Methodology for validating & testing computer forensics tool


Assignment Task: Validating and Testing Computer Forensics Tools and Evidence

Assignment Aim: This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

a. Systematically collect evidence at private-sector incident scenes.

b. Document evidence and report on computer forensics findings.

c. Implement a number of methodologies for validating and testing computer forensics tools and evidence.

Assignment Questions:

Objective: The objective of the assignment is to acquire data from a drive, perform data recovery using different techniques and tools, analyzing it and finally performing the validation of acquired data. In addition, students are required to properly document all steps in a report, the report should be formal so that it can be used in a legal process. Marks will be awarded based on the sophistication and the difficulties of the techniques explored.

Case Study: You have been assigned a case of embezzlement. A USB is found from the suspect's office, and it is expected to have very important information related to the case. The USB contains several Excel files, a couple of image files and some text files.

Assignment Specification:

Prepare a report on the following sections related to the case study scenario.

Data Preparation: You need to use your own USB to create/delete files as mentioned in the scenario below and perform the digital forensics investigation:

Problem 1: You need to create six files of type pdf, excel and word documents, where you need to name these files as follow: yourname-BN309-Assig1, where * depends of the file type. In addition, you need to change the attribute of these files to describe the Metadata which holds data such as your name as an author, organization name "MIT", computer name "based on your terminal name", date/time created, and comments such as "created for Assignment l of BN309".

Problem 2: Modify the extension of one of the doc file to .jpeg

Problem 3: Then you need to delete 3 files including the file you have modified its extension, one of each type. Provide the list of references using IEEE referencing style at the end of the report.

Section 1: Data Acquisition

Prepare a forensic image (bit stream copy) with the record of data deletion. Explain the method and tool you used for acquiring data. You will need this image to perform the consecutive tasks. Please submit this image with your assignment. You need to cover the challenges to make a successful acquisition, and what are the relevant format to use and why. Describe steps required for search and seizure. (400 words)

Section 2: Data Recovery

The suspect has deleted three image files from the USB, recover these files and explain the method (with screenshots) and tool you used. (300 words)

In addition, recover the data from recycle bin, explain the procedure with screenshots. You need to recover the metadata of these files (200 words)

Section 3: Data Analysis

Inspect all files in the USB, use a hex editor and analyze if there is any hidden data in these files. Provide screenshots of your analysis. Describe the tools that can be used for analyzing the deleted files, and also describe the benefit(s) for conducting a window registry analysis (300 words)

Section 4: Data Validation

Explain different methods of data validation and use one of them to validate data on USB. Explain how to verify the file extension if it has been altered using relevant tools. Demonstrate with snapshots the data validation as well as detecting the file extension alteration. (400 words)

All the professional Computer Forensics Assignment Help tutors are highly competent and skilled and will assist you in securing A++ grades without any trouble.

Tags: Computer Forensics Assignment Help, Computer Forensics Homework Help, Computer Forensics Coursework, Computer Forensics Solved Assignments, Validating and Testing Computer Forensics Tools and Evidence Assignment Help, Validating and Testing Computer Forensics Tools and Evidence Homework Help, Data Acquisition Assignment Help, Data Acquisition Homework Help, Data Recovery Assignment Help, Data Recovery Homework Help, Data Analysis Assignment Help, Data Analysis Homework Help, Data Validation Assignment Help, Data Validation Homework Help

Request for Solution File

Ask an Expert for Answer!!
Computer Engineering: Methodology for validating & testing computer forensics tool
Reference No:- TGS03027641

Expected delivery within 24 Hours