Information Technology > Research Paper > Cyber Forensics (All)
School of Engineering and Information Technology ASSIGNMENT COVER SHEET Please complete and insert this form as the first page of EACH electronic assignment. Submit the assignment with atta... ched coversheet electronically as per the instructions in the Assignment Question sheet. Please make sure you keep a copy of the assignment. Student Details Surname Yeoh Given name Jia Le Student Number 32954688 Email Assignment details Unit name Cyber Forensics and Information Technology Unit Code ICT378 Unit Coordinator Glies Oatley Tutor/Tutorial time Ronald Kevin Shiflet Due date/time 3 April 2017 Submission date Assignment title Cyber Forensics and Information Technology Assignment 1 Other information All forms of plagiarism, cheating and unauthorized collusion are regarded seriously by the University and could result in penalties including failure in the unit and possible exclusion from the University. If in doubt, please contact the Unit Coordinator. Student’s Declaration Please double click on all the check boxes. Except where I have indicated, the work I am submitting in this assignment is my own work and has not been submitted for assessment in another unit. This submission complies with Murdoch University policies regarding plagiarism, cheating and collusion. I have retained a copy of this assignment for my own records. 1Table of Contents Cover Page..........................................................................................................1 Table of Contents.................................................................................................2 Abstact (Summary)..............................................................................................3 Section A - Investigate report .................................................................................................................................4-20 Chain of custody......................................................................................................................................................4 Suspicious elements of evidences found in Jo-2009-11-19 ad1 and ad2 drive images.......................................4-14 Suspicious elements of evidences found in Jo-2009-12-01 ad1, ad2 and ad3 drive images.............................15-17 Suspicious elements of email evidences found in Jo-2009-11-19 E01 drive images.........................................18-19 Suspicious elements of email evidences found in Jo-2009-12-01 E01 drive images.........................................19-20 Section B...............................................................................................................................................................21-24 Total of 3 timeline charts..................................................................................................................................21-24 Pros and Cons of using the two software tools......................................................................................................25 Section C....................................................................................................................................................................26 Section D....................................................................................................................................................................27 Section E...............................................................................................................................................................28-29 References.................................................................................................................................................................30 Appendix A........................................................................................................31 Appendix B........................................................................................................31 2Abstract (Summary) This report has those elements of the evidences in the analysis results. Where can be found the controlled computer where can be suspected of perpetrator for his illegal actions and creating sabotage. The analysis of the evidences was conducted. Which need to use through different software tools such as OSForensics and AccessData FTK imager to search, analyse and check of any digital evidences in those two drives images. Furthermore, those digital evidences have copied of elements in the controlled computer and rebuilding up those activities. Where the suspect can be involved and examined in security processes. With this report would have the timeline with the supporting evidences. Which could justify if the suspect is being guilty or not. In addition, the suspect can be subjected to create by playing sabotage with behind the evidences. [Show More]
Last updated: 1 year ago
Preview 1 out of 33 pages
Connected school, study & course
About the document
Uploaded On
Apr 21, 2021
Number of pages
33
Written in
This document has been written for:
Uploaded
Apr 21, 2021
Downloads
0
Views
84
In Browsegrades, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Browsegrades · High quality services·