Need Help with this Question or something similar to this? We got you! Just fill out the order form (follow the link below), and your paper will be assigned to an expert to help you ASAP.
Added on: 0000-00-00 00:00:00Order Code: Question Task Id: 0
MAS7563
Cyber Security Assignment Help:
Task:
This assessment is for students to demonstrate their ability to investigate a computer crime case. Students will be required to follow standard forensic procedure and apply their knowledge of specific legal processes in order to investigate a case. Students will be tested on their ability to follow procedures, use of forensic software tools and justify their findings of the case in a lawful manner.
The Case:
A multinational company engaged SmartForensics, a well-respected third-party digital forensics investigation service provider, to conduct a digital forensics analysis of a desktop for evidence of fraud. The company was able to secure all electronic devices used by the employee quickly and efficiently before the employee was suspended. Shaila Bond, a senior forensic expert at SmartForensics, was assigned to the case. Shaila received the desktop computer used by the employee that was identified as possibly containing electronic evidence (i.e., digital photograph of missing watercolour paintings of two boats). Following industry-standard forensic tools and evidence preservation processes, Shaila created a bit stream copy of the
original storage media that exists on the desktop computer used by the employee.
The working copy of the file can be found here:
Working copy file: http://www.deakin.edu.au/~zoidberg/2018.ISO
Shaila confirmed that the hash value of both the original and the copy matched. The MD5 hash value can be found here:
Hash value: http://www.deakin.edu.au/~zoidberg/2018.ISO.md5
As a BIT (Computer Crime and Digital Forensics) course student, you are placed with SmartFeronsics for your internship to work under Shaila in computer forensic laboratory. Your task for internship period is to undertake an end-to-end digital forensics investigation of the above image for any information relating to the fraud allegation and prepare a detailed investigation report. Your analysis should be conducted on a virtual machine (VMware) and follow industry-standard procedures meticulously and methodically throughout the investigation. You should make sure that the integrity of all evidences are maintained and be mindful of adversaries such as malicious codes that may potentially alter the evidence.
Part A: Evidence Form
Use an evidence custody form, also called a chain-of-evidence form, to record the evidence given to you. You should record details about the images, including who recovered the evidence and when, and who possessed it and when, what has and has not been done with both the original evidence and forensic copies of the evidence.
Part B: Investigation report
1. Introduction
Provide a brief introduction about the case here. Highlight the nature of the case, the issues to be investigated, the type of evidence available, and the location of the evidence.
2. Forensic Workstation
Describe the environment of your forensic workstation and the access to the machine.
Provide detailed description of the physical machine on which the investigation was conducted, the operating system it is running, network-related information and how the machine is secured from adversaries (e.g., malware and intrusions). Remember your analysis is done in VMware environment and thus you need to include all information about the virtual machine environment as well.
3. Downloading image to a working directory
In order to perform the investigation, you should download the image file into your working directory. In this section, you should describe the step-by-step procedure that you used to download the image to your working directory.
4. Content property and integrity validation
Explain the procedure that you used immediately before beginning to collect evidence from the image file you downloaded.
5. Content analysis
Recall that you did a Content search and a Cluster search in week 1 and week 2 practical classes using digital forensic tools. For example, the keyword BOOK was used in week 1 practical class to perform a search on an image file using ProDiscover digital forensic tools. This section has two parts:
In the first part, you will come up with some suitable keywords, based on the information provided in the case description and the information you have gathered so far. For each keyword, use the following table to document the justification for choosing the keyword (i.e., reason), the number of hits the keyword returned when searching each file in the image and some notes you deem to be relevant.
6. Legal issues
Based on the evidence you have discovered from your investigation and the type of criminal offence that the employee committed
a) explain the appropriate Section (only one) of the Cybercrime Act 2001 that applies to the employee offence.
b) explain the appropriate Section (only one) of the Crimes Act 1958 that applies to the employee offence.
c) explain if the case is best pursued as a corporate or criminal investigation.
Justify your answer.
Do not forget to support your answers with appropriate justifications.
7. Conclusion
In this section, you should detail your conclusions of the investigation of the case.
Uploaded By : jack
Posted on : April 07th, 2018
Downloads : 0
