Donald Price is an employee from Joachim’s Art Gallery based in Melbourne, Australia. Mr. Price had been suspended from the gallery when an audit discovered that one of the pieces he was responsible...

Donald Price is an employee from Joachim’s Art Gallery based in Melbourne, Australia. Mr. Price had been suspended from the gallery when an audit discovered that one of the pieces he was responsible for had disappeared. (This was a small watercolour of two boats.) Unfortunately, Mr. Price wiped the hard disk of his office PC before investigators could be deployed. However, a CD-ROM was found in the PC’s CD-ROM drive. Although Mr. Price subsequently denied that the CD-ROM belonged to him, it was seized and entered into evidence. A forensic image in raw format of the CD-ROM can be found here: https://www.dropbox.com/s/ov5ksmtn7afurqw/2019Greenbook.ISO?dl=0 And its MD5 hash value can be found here: https://www.dropbox.com/s/gu7wjpkvymhr1u0/2019Greenbook.ISO.md5?dl=0 You, an IT officer employed by Joachim’s Art Gallery, are assigned to examine the image for any information relating to the case. You should keep in mind malicious codes and other means which may potentially alter the evidence. YOU MUST CITE ALL REFERENCES INCLUDING TECHNICAL MANUALS AND LAW PARAGRAPHS. Your analysis should be conducted on a virtual machine (Virtual Box) and include the following information: 1. PROCEEDURE 1.1 Use an evidence form to document the evidence given to you. (1) 1.2 Describe the environment of your forensic workstation and the access to the machine. Describe the procedure that you used to download the image file to your work directory. (2) 1.3 Give at least two SHA-based hash function values of the ISO image. (2) 1.4 Explain why multiple hash values are necessary to verify the validity of the image file. (2) 1.5 Explain the procedure that you used before you could access the image file inside the virtual machine. (2) 3 2. BINARY DETAILS 2.1 Use a table to document the detailed information of the files found in the root directory of the ISO image—file names, file actual sizes and their MD5 hash values (1) 2.2 Provide a description of any programs you would like to use based on the files identified on the ISO image. (3) 3. FORENSIC DETAILS 3.1 Describe the key words you used to search the ISO image and explain why you chose them. Detail your search result and give your conclusions. (Document your procedure including commands and screenshots.) (12 in total) 4. LEGAL IMPLICATIONS 4.1 List one violation conducted by Mr. Price against Cybercrime Act 2001, and one violation conducted by Mr. Price against the Crimes Act 1958. Back up your answers with definitions. (5) 4.2 Is this case best pursued as a corporate or criminal investigation? Why? (5)
Nov 23, 2021
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here