explain two acquisition methods that you should use in this situation.

Assignment 1b: Create and Delete Files on USB Drive

In this Assignment 1b, you need to find any evidence of the Assignment 1a, and any data that might have been generated from the suspect's hard drive, so that, it may be presented in a court of law. To create your digital clues, please do the following task:

1. On your USB drive, create a word file named your Student ID, where the blank should be filled with your name, mobile, citizen, address and some other information.

The file should contain the following sentence: "I have enrolled for MN624 Digital Forensic." The first blank in the sentence should be filled in with your Full name and the second blank with the date when you registered for this unit.

2. On the same drive, create an excel file named "StudentID.xls", where the First column should be filled with your units name that you had at MIT last semester and the second column should be filled with your marks with those units.

3. Store your current Photo on a USB drive and save it in JPG format or other images format.

4. Take a screenshot of your Windows Explorer window showing the content of the USB's folder hosting the three files.

Include this screenshot in your final report! Now delete those files, and then take another screenshot of the respective folder's content (after the two files have been deleted). Include this screenshot in your final report.

Table 1: Digital forensics Tools (You can choose any two tools for your demonstration with your tutor's consent)

 

Serial # Name of the security tool
1 The Sleuth Kit (Autopsy)
2 FTK Imager
3 X-Ways Forensics
4 CAINE (Computer Aided Investigative Environment)
5 SANS Investigative Forensic Toolkit (SIFT)

Table 1
Q1) Use two computer forensics tool from table 1 to Acquire an Image of USB Drive. In the report, you need to include the screenshots of each step.
Q2) Use two computer forensics tool from table 1 to Recover Deleted Images and to verify which files have changed of extension. In the report, you need to include the screenshots of each step.
Q3) validate your results by using hash algorithms.

Q4) Comparison of the digital forensics tools that you used in this work. Your comparison could include:
- Digital forensics features
- Time is taken to detect acquire threat
- Ease of usage

Q7) Demonstration of the two digital forensics tools that you used in this work on week 7.

Note - Word limit Max 2000 words.

Attachment:- Validating and testing digital forensics tools and evidence.rar

Reference no: EM132503176

Questions Cloud

How you identify the students readiness for learning : How you identify the students' readiness for learning in at least two developmental domains (cognitive, linguistic, social, emotional, and/or physical).
Describe connection between neuroplasticity and cognition : Describe the connection between neuroplasticity and cognition and how your understanding of neural development and cognitive processing will guide your work.
Explain the difference in ending inventory values : Explain the difference in ending inventory values under the FIFO and LIFO cost bases when the price of inventory items purchased during the period
Critically evaluate contemporary quality or risk concept : Critically evaluate contemporary quality or risk concept and discuss its application in a project environment along with its impact on project life cycle
Validating and testing digital forensics tools and evidence : Create a pretended crime scenario that needs computer forensic analysis. Along with the crime scenario, create digital clues that may be left
Find how many new eating establishments added in year : In a growing midwestern town, the number of eating establishments at the end of each, how many new eating establishments will be added in year 6?
How will you explain concept of fairness in your classroom : For this assignment you will articulate your behavior management philosophy by creating a presentation on your beliefs and practices for addressing whole class.
Network management tool - opmanager : Perform a literature review on modern network applications and management and Analyse common and emerging types of middleware to design and manage networked app
Prepare forecast the amount of lunch sales for june : Forecast the amount of breakfast sales for June 20X1 (Assume the first day of June is a Monday). Forecast the amount of lunch sales for June 20X1

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd