Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

CMIT 424: Digital Forensics Analysis and Application Detailed Assignment Description for Forensic Report #1

20/08/2020 Client: jwilson1228 Deadline: 7 Days

  


The purpose of this assignment is to determine if you can 


· Properly process and handle evidence for a case and perform other case management functions


· Select and use appropriate digital forensics tools


· Prepare and annotate an inventory of files present on an evidence drive


· Triage an evidence drive using a forensic tool to view and analyze partitions, folders, and files to:


o Identify and properly address the presence (if any) of contraband (adult and child pornography, evidence related to narcotics)


o Identify and properly address the presence of evidence related to violations of an employment agreement or violations of company policy


· Evaluate an assessment (formal or informal) performed by another party and provide a formal response (“equivocal assessment”) in which you address the other party’s procedures and findings


· Write a reasonably professional and comprehensive AssessmentReport for a forensic examination 


Required Deliverables:


1. Assessment Report (75% of grade) 


2. Annotated Inventory of Forensically Interesting Files (25% of grade)


Scenario for Forensic Report #1


James Randell, president and owner of Practical Applied Gaming Solutions, Inc. (PAGS), has contacted you to request assistance in handling a sensitive matter regarding the unexpected resignation of his company’s Assistant Chief Security Officer, George Dean. PAGS is a contractor to several state gaming (gambling) commissions. The company and its employees are required to maintain high ethical standards and are not allowed to participate in any forms of gaming or gambling, including lotteries,due to their involvement as security consultants to the gaming commissioners. The unexpected resignation and disappearance of a senior staff member is a reportable security incident under the terms of several of the company’s contracts with state gaming commissions. Thus, Mr. Randell needs an independent, outside assessment of the facts and evidence pertaining to Mr. Dean’s resignation. 


Background (Information Obtained During Client Interview)


Mr. Randell became concerned about Mr. Dean’s activities after his Human Resources Officer, Norbert Singh, reported that Mr. Dean left a voice mail tendering his resignation effective immediately.Mr. Singh also reported that Mr. Dean’s supervisor (Ms. Betty Mayne, the Chief Security Officer) had opened Mr. Dean’s locked office, at Mr. Singh’s request, and noted that it was unusually tidy and that the computer workstation and a company issued laptop were both missing. Mr. Randell asked Mr. Singh and Ms. Maynes to investigate further and report back to him. During the second meeting, Mr. Randell was informed of the following:


· Mr. Dean’s workstation was one of three company computers taken to the IT Service Center earlier in the week to be wiped and reimaged due to infection by a particularly nasty rootkit.The computers are due back in the office next Friday by 10:00 AM. 


· Ms. Mayne contacted the IT service center and requested that they stop all work and immediately return the three computer systems to the company. 


· Mr. Dean was using a company issued laptop in the office as a temporary replacement for his workstation. The company issued laptop was not found in the office but, an empty laptop case was found under the desk. 


· During their search of the office, Mr. Singh and Ms. Mayne found single 2GB USB drive that had been left in the laptop case. Ms. Mayne and her staff examined the contents of the USB Drive and reported to Mr. Randell that it contained files pertaining to Mr. Dean’s duties as Assistant Chief Security Officer. There were no indications of any involvement in activities contrary to the company’s best interests.Note: This paragraph provides you with the “previous examination” results that you will address in the “Assessment of Previous Investigation” section in your Assessment Report.


Request for Forensic Services (Tasking)


Mr. Randell has requested that you examine the recovered USB drive and tell him what you find. He also asked that you provide an assessment as to the accuracy and validity of the findings from the PAGS CSO’s staff examination of the contents of the USB (“equivocal assessment”). Your deliverables will include an assessment report and an annotated inventory listing all files and information of forensic interest which were recovered from the drive. 


The burning questions of the moment are: 


1. What was George Dean up to before he resigned?


2. Why did he resign so suddenly?


Notes for the Student: 


1. You may encounter contraband, e.g. images depicting adult or child pornography, during your examination of the provided forensic image. If this occurs, you are to proceed as though you had legally authorized permission to continue your examination and prepare a report which includes information about the contraband. For training purposes, Adult pornography is depicted using images of canines (dogs or puppies). Child pornography is depicted using images of felines (cats or kittens). Images of child pornography (cats or kittens) should not be included in a forensic report and should not be extracted from the forensic image. 


2. For training purposes, pictures of flowers are used to denote narcotics and related contraband.




3. The referenced employment agreement is understood to include prohibitions against participating in any/all illegal activities on company premises or while using company IT resources. This prohibition includes receipt and transmission of illegal forms of pornography (as defined by the State of Maryland and the US Federal Government) and engaging in any/all forms of drug trafficking.


4. For the purposes of this assignment, you (the student) are acting in the role of “forensic examiner.” In the grading rubric, actions attributed to “the examiner” are actions that you should (or should not) have taken.


Acquisition / Forensic Imaging Report (USB)


Forensically sterile media was created using Sumuri Paladin and then used for the imaging operation as the target media. The sterile state was verified using DCFLDD’s verify file command (sudo dcfldd vf=/dev/sdx pattern=00 where sdx is the drive designator for the USB).


Imaging operation was performed using FTK Imager.


Image: PAGS01_06132014.E01


Created By AccessData® FTK® Imager 2.6.0.49 090505


Case Information: Forensic Report #1 CMIT 424 Fall 2014


Case Number: PAGS01


Evidence Number: PAGS01


Unique description: Lexar Jump Drive


Examiner: Instructor


--------------------------------------------------------------


Information for PAGS01_06132014:


Physical Evidentiary Item (Source) Information:


[Drive Geometry]


Cylinders: 63


Tracks per Cylinder: 255


Sectors per Track: 63


Bytes per Sector: 512


Sector Count: 1,014,784


[Physical Drive Information]


Drive Model: LEXAR JUMPDRIVE USB Device


Drive Serial Number: 8KRZ24B


Drive Interface Type: USB


Source data size: 495 MB


Sector count: 1014784


[Computed Hashes]


MD5 checksum: bc1bedd931cacfd5bc4004ec9ef2fb3e


SHA1 checksum: 217eb21b8e9f4e363824df43204f0f3b75025fd1


Image Information:


Acquisition started: Fri Jun 13 21:59:00 2014


Acquisition finished: Fri Jun 13 22:00:53 2014


Segment list: PAGS01_06132014.E01


Image Verification Results:


Verification started: Fri Jun 13 22:00:53 2014


Verification finished: Fri Jun 13 22:00:56 2014


MD5 checksum: bc1bedd931cacfd5bc4004ec9ef2fb3e : verified


SHA1 checksum: 217eb21b8e9f4e363824df43204f0f3b75025fd1 : verified


Examination of the Evidence (Procedure) for Forensic Report #1


This assignment requires that you apply the knowledge and skills learned in Labs 0-4. You should refer to those lab procedures and the lab readings (Labx_content.docx) if you need ideas on how to get started or what you should look for when processing the forensic image for this assignment.


Before You Begin:


1. Locate the forensic image file for this examination. It is located on the share drive in the VDA (H:\CMIT424\FR1). This is your evidence file and should be treated as if it were stored on a physical USB that you can move from place to place. 


2. It is not necessary for you to create a forensic clone from the evidence file onto a physical device.


Examination Procedure:


3. Review the acquisition report provided with this assignment.


a. Note the type of media and physical structure as reported in the acquisition report from FTK Imager


b. Note the storage capacity


c. Note any identifying information


4. Launch the forensic tool (software application) that you will use to process your case. You may need to use multiple tools, e.g. WinHex for File Carving and EnCase for general processing of the image.


5. Process the forensic image for this case using the tool(s) of your choice.


6. Review the logical structure of the media from which the forensic image was created (WinHex is a good tool for doing this.)


a. Note the number and size of partitions


b. Location and sizes of unallocated space (unpartitioned space)


c. Note the types of file systems present


d. Perform a brief low-level analysis of the contents of the partitions including information contained within the MBR or boot record


e. Note the partition names / volume names


f. What operating system(s) were used to format the media? Modify the media?


7. Review the files and folders found in the case (by partition). (EnCase is a good tool for this step.)


a. View graphics files


b. View contents of documents and spreadsheets


c. Look for password protected or encrypted files


d. Look for deleted files or files in a recycle or trash bin


e. Perform a keyword search to determine if there is information present in one or more files which may provide answers to the case questions.


f. Perform other analysis as required


8. Export a file inventory which shows all files found. Your inventory should be in table format (use MS Word or Excel). Each entry must include, at a minimum:


a. File Path


b. MD5 Hash


c. MAC Times (modify, last access, create)


d. Item Number


e. Other useful metadata for the individual files (choose your columns wisely).


9. Using your inventory from step #6, create an annotated file inventory which presents the forensically interesting files in table format. Add a column to your inventory table which contains your Comments or Explanations. You will deliver this file with your assignment submission. You may use either MS Word or MS Excel format for this deliverable.


10. Analyze your recovered files to find answers to the questions presented in the Scenario document for this assignment. Make sure that you keep track of which files support specific answersor findings.


11. Prepare an Assessment Report in which you present a summary of your forensic processing and your findings (answers to the scenario questions). 


12. Attach your report and your file inventory to the assignment for Forensic Report #1 and submit it for grading.


Grading Information for Forensic Report #1


The rubric for this assignment is attached to the assignment folder entry. The information below provides additional information about content and format requirements. This assignment is graded on a 100 point basis and is worth 15% of the final course grade.


Annotated File Inventory (25 points total)


· Formatted File Inventory Exported from Forensic Tool (e.g., Encase, WinHex) as Excel Spreadsheet (.xlsx or.xls) or MS Word Document (Table Format). (10 points)


· Identified files of forensic interest (as determined by the case scenario & questions). (5 points)


· Annotations on inventory items for files of forensic interest. (10 points)


Assessment Report (75 points total)


Formatting Note:


For this assignment, you are asked to write an Assessment Report which focuses on whether or not the assessment performed by another investigator has errors or omissions. Your report should be written using the Forensic Report #1 Template. Create additional report sections as deemed necessary. Use snippets, figures, and addendums as needed to explain the forensic items of interest that answer the case questions. Typically this report ranges from 12-25 pages. 


Utilize the reporting features of the forensic applications (example: bookmarks) but bear in mind that automated reports do not replace the final forensic report. Use this information, however, to enhance your report in the form of addendums or by inserting relevant information into the report template to illustrate/justify your findings.


Ensure that the below “Required Content Items” are covered in your report.


Outline / Required Content Items:


· Case Background and Summary of Findings (20 points)


o Brief summary of reasons for this forensic examination (from scenario) including description of victims or parties who were harmed by the subject’s actions and description of the subject or target of this forensic examination.


o List format presentation.


§ Case questions & findings for each


§ Use case questions from scenario or developed from scenario


· Summary of Examinations Performed (20 points)


o Results of on-site examination for location from which evidence was recovered


o Results of Interviews with victims, employees, principals of firms, etc.


o Results from document reviews (policies, employment agreements, etc.)


o Results from examinations of computer hardwareand contents of media (hard drives, removable media, etc.) including inventory of recovered files whose contents or metadata are of forensic interest for this case


· Case Assessment (10 points)


o Identification of subject or offender (individual who is the target for the forensic examination); characteristics of subject.


o Description and Characteristics of Location (real-space location info require for establishment of jurisdiction); characteristics of location.


o Identification and Description of Policy Violations, Civil or Criminal Laws broken,


o Identification and description of victims ororganizations which wereharmed


· Assessment of Previous Investigation (10 points)


o Identification of Investigators who conducted prior investigation(s)


o Summary of investigatory process as reported by previous investigators


o Evaluation of the findings (accuracy, validity) from previous examinations of the evidence; includes identification of missed information; includes identification of errors in procedures or incorrect analysis.


· Investigative Suggestions / Follow-on Questions(5 points total)


o Additional questions that should be asked of the recovered data


o Additional questions that should be asked of the client / investigator


o Additional considerations / concerns regarding this investigation


· Professionalism (10 points total)


o Organization & Appearance (5 points): neat, consistent, professional appearance


o Writing Mechanics (5 points): grammar, spelling, punctuation, etc.)

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Engineering Guru
Academic Master
Assignment Hub
Homework Guru
Top Rated Expert
Online Assignment Help
Writer Writer Name Offer Chat
Engineering Guru

ONLINE

Engineering Guru

Hello, I have more than 10 years of writing experience. I can manage essays, summaries, reports and analysis works in very short period of time. I produce plagiarism free content for my clients, will send you FREE TURNITIN Reports as well. Thank you.

$180 Chat With Writer
Academic Master

ONLINE

Academic Master

I have super grip on essays, case studies, reports and discussion posts. I am working on this forum from last 6 years with full amount of satisfaction of my clients.

$160 Chat With Writer
Assignment Hub

ONLINE

Assignment Hub

I feel, I am the best option for you to fulfill this project with 100% perfection. I am working on this forum since 2014 and I have served more than 1200 clients with a full amount of satisfaction.

$155 Chat With Writer
Homework Guru

ONLINE

Homework Guru

I am a Ph.D. writer with more than 9 years of working experience in Writing. I have successfully completed more than 4500 projects for my clients with their full amount of satisfaction. I will provide you super quality work according to your given requirements and deadline with ZERO plagiarism. I can manage business and professional writing against very reasonable prices.

$160 Chat With Writer
Top Rated Expert

ONLINE

Top Rated Expert

i hope you are keeping safe. I will deliver quality essay with 0% plagiarism. I have 5 years of experience in writing essays and mainly in the field. I am also well conversant with all the referencing styles of writing such as APA, MLA, Havard, Chicago and IEEE. Kindly contact me so that we can discuss on the contents of the project. Thank you in advance.

$155 Chat With Writer
Online Assignment Help

ONLINE

Online Assignment Help

I am an elite class Ph.D. writer who can deliver you a supreme level of content within your given deadline. I will give you plagiarism free content within your given timeline.

$155 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Affidavit evidence in chief - Prose in english literature - Https cs signal army mil dodiaa default - Poem full of imagery - Mla citation for 13th documentary - Access ch 1 independent project 1 5 - Ota chennai joining instructions - Tertiary preparation course tafe - Friends the one with unagi - Interpreting the tsi 2 - PICOT element - Assignment 3 - Jb hi fi inspection camera - Led array light source - Harlequin enterprises the mira decision case analysis - The language of branding - Emc connectrix ds 300b - Sababaha ducada lagu aqbalo - Adjectives to describe films - King fahad specialist hospital buraidah al qassim saudi arabia - Economic Assignment (2 days) - Sherlock holmes scientific method - Extracting dna from kiwi fruit prac report - Jack lopez of cholos and surfers - How to do manual transaction on eftpos machine lady macbeth fainting quote - What are the six socialization tactics - ?? same-day +27833173182 HARARE" ABORTION CLINIC // PILLS,,,, - Rj45 stranded vs solid - Essay 4 - Binghamton meal plan c - SEO Stands for - Holt mcdougal social studies online textbook 7th grade - Statics chapter 7 hibbeler 12th edition - Identifying data and reliability shadow health - Assignment: Create User Policy - Act planning and land authority - Cover supervisor person specification - Wendell berry the pleasures of eating summary - Tcet erp - Assimilate crossword clue 6 letters - Chemidoc xrs+ imaging system - Gcu mat 144 module 1 homework - Glulam portal frame detail - Week 1 Discussion Board - What does colpodynia mean - Javascript get frame by name - CCAR or SAR interview questions - Unit II-III Assessment, Unit III Case Study - Rosetta stone ipo price - Acdelco sealed maintenance free battery - HR_GLOB_FIN (U3) - CC Week15 DB - Seeking the scout wow - Human resources management / organizational behaviour - Discussion 8/5 - A researcher leaves a research file - Cost accounting cases - Gamma distribution moment generating function proof - My maths angles in parallel lines homework answers - Up in smoke midland - Obai sparta - Research paradigm example for quantitative - BUSI510 Week 8 Discussion - Sparkpeople com resource nutrition articles asp id 372 - Policy Controversies - Circumcision power point - 111 webb avenue ballarat east - Brands - Ma goody's magical greenhouse - Fingerhut ipod touch 5th generation - Pre-interview - Comparative essay structure template - Hydrogen and nitrogen react to form ammonia - Paper-Industry Challenges to Healthcare Analytics - Calculate how many miles i walked - Lacey pemberton net worth - What is 1 345 rounded to the nearest integer - Fairy tales from different cultures - Rafter clips for pergola - Sql stands for in computer - A childs sleep carol ann duffy - Community health capstone project ideas - What is data abstraction in python - Wolf deer predator prey relationship - Dependent demand inventory never needs to hold hedge inventory - Meehan v jones case summary - Baker c 2006 foundations of bilingual education and bilingualism - Essiac tea clouds trust - All my sons ppt - Mexican white boy study guide - WRELESS COMMUNICATION - X 2 3 in radical form - What does unna mean - The lost letters of pergamum thesis - Why is some risk diversifiable and some not diversifiable - Outline 3-pages "Corrections officer Deviance against inmates" - Create shared public database link - WBS - Change management simulation power and influence cheat sheet - Pepsico financial ratios analysis