An exhaustive search for image files on the drive and


Scenario

As a Digital Forensic Consultant, you have been asked by a company to investigate possible illicit materials on a company PC workstation.

A printout of one such image was found in the local printer attached to the workstation (Figure 1) when a printer jam was cleared. Storing, downloading or transmitting such illicit images of "cats" is against company policy. Any employee found deliberately contravening this policy is subject to instant dismissal. However, it is proving to be difficult to identify the owner of the image. This is firstly because no printer or network logs are available that would allow the company to trace the image back to a user. Secondly, two part-time members of staff, Alice and Bob, share the workstation that the printer is connected to.

You have been provided with a forensically sound image of the PC's hard drive to analyse. The image file is in the CAINE virtual machine in Linuxzoo, within the directory /images/cw3. This directory also contains the hash of the drive at the time of acquisition.

Specifically, your remit for the analysis has been described as: "Firstly, we are interested in establishing whether the drive contains any illicit images. If so, we would like to establish the extent of the problem and the user responsible. We would like to know where the images originated and whether the responsible user had any plans regarding the images, for example, further distribution, or whether they collaborated with anyone else."

You need to perform a forensic analysis of the supplied drive image and write up your findings in an investigation report. To fulfil the remit, your analysis should include the following:
1. An exhaustive search for image files on the drive and establishing the user they belonged to.
2. Analysis of the relevant user's browser artefacts
3. Analysis of the relevant user's communications with others (such as email, messenger, etc)

Methods and tools to address items 1 and 2 are taught explicitly in this module, though you may want to research some of these further. Item 3 has not been covered in the taught material of the course, so you will need to tackle this challenge.

Report requirements

Your report must include the following:

- Executive Summary - This must be at the beginning of your report, clearly summarise your main findings and give your conclusion, as well as outlining any limitations of your investigation. The Executive Summary must be written for a non-technical audience (e.g. CEO, lawyer, judge or jury). It is strictly limited to ONE page plus a table that provides a high level summary timeline of the relevant user's actions relating to the remit of the investigation. The table should be single spaced, 10 point font and may include no more than 20 rows.

- Procedure/Discussion - This is the core of your coursework. Make sure you document the investigative procedure followed in answering the task, identifying all relevant data and metadata and evaluating the information into a coherent discussion which includes error risk. Your report should thus include a significant amount of analysis of the information you are presenting. Your reasoned opinion is also needed, as well as critical evaluation of the data.
Remember that the acquisition and preservation of evidence are not part of your remit - your investigation should cover the analysis, evaluation and reporting stages of the investigation only.

- Supporting evidence and methods - Include in the body of your report screenshots of relevant evidence and the commands used to obtain them (If you used a GUI, briefly describe the procedures followed). You may use additional diagrams/tables where useful. All figures must have suitable captions and be explicitly referred to in the text. Make sure that screenshots are clear and cropped to show only relevant parts and further highlight the important information.

- Research and References - Use research to underpin your investigation, particularly regarding email and messenger analysis. This can include academic articles, white papers, relevant websites and books. Throughout the report, where you are discussing knowledge gained from the references, include citations in the format (author, year) to attribute the information. Remember that your report must be in your own words. It should be your personal reflection on the topic, based on and supported by the

references used and your experiences and knowledge of the module. Do not "cut-and- paste" from the web.
The end of your report should have a list of the references used to support your research, Use the APA/Harvard style in use in the School of Computing.

Refer to the marking scheme overleaf to check how the above will contribute to your marks. The end of the report answers some frequently asked questions. We will also discuss this coursework in a short lecture, which will be recorded for you.

Report format, presentation and style
- The maximum length of the report is 12 pages. This will be strictly enforced - we will not read beyond the end of page 12.
- The report should be around 2500 words.
- Use formal language - this includes using 3rd person.
- It must be completely your own work.
- Start with the executive summary and timeline table (see above) and end with the list of references. The conclusions / limitations are part of the executive summary, do not repeat them at the end of your report.
- No cover page or table of contents is required.
- Appendices are not permitted.
- As your report will be marked online, please use the following formatting for the main body of text (tables, captions and references may use single spacing and 10-11 point font):
o 12 point font
o 1.5 times spacing
o normal margins
o left-aligned
- All pages should be numbered.

Request for Solution File

Ask an Expert for Answer!!
Dissertation: An exhaustive search for image files on the drive and
Reference No:- TGS02518875

Expected delivery within 24 Hours