In this major task assume you are a Digital Forensics Examiner. Considering a real or a hypothetical case you are required to produce a formal report consisting of facts from your findings to your...

1 answer below »
In this major task assume you are a Digital Forensics Examiner. Considering a real or a hypothetical case you are required to produce a formal report consisting of facts from your findings to your attorney who has retained you. You are free to choose a forensics scenario which can be the examination of a storage media (HDD, USB Drive, etc), email or social media forensics, mobile device forensics, cloud forensics or any other appropriate scenario you can think of.


Document Preview:

Task 3: Forensics Report (20 Marks) In this major task assume you are a Digital Forensics Examiner. Considering a real or a hypothetical case you are required to produce a formal report consisting of facts from your findings to your attorney who has retained you. You are free to choose a forensics scenario which can be the examination of a storage media (HDD, USB Drive, etc), email or social media forensics, mobile device forensics, cloud forensics or any other appropriate scenario you can think of. Deliverable: A forensics report of 1800-2000 words.   Rationale This assessment task covers data validation, e-discovery, steganography, reporting and presenting, and has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to: determine the legal and ethical considerations for investigating and prosecuting digital crimes; analyse data on storage media and various file systems; collect electronic evidence without compromising the original data; evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab; compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation; prepare and defend reports on the results of an investigation. Report requirements: Presentation The following should be included as minimum requirements in the report structure:   Executive Summary or Abstract This section provides a brief overview of the case, your involvement as an examiner, authorisation, major findings and conclusion    Table of Contents   Introduction Background, scope of engagement, forensics tools used and summary of findings   Analysis Conducted o Description of relevant programs on the examined items o Techniques used to hide or mask data, such as encryption, steganography, hidden attributes, hidden partitions etc o Graphic image analysis   Findings This section should describe...



Answered Same DayDec 27, 2021

Answer To: In this major task assume you are a Digital Forensics Examiner. Considering a real or a hypothetical...

Robert answered on Dec 27 2021
128 Votes
Abstract:
This is based on the BTK serial killer, which go as one of the major unexplained
mystery in America. Police exhausted hundreds of thousands of hours and millions of dollars
frustrating to learn the identity of the man had who killed 10 people in and around Wichita,
Kansas, between 1974 and 1991.
After that, in a small amount of small hours on Februa
ry 16, 2005, computer
forensicists able what police had unsuccessful to do for other than 30 years by recognize the
killer as a man named Dennis Rader. The case remains the most famous ever solved by
computer forensics.
IADT ,2011, “Most Famous Case Ever Solved by Computer Forensics”
How the Digital storage devices could taste in the forensic taste:
Disk forensics is the technology of take out foresic data from digital storage media like
Hard disk, USB devices, Fire wire devices, CD, DVD, Flash drives, Floppy disks etc.. The
procedures of Disk Forensics are
1. Recognize digital proof
2. Grab & obtain the data
3. Validate the proof
4. Conserve the proof
5. Analyze the proof
6. Details the findings
Identify digital storage devices:
Primary step in Disk Forensics is recognition of storage devices at the prospect of offence
like hard disks with IDE/SATA/SCSI interfaces, CD, DVD, Floppy disk, Mobiles, PDAs,
flash cards, SIM, USB/ Fire wire disks, Magnetic Tapes, Zip drives, Jazz drives etc. These
are a number of the foundation of digital proof.
Seizure and Acquisition of Storage devices:
Subsequently step is grabbing the storage space media for digital proof compilation.
This movement is performing at the sight of crime. In this step, a confusion worth of the
storage media to be detained is computed by means of suitable cyber forensics tool. Hash
value is a exclusive signature generate by a arithmetical hashing algorithm base on the
contented of the storage space media. Subsequent to compute the hash value, the storage
space media is steadily preserved and taken for more processing.
Solitary of the basic rules of Cyber Forensics is “Under no circumstances work on unique
evidence”. To make sure this rule, a precise copy of the unique evidence is to be formed for
examination and digital evidence compilation. Attainment is the procedure of creating this
precise copy, where unique storage medium will be write protected and bit stream copying is
made to make sure absolute data is copied into the target media.
Authentication of the evidence:
Confirmation of the proof is agreed out in Cyber Forensics laboratory. Hash values of both
cause and purpose medium will be compare to create certain that in cooperation the values
are similar, which make certain that the contented of purpose media is an precise copy of the
source media.
Preservation of the evidence
Electronic proof may be distorted or tamper with no trace. Just the once the acquisition and
verification have been completed, the innovative confirmation have to be located in secure
storage space custody away from extremely attractive and radiation sources. One more copy
of image has to be engaged and it requirements to be store into suitable media or dependable
accumulation storage space. Optical medium can be used as the accumulation storage space.
It is dependable, speedy, longer life distance and reusable.
Verification and Analysis of the evidence
Substantiation of proof before initial examination is an important step in Cyber Forensics
process. This is completed in Cyber Forensics laboratory previous to beginning analysis.
Hash value of the proof is compute and compares it with the hash value engaged at the time
of achievement. If both the standards...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here