Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

CMIT 424: Digital Forensics Analysis and Application Detailed Assignment Description for Forensic Report #1

20/08/2020 Client: jwilson1228 Deadline: 7 Days

  


The purpose of this assignment is to determine if you can 


· Properly process and handle evidence for a case and perform other case management functions


· Select and use appropriate digital forensics tools


· Prepare and annotate an inventory of files present on an evidence drive


· Triage an evidence drive using a forensic tool to view and analyze partitions, folders, and files to:


o Identify and properly address the presence (if any) of contraband (adult and child pornography, evidence related to narcotics)


o Identify and properly address the presence of evidence related to violations of an employment agreement or violations of company policy


· Evaluate an assessment (formal or informal) performed by another party and provide a formal response (“equivocal assessment”) in which you address the other party’s procedures and findings


· Write a reasonably professional and comprehensive AssessmentReport for a forensic examination 


Required Deliverables:


1. Assessment Report (75% of grade) 


2. Annotated Inventory of Forensically Interesting Files (25% of grade)


Scenario for Forensic Report #1


James Randell, president and owner of Practical Applied Gaming Solutions, Inc. (PAGS), has contacted you to request assistance in handling a sensitive matter regarding the unexpected resignation of his company’s Assistant Chief Security Officer, George Dean. PAGS is a contractor to several state gaming (gambling) commissions. The company and its employees are required to maintain high ethical standards and are not allowed to participate in any forms of gaming or gambling, including lotteries,due to their involvement as security consultants to the gaming commissioners. The unexpected resignation and disappearance of a senior staff member is a reportable security incident under the terms of several of the company’s contracts with state gaming commissions. Thus, Mr. Randell needs an independent, outside assessment of the facts and evidence pertaining to Mr. Dean’s resignation. 


Background (Information Obtained During Client Interview)


Mr. Randell became concerned about Mr. Dean’s activities after his Human Resources Officer, Norbert Singh, reported that Mr. Dean left a voice mail tendering his resignation effective immediately.Mr. Singh also reported that Mr. Dean’s supervisor (Ms. Betty Mayne, the Chief Security Officer) had opened Mr. Dean’s locked office, at Mr. Singh’s request, and noted that it was unusually tidy and that the computer workstation and a company issued laptop were both missing. Mr. Randell asked Mr. Singh and Ms. Maynes to investigate further and report back to him. During the second meeting, Mr. Randell was informed of the following:


· Mr. Dean’s workstation was one of three company computers taken to the IT Service Center earlier in the week to be wiped and reimaged due to infection by a particularly nasty rootkit.The computers are due back in the office next Friday by 10:00 AM. 


· Ms. Mayne contacted the IT service center and requested that they stop all work and immediately return the three computer systems to the company. 


· Mr. Dean was using a company issued laptop in the office as a temporary replacement for his workstation. The company issued laptop was not found in the office but, an empty laptop case was found under the desk. 


· During their search of the office, Mr. Singh and Ms. Mayne found single 2GB USB drive that had been left in the laptop case. Ms. Mayne and her staff examined the contents of the USB Drive and reported to Mr. Randell that it contained files pertaining to Mr. Dean’s duties as Assistant Chief Security Officer. There were no indications of any involvement in activities contrary to the company’s best interests.Note: This paragraph provides you with the “previous examination” results that you will address in the “Assessment of Previous Investigation” section in your Assessment Report.


Request for Forensic Services (Tasking)


Mr. Randell has requested that you examine the recovered USB drive and tell him what you find. He also asked that you provide an assessment as to the accuracy and validity of the findings from the PAGS CSO’s staff examination of the contents of the USB (“equivocal assessment”). Your deliverables will include an assessment report and an annotated inventory listing all files and information of forensic interest which were recovered from the drive. 


The burning questions of the moment are: 


1. What was George Dean up to before he resigned?


2. Why did he resign so suddenly?


Notes for the Student: 


1. You may encounter contraband, e.g. images depicting adult or child pornography, during your examination of the provided forensic image. If this occurs, you are to proceed as though you had legally authorized permission to continue your examination and prepare a report which includes information about the contraband. For training purposes, Adult pornography is depicted using images of canines (dogs or puppies). Child pornography is depicted using images of felines (cats or kittens). Images of child pornography (cats or kittens) should not be included in a forensic report and should not be extracted from the forensic image. 


2. For training purposes, pictures of flowers are used to denote narcotics and related contraband.




3. The referenced employment agreement is understood to include prohibitions against participating in any/all illegal activities on company premises or while using company IT resources. This prohibition includes receipt and transmission of illegal forms of pornography (as defined by the State of Maryland and the US Federal Government) and engaging in any/all forms of drug trafficking.


4. For the purposes of this assignment, you (the student) are acting in the role of “forensic examiner.” In the grading rubric, actions attributed to “the examiner” are actions that you should (or should not) have taken.


Acquisition / Forensic Imaging Report (USB)


Forensically sterile media was created using Sumuri Paladin and then used for the imaging operation as the target media. The sterile state was verified using DCFLDD’s verify file command (sudo dcfldd vf=/dev/sdx pattern=00 where sdx is the drive designator for the USB).


Imaging operation was performed using FTK Imager.


Image: PAGS01_06132014.E01


Created By AccessData® FTK® Imager 2.6.0.49 090505


Case Information: Forensic Report #1 CMIT 424 Fall 2014


Case Number: PAGS01


Evidence Number: PAGS01


Unique description: Lexar Jump Drive


Examiner: Instructor


--------------------------------------------------------------


Information for PAGS01_06132014:


Physical Evidentiary Item (Source) Information:


[Drive Geometry]


Cylinders: 63


Tracks per Cylinder: 255


Sectors per Track: 63


Bytes per Sector: 512


Sector Count: 1,014,784


[Physical Drive Information]


Drive Model: LEXAR JUMPDRIVE USB Device


Drive Serial Number: 8KRZ24B


Drive Interface Type: USB


Source data size: 495 MB


Sector count: 1014784


[Computed Hashes]


MD5 checksum: bc1bedd931cacfd5bc4004ec9ef2fb3e


SHA1 checksum: 217eb21b8e9f4e363824df43204f0f3b75025fd1


Image Information:


Acquisition started: Fri Jun 13 21:59:00 2014


Acquisition finished: Fri Jun 13 22:00:53 2014


Segment list: PAGS01_06132014.E01


Image Verification Results:


Verification started: Fri Jun 13 22:00:53 2014


Verification finished: Fri Jun 13 22:00:56 2014


MD5 checksum: bc1bedd931cacfd5bc4004ec9ef2fb3e : verified


SHA1 checksum: 217eb21b8e9f4e363824df43204f0f3b75025fd1 : verified


Examination of the Evidence (Procedure) for Forensic Report #1


This assignment requires that you apply the knowledge and skills learned in Labs 0-4. You should refer to those lab procedures and the lab readings (Labx_content.docx) if you need ideas on how to get started or what you should look for when processing the forensic image for this assignment.


Before You Begin:


1. Locate the forensic image file for this examination. It is located on the share drive in the VDA (H:\CMIT424\FR1). This is your evidence file and should be treated as if it were stored on a physical USB that you can move from place to place. 


2. It is not necessary for you to create a forensic clone from the evidence file onto a physical device.


Examination Procedure:


3. Review the acquisition report provided with this assignment.


a. Note the type of media and physical structure as reported in the acquisition report from FTK Imager


b. Note the storage capacity


c. Note any identifying information


4. Launch the forensic tool (software application) that you will use to process your case. You may need to use multiple tools, e.g. WinHex for File Carving and EnCase for general processing of the image.


5. Process the forensic image for this case using the tool(s) of your choice.


6. Review the logical structure of the media from which the forensic image was created (WinHex is a good tool for doing this.)


a. Note the number and size of partitions


b. Location and sizes of unallocated space (unpartitioned space)


c. Note the types of file systems present


d. Perform a brief low-level analysis of the contents of the partitions including information contained within the MBR or boot record


e. Note the partition names / volume names


f. What operating system(s) were used to format the media? Modify the media?


7. Review the files and folders found in the case (by partition). (EnCase is a good tool for this step.)


a. View graphics files


b. View contents of documents and spreadsheets


c. Look for password protected or encrypted files


d. Look for deleted files or files in a recycle or trash bin


e. Perform a keyword search to determine if there is information present in one or more files which may provide answers to the case questions.


f. Perform other analysis as required


8. Export a file inventory which shows all files found. Your inventory should be in table format (use MS Word or Excel). Each entry must include, at a minimum:


a. File Path


b. MD5 Hash


c. MAC Times (modify, last access, create)


d. Item Number


e. Other useful metadata for the individual files (choose your columns wisely).


9. Using your inventory from step #6, create an annotated file inventory which presents the forensically interesting files in table format. Add a column to your inventory table which contains your Comments or Explanations. You will deliver this file with your assignment submission. You may use either MS Word or MS Excel format for this deliverable.


10. Analyze your recovered files to find answers to the questions presented in the Scenario document for this assignment. Make sure that you keep track of which files support specific answersor findings.


11. Prepare an Assessment Report in which you present a summary of your forensic processing and your findings (answers to the scenario questions). 


12. Attach your report and your file inventory to the assignment for Forensic Report #1 and submit it for grading.


Grading Information for Forensic Report #1


The rubric for this assignment is attached to the assignment folder entry. The information below provides additional information about content and format requirements. This assignment is graded on a 100 point basis and is worth 15% of the final course grade.


Annotated File Inventory (25 points total)


· Formatted File Inventory Exported from Forensic Tool (e.g., Encase, WinHex) as Excel Spreadsheet (.xlsx or.xls) or MS Word Document (Table Format). (10 points)


· Identified files of forensic interest (as determined by the case scenario & questions). (5 points)


· Annotations on inventory items for files of forensic interest. (10 points)


Assessment Report (75 points total)


Formatting Note:


For this assignment, you are asked to write an Assessment Report which focuses on whether or not the assessment performed by another investigator has errors or omissions. Your report should be written using the Forensic Report #1 Template. Create additional report sections as deemed necessary. Use snippets, figures, and addendums as needed to explain the forensic items of interest that answer the case questions. Typically this report ranges from 12-25 pages. 


Utilize the reporting features of the forensic applications (example: bookmarks) but bear in mind that automated reports do not replace the final forensic report. Use this information, however, to enhance your report in the form of addendums or by inserting relevant information into the report template to illustrate/justify your findings.


Ensure that the below “Required Content Items” are covered in your report.


Outline / Required Content Items:


· Case Background and Summary of Findings (20 points)


o Brief summary of reasons for this forensic examination (from scenario) including description of victims or parties who were harmed by the subject’s actions and description of the subject or target of this forensic examination.


o List format presentation.


§ Case questions & findings for each


§ Use case questions from scenario or developed from scenario


· Summary of Examinations Performed (20 points)


o Results of on-site examination for location from which evidence was recovered


o Results of Interviews with victims, employees, principals of firms, etc.


o Results from document reviews (policies, employment agreements, etc.)


o Results from examinations of computer hardwareand contents of media (hard drives, removable media, etc.) including inventory of recovered files whose contents or metadata are of forensic interest for this case


· Case Assessment (10 points)


o Identification of subject or offender (individual who is the target for the forensic examination); characteristics of subject.


o Description and Characteristics of Location (real-space location info require for establishment of jurisdiction); characteristics of location.


o Identification and Description of Policy Violations, Civil or Criminal Laws broken,


o Identification and description of victims ororganizations which wereharmed


· Assessment of Previous Investigation (10 points)


o Identification of Investigators who conducted prior investigation(s)


o Summary of investigatory process as reported by previous investigators


o Evaluation of the findings (accuracy, validity) from previous examinations of the evidence; includes identification of missed information; includes identification of errors in procedures or incorrect analysis.


· Investigative Suggestions / Follow-on Questions(5 points total)


o Additional questions that should be asked of the recovered data


o Additional questions that should be asked of the client / investigator


o Additional considerations / concerns regarding this investigation


· Professionalism (10 points total)


o Organization & Appearance (5 points): neat, consistent, professional appearance


o Writing Mechanics (5 points): grammar, spelling, punctuation, etc.)

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Engineering Guru
Academic Master
Assignment Hub
Homework Guru
Top Rated Expert
Online Assignment Help
Writer Writer Name Offer Chat
Engineering Guru

ONLINE

Engineering Guru

Hello, I have more than 10 years of writing experience. I can manage essays, summaries, reports and analysis works in very short period of time. I produce plagiarism free content for my clients, will send you FREE TURNITIN Reports as well. Thank you.

$180 Chat With Writer
Academic Master

ONLINE

Academic Master

I have super grip on essays, case studies, reports and discussion posts. I am working on this forum from last 6 years with full amount of satisfaction of my clients.

$160 Chat With Writer
Assignment Hub

ONLINE

Assignment Hub

I feel, I am the best option for you to fulfill this project with 100% perfection. I am working on this forum since 2014 and I have served more than 1200 clients with a full amount of satisfaction.

$155 Chat With Writer
Homework Guru

ONLINE

Homework Guru

I am a Ph.D. writer with more than 9 years of working experience in Writing. I have successfully completed more than 4500 projects for my clients with their full amount of satisfaction. I will provide you super quality work according to your given requirements and deadline with ZERO plagiarism. I can manage business and professional writing against very reasonable prices.

$160 Chat With Writer
Top Rated Expert

ONLINE

Top Rated Expert

i hope you are keeping safe. I will deliver quality essay with 0% plagiarism. I have 5 years of experience in writing essays and mainly in the field. I am also well conversant with all the referencing styles of writing such as APA, MLA, Havard, Chicago and IEEE. Kindly contact me so that we can discuss on the contents of the project. Thank you in advance.

$155 Chat With Writer
Online Assignment Help

ONLINE

Online Assignment Help

I am an elite class Ph.D. writer who can deliver you a supreme level of content within your given deadline. I will give you plagiarism free content within your given timeline.

$155 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Homework - Divya-OWASP Tools, Vulnerability Management - Took the children away book - Elseways in a sentence - How many bones are babies born with - Types of personal sin - Tafe hairdressing price list ultimo - Nernst equation at 25 - Morgan stanley london office - Friends of perth festival of the arts - What are some key performance indicators that are used by organizations in which you have been employed? How did managers explain the importance of these KPIs, and were any rewards tied to them? - West coast university admissions office excel formulas - PSY 104 - 5.2 - Organizational culture and leadership schein 4th edition pdf - Need 600+ words with 1+ schoarly reference in APA 7 Format. - Reading Recommendations - Makss assessment results - Incorporating all the Pieces - 1 - buena gente rewrite each sentence, replacing the direct objects with direct object pronouns. - English - Discussion W6 - Bulky waste collection derby - What are the seven domains of a typical it infrastructure - Angie's bake shop makes birthday chocolate chip cookies - How does a cavitron work - Breakfast club personality types - Year 10 physics notes - Who wants to be a millionaire question template - Led beer pong table - Bio rad image lab software - Sales and education executive estee lauder - Swot analysis disney parks and resorts - Industry Analysis Article 3 Pages(Minimum) - Swot analysis of coca cola - World Literature - What is parameterization in ecatt - Sons of korah psalm 91 - Financial and managerial accounting using excel for success solutions - How to increase tensile strength of paper - To kill a mockingbird chapter 1 7 quiz - Sustainability at holland america line - Final draft 4 cambridge answers - Assignment 2 - Colored pencil value scale - White supremacy, Racism and Racial Formations - Discussion - Singapore airlines address for cover letter - Essential adjective clause examples - Myeclassonline login - World's strictest parents reed and jessica full episode - Office 365 sign in ucl - Define beats in physics - Mafs 912 a rei 4.10 answer key - Occupational therapy clinical reasoning examples - Dennis notices that jackets are on sale for $99. in this case money is functioning as a - Vaf1b visa application form - Blumat bottle cap adapter - Assessment - 1st angle and 3rd angle projection - Nicomachean ethics translated by terence irwin pdf - Examples of variable costs in healthcare - Cobweb model difference equation - How to write a mediation research question - Steam enters an adiabatic turbine at 10 mpa - How to find parameters of binomial distribution - Unit cost formula tutor2u - Dartmouth high school nova scotia - Need Disuccion question and response completed - Evidence based practice in nursing and healthcare 4th edition citation - Use the dichotomous key in the table to identify a gram-negative coccus. - Failed to establish a backside connection in datapower - Close to 1000 math game - Carl rogers self theory of personality ppt - 300 words - Eng 102 1 - Burgess concentric circle model - Hsc past papers studies of religion - Lumoenergy com au pay my bill - Communication and utilization of nursing research ppt - MG315 Discussion Post 2 - Herbert w armstrong net worth - Tux 101 - Sonnets powerpoint - Aviation risk assessment form - Five finger death punch lca - Acetylene explosion in van - Plate boundaries puzzle worksheet - Many americans think the federal budget goes primarily toward welfare, which is _____. - Lilly pilly goodbye neighbours perth - SQL ( fund of data systems) - What is the basic building block of society - The Nature and causes of crime - Min zhan lu from silence to words - Wk1/reply clas/SH - Situations childish gambino - Post-assessment - Examples of ethical dilemma and ethical lapse - Essay on nasa in english - A clear conscience is a soft pillow essay - Point to point wan and switched wan - Types of Data Discussion