Ask Homework Help/Study Tips Expert

Scenario

As a Digital Forensic Consultant, you have been asked by a company to investigate possible illicit materials on a company PC workstation.

A printout of one such image was found in the local printer attached to the workstation (Figure 1) when a printer jam was cleared. Storing, downloading or transmitting such illicit images of "cats" is against company policy. Any employee found deliberately contravening this policy is subject to instant dismissal. However, it is proving to be difficult to identify the owner of the image. This is firstly because no printer or network logs are available that would allow the company to trace the image back to a user. Secondly, two part-time members of staff, Alice and Bob, share the workstation that the printer is connected to.

You have been provided with a forensically sound image of the PC's hard drive to analyse. The image file is in the CAINE virtual machine in Linuxzoo, within the directory /images/cw3. This directory also contains the hash of the drive at the time of acquisition.

Specifically, your remit for the analysis has been described as: "Firstly, we are interested in establishing whether the drive contains any illicit images. If so, we would like to establish the extent of the problem and the user responsible. We would like to know where the images originated and whether the responsible user had any plans regarding the images, for example, further distribution, or whether they collaborated with anyone else."

You need to perform a forensic analysis of the supplied drive image and write up your findings in an investigation report. To fulfil the remit, your analysis should include the following:
1. An exhaustive search for image files on the drive and establishing the user they belonged to.
2. Analysis of the relevant user's browser artefacts
3. Analysis of the relevant user's communications with others (such as email, messenger, etc)

Methods and tools to address items 1 and 2 are taught explicitly in this module, though you may want to research some of these further. Item 3 has not been covered in the taught material of the course, so you will need to tackle this challenge.

Report requirements

Your report must include the following:

- Executive Summary - This must be at the beginning of your report, clearly summarise your main findings and give your conclusion, as well as outlining any limitations of your investigation. The Executive Summary must be written for a non-technical audience (e.g. CEO, lawyer, judge or jury). It is strictly limited to ONE page plus a table that provides a high level summary timeline of the relevant user's actions relating to the remit of the investigation. The table should be single spaced, 10 point font and may include no more than 20 rows.

- Procedure/Discussion - This is the core of your coursework. Make sure you document the investigative procedure followed in answering the task, identifying all relevant data and metadata and evaluating the information into a coherent discussion which includes error risk. Your report should thus include a significant amount of analysis of the information you are presenting. Your reasoned opinion is also needed, as well as critical evaluation of the data.
Remember that the acquisition and preservation of evidence are not part of your remit - your investigation should cover the analysis, evaluation and reporting stages of the investigation only.

- Supporting evidence and methods - Include in the body of your report screenshots of relevant evidence and the commands used to obtain them (If you used a GUI, briefly describe the procedures followed). You may use additional diagrams/tables where useful. All figures must have suitable captions and be explicitly referred to in the text. Make sure that screenshots are clear and cropped to show only relevant parts and further highlight the important information.

- Research and References - Use research to underpin your investigation, particularly regarding email and messenger analysis. This can include academic articles, white papers, relevant websites and books. Throughout the report, where you are discussing knowledge gained from the references, include citations in the format (author, year) to attribute the information. Remember that your report must be in your own words. It should be your personal reflection on the topic, based on and supported by the

references used and your experiences and knowledge of the module. Do not "cut-and- paste" from the web.
The end of your report should have a list of the references used to support your research, Use the APA/Harvard style in use in the School of Computing.

Refer to the marking scheme overleaf to check how the above will contribute to your marks. The end of the report answers some frequently asked questions. We will also discuss this coursework in a short lecture, which will be recorded for you.

Report format, presentation and style
- The maximum length of the report is 12 pages. This will be strictly enforced - we will not read beyond the end of page 12.
- The report should be around 2500 words.
- Use formal language - this includes using 3rd person.
- It must be completely your own work.
- Start with the executive summary and timeline table (see above) and end with the list of references. The conclusions / limitations are part of the executive summary, do not repeat them at the end of your report.
- No cover page or table of contents is required.
- Appendices are not permitted.
- As your report will be marked online, please use the following formatting for the main body of text (tables, captions and references may use single spacing and 10-11 point font):
o 12 point font
o 1.5 times spacing
o normal margins
o left-aligned
- All pages should be numbered.

Homework Help/Study Tips, Others

  • Category:- Homework Help/Study Tips
  • Reference No.:- M92532046
  • Price:- $140

Guranteed 48 Hours Delivery, In Price:- $140

Have any Question?


Related Questions in Homework Help/Study Tips

Review the website airmail service from the smithsonian

Review the website Airmail Service from the Smithsonian National Postal Museum that is dedicated to the history of the U.S. Air Mail Service. Go to the Airmail in America link and explore the additional tabs along the le ...

Read the article frank whittle and the race for the jet

Read the article Frank Whittle and the Race for the Jet from "Historynet" describing the historical influences of Sir Frank Whittle and his early work contributions to jet engine technologies. Prepare a presentation high ...

Overviewnow that we have had an introduction to the context

Overview Now that we have had an introduction to the context of Jesus' life and an overview of the Biblical gospels, we are now ready to take a look at the earliest gospel written about Jesus - the Gospel of Mark. In thi ...

Fitness projectstudents will design and implement a six

Fitness Project Students will design and implement a six week long fitness program for a family member, friend or co-worker. The fitness program will be based on concepts discussed in class. Students will provide justifi ...

Read grand canyon collision - the greatest commercial air

Read Grand Canyon Collision - The greatest commercial air tragedy of its day! from doney, which details the circumstances surrounding one of the most prolific aircraft accidents of all time-the June 1956 mid-air collisio ...

Qestion anti-trustprior to completing the assignment

Question: Anti-Trust Prior to completing the assignment, review Chapter 4 of your course text. You are a manager with 5 years of experience and need to write a report for senior management on how your firm can avoid the ...

Question how has the patient and affordable care act of

Question: How has the Patient and Affordable Care Act of 2010 (the "Health Care Reform Act") reshaped financial arrangements between hospitals, physicians, and other providers with Medicare making a single payment for al ...

Plate tectonicsthe learning objectives for chapter 2 and

Plate Tectonics The Learning Objectives for Chapter 2 and this web quest is to learn about and become familiar with: Plate Boundary Types Plate Boundary Interactions Plate Tectonic Map of the World Past Plate Movement an ...

Question critical case for billing amp codingcomplete the

Question: Critical Case for Billing & Coding Complete the Critical Case for Billing & Coding simulation within the LearnScape platform. You will need to create a single Microsoft Word file and save it to your computer. A ...

Review the cba provided in the resources section between

Review the CBA provided in the resources section between the Trustees of Columbia University and Local 2110 International Union of Technical, Office, and Professional Workers. Describe how this is similar to a "contract" ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As