Skip to main content

This assignment assesses

Prepared by: Dr. Ammar Alazab Moderated by: Dr. Savitri Bevinakoppa August, 2018

Assessment Details and Submission Guidelines
Trimester T2 2018
Unit Code MN613
Unit Title Computer Forensics
Assessment
Type
Individual Assignment
Assessment
Title
Validating and Testing Computer Forensics Tools and Evidence
Purpose of the
assessment
(with ULO
Mapping)
This assignment assesses the following Unit Learning Outcomes; students should
be able to demonstrate their achievements in them.
a) Develop and implement computer forensics investigative procedures
b) Conduct and evaluate the systematic collection of evidence at private
sector incident scenes
c) Discuss and analyse computer forensics findings
Weight 15%
Total Marks 90
Word limit Max 2000 words
Due Date Friday, 31st Aug, 2018, 11:55 PM. (Week 7)
Submission
Guidelines
All work must be submitted on Moodle by the due date along with a title
Page.
The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body)
font and 2.54 cm margins on all four sides of your page with appropriate
section headings.
Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Extension If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly on AMS. You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:
https://ift.tt/2JPj4MM
procedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct
Academic Misconduct is a serious offence. Depending on the seriousness of
the case, penalties can vary from a written warning or zero marks to exclusion
from the course or rescinding the degree. Students should make themselves
familiar with the full policy and procedure available at:
https://ift.tt/2JPj4MM
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy
Procedure
. For further information, please refer to the Academic Integrity
Section in your Unit Description.

MN613 Computer Forensics 2 of 4
Prepared by: Dr Ammar alazab Moderated by: A/Prof Savitri Bevinakoppa August, 2018
Assignment Description
The assessment requires the students to acquire data from a drive, perform data recovery using
different computer forensics techniques and tools, analysing it and finally performing the validation
of acquired data. The students are required to submit a report. Follow the marking guide to prepare
your report.
Case Study I: Create and Delete Files on USB Drive
Prepare a report on the following sections. You can use your own USB, create/delete files and
perform computer forensics.
Steps:
1. On your USB drive create a word file named your Student ID, where the file should contain your name,
studentID, mobile number, address and some other personal information.
The file should also contain the following sentence: “I have enrolled for MN613 Computer Forensic.” followed
by your full name and the the date when you registered for this unit.
2. On the same drive create an excel file named “StudentID.xls”, where the First column should be filled with
your units name that you had at MIT last semester and the second column should be filled with your marks
with those units.
3. Store your current Photo on USB drive as JPG format or any other image format.
4. Take a screenshot of your Windows Explorer window showing the content of the USB’s folder hosting the
three files. Include this screenshot in your final report! Now delete those files, and then take another
screenshot of the respective folder’s content (after the two files have been deleted). Include this screenshot
in your final report.
Section 1: Data Acquisition
Prepare a forensic image (bit stream copy) with the record of data deletion. Explain the method and tool you
used for acquiring data. You will need this image to perform the consecutive tasks. Please submit this image
with your assignment.
Section 2: Data Recovery
Use ProDiscover basic to recover deleted images. In your report, include screenshot for each steps.
Section 3: Data Analysis
Inspect all files in the USB, use a hex editor and analyse if there is any hidden data in files. Provide
screenshots of your analysis.
Section 4: Data Validation
Explain different methods of data validation and use one of them to validate data on USB.
MN613 Computer Forensics 3 of 4
Prepared by: Dr Ammar alazab Moderated by: A/Prof Savitri Bevinakoppa August, 2018
Case Study II: Investing a Case
You’re investigating a case involving a 2 GB drive that you need to copy at the scene. Write one page
description of three options you have to copy the drive accurately. Be sure to include your software and
media choices.
Marking Criteria:
Marks are allocated as follows:

Section to be
included in the report
Description Marks
Case Study I: Acquiring data using a standard tool
Explanation of acquisitions and screenshots
Data recovery from USB and explanation
Data recovery from recycle bin and explanation
Data analysis of all file in USB using Hex Editor
Data validation with explanation
Writing quality, Coherence, Report Structure
10
10
10
10
10
10
10
Case Study II -Write three options you have to copy the drive accurately.
-Write clear conclusion of the case study.
10
10
Total 90

MN613 Computer Forensics 4 of 4
Prepared by: Dr Ammar alazab Moderated by: A/Prof Savitri Bevinakoppa August, 2018
Marking Rubric for Exercise Answers
Marks are allocated as in the marking criteria but we consider the following.

Grade
Mark
HD
80%+
D
70%-79%
CR
60%-69%
P
50%-59%
Fail
< 50%
Excellent Very Good Good Satisfactory Unsatisfactory
Analysis Logic is clear and
easy to follow
with strong
arguments
Consistency
logical and
convincing
Mostly
consistent and
convincing
Adequate
cohesion and
conviction
Argument is
confused and
disjointed
Effort/Difficult
ies/
Challenges
The presented
solution
demonstrated an
extreme degree
of difficulty that
would require an
expert to
implement.
The presented
solution
demonstrated a
high degree of
difficulty that
would be an
advance
professional to
implement.
The presented
solution
demonstrated
an average
degree of
difficulty that
would be an
average
professional
to implement.
The presented
solution
demonstrated a
low degree of
difficulty that
would be easy to
implement.
The presented
solution
demonstrated a
poor degree of
difficulty that
would be too
easy to
implement.
Explanation/
justification
All elements are
present and well
integrated.
Components
present with
good cohesion
Components
present and
mostly well
integrated
Most components
present
Lacks structure.
Reference
style
Clear styles with
excellent source
of references.
Clear referencing/
style
Generally
good
referencing/st
yle
Unclear
referencing/style
Lacks
consistency
with many
errors
Presentation Proper writing.
Professionally
presented
Properly spoken,
with some minor
deficiencies
Mostly good,
but some
structure or
presentation
problems
Acceptable
presentation
Poor structure,
careless
presentation

 

The post This assignment assesses appeared first on My Assignment Tutor.



Logo GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS  CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com

Comments

Popular posts from this blog

Should pit bull terriers be banned in my community

 Discussion Forum: Counterarguments (Should pit bull terriers be banned in my community) You created a question about the topic for your W6 Rough Draft. For this discussion, you will give an answer to that question in the form of a thesis statement. "Dieting Makes People Fat" Main Post: Share your thesis statement with your classmates. Please note: As with last week’s discussion, nothing here is set in stone. Be open to changing everything about your topic, including your position and audience, as you research it and get feedback from your classmates. Topic + Position/Purpose + Supporting Points =Thesis Statement Example: Suppose the question you posed in the Week 5 discussion was something like, “Should pit bull terriers be banned in my community?” After doing some preliminary research, you have concluded that pit bulls, if raised properly, are no more dangerous than other breeds of dogs. Your thesis statement can be something like, “Pitbulls should not be banned

Controversy Associated With Dissociative Disorders

 Assignment: Controversy Associated With Dissociative Disorders The  DSM-5-TR  is a diagnostic tool. It has evolved over the decades, as have the classifications and criteria within its pages. It is used not just for diagnosis, however, but also for billing, access to services, and legal cases. Not all practitioners are in agreement with the content and structure of the  DSM-5-TR , and dissociative disorders are one such area. These disorders can be difficult to distinguish and diagnose. There is also controversy in the field over the legitimacy of certain dissociative disorders, such as dissociative identity disorder, which was formerly called multiple personality disorder. In this Assignment, you will examine the controversy surrounding dissociative disorders. You will also explore clinical, ethical, and legal considerations pertinent to working with patients with these disorders. Photo Credit: Getty Images/Wavebreak Media To Prepare · Review this week’s Learning

CYBER SECURITY and how it can impact today's healthcare system and the future

 Start by reading and following these instructions: Create your Assignment submission and be sure to cite your sources, use APA style as required, and check your spelling. Assignment: Recommendations Document Due Week 6 (100 pts) Main Assignment Recommendations Document The 1250 to 1500-word deliverable for this week is an initial draft of your recommendations. Note that this is a working document and may be modified based on insights gained in module eight and your professor's feedback. This document should contain the following elements: Summary of your problem or opportunity definition A list of possible recommendation alternatives. In this section, you are not yet at the point of suggesting the best set of recommendations but you are trying to be creative and explore all the different ways that the problem or opportunity might best be addressed. The end result here will be a list of alternatives among which you will choose your final recom