{"id":310,"date":"2015-06-15T07:55:12","date_gmt":"2015-06-15T07:55:12","guid":{"rendered":"http:\/\/assignmenttask.com\/tutorhelp\/?p=310"},"modified":"2022-10-15T06:25:17","modified_gmt":"2022-10-15T06:25:17","slug":"forensics-report-assignment-help","status":"publish","type":"post","link":"https:\/\/assignmenttask.com\/tutorhelp\/forensics-report-assignment-help\/","title":{"rendered":"Forensics Report Assignment Help"},"content":{"rendered":"<p><strong>Task 1: Recovering scrambled bits (5 Marks)<\/strong><\/p>\n<p>For this task I will upload a text file with scrambled bits on the subject site closer to the assignment due date. You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment.<\/p>\n<p><strong><em>Deliverable:<\/em><\/strong> Describe the process used in restoring the scrambled bits and insert plain text in the assignment.<\/p>\n<p><strong>Task 2: Revealing hidden information from an image (5 Marks)<\/strong><\/p>\n<p>For this task I will provide an image with hidden information in it. You will be required to reveal the hidden information.<\/p>\n<p><strong><em>Deliverable:<\/em><\/strong> Describe the process used to reveal the hidden information from the image and copy the revealed information in the assignment in plain text.<\/p>\n<p><strong>Task 3: Forensics Report (20 Marks)<\/strong><\/p>\n<p>In this major task you are assumed as a Digital Forensics Examiner. Considering a real or a hypothetical case you are required to produce a formal report consisting of facts from your findings to your attorney who has retained you. You are free to choose a forensics scenario which can be examination of a storage media (HDD, USB Drive etc), spoofed email, unscrambling bits, revealing information from an image or any other appropriate scenario you can think of.<\/p>\n<p><strong><em>Deliverable:<\/em><\/strong> A forensics report of 1800-2000 words.<\/p>\n<p>Rationale<\/p>\n<p>This assessment task covers data validation,&nbsp;e-discovery, steganography, reporting and presenting, and&nbsp;has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to:<\/p>\n<ul>\n<li>determine the legal and ethical considerations for investigating and prosecuting digital crimes<\/li>\n<li>analyse data on storage media and various file systems<\/li>\n<li>collect electronic evidence without compromising the original data;<\/li>\n<li>evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab;<\/li>\n<li>compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation;<\/li>\n<li>prepare and defend reports on the results of an investigation<\/li>\n<li>PresentationFollowing should be included as minimum requirements in the report structure:\n<ul>\n<li><strong> Executive Summary or Abstract<br \/>\n<\/strong>This section provide a brief overview of the case, your involvement as an examiner, authorisation, major findings and conclusion<br \/>\n<strong>\u2022 Table of Content<br \/>\n\u2022 Introduction<br \/>\n<\/strong>Background, scope of engagement, forensics tools used and summary of findings<br \/>\n<strong>\u2022 Analysis Conducted<br \/>\n<\/strong>o Description of relevant programs on the examined items<br \/>\no Techniques used to hide or mask data, such as encryption, steganography, hidden attributes, hidden partitions etc<br \/>\no Graphic image analysis<br \/>\n<strong>\u2022 Findings<br \/>\n<\/strong>This section should describe in greater detail the results of the examinations and may include:<br \/>\no Specific files related to the request<br \/>\no Other files, including deleted files that support the findings<br \/>\no String searches, keyword searches, and text string searches<br \/>\no Internet-related evidence, such as Web site traffic analysis, chat logs, cache files, e-mail, and news group activity<br \/>\no Indicators of ownership, which could include program registration data.<br \/>\n<strong>\u2022 Conclusion<br \/>\n<\/strong>Summary of the report and results obtained<br \/>\n<strong>\u2022 References<br \/>\n<\/strong>You must cite references to all material you have used as sources for the content of your work<br \/>\n<strong>\u2022 Glossary<br \/>\n<\/strong>A glossary should assist the reader in understanding any technical terms used in the report. Use a generally accepted source for the definition of the terms and include appropriate references.<br \/>\n<strong>\u2022 Appendices<br \/>\n<\/strong>You can attach any supporting material such as printouts of particular items of evidence, digital copies of evidence, and chain of custody documentation.<\/li>\n<\/ul>\n<p><em>Follow the referencing guidelines for APA 6 as specified in <\/em><a href=\"http:\/\/student.csu.edu.au\/study\/referencing-at-csu\"><em>Referencing Guides<\/em><\/a><em>.<\/em><\/p>\n<p><em>Submit the assignment in ONE word or pdf file on EASTS. Please do not submit *.zip or *.rar or multiple files.<\/em><\/li>\n<\/ul>\n<p><strong>To get assignment help, please contact to our live chat adviser<\/strong><\/p>\n<p><a href=\"https:\/\/chatserver.comm100.com\/ChatWindow.aspx?planId=135&amp;visitType=1&amp;byHref=1&amp;partnerId=-1&amp;siteid=207633\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" class=\" size-medium wp-image-196 aligncenter\" src=\"http:\/\/assignmenttask.com\/assignment-sample\/wp-content\/uploads\/2015\/06\/chat-now-300x113.png\" alt=\"chat expert for your assignment help\" width=\"300\" height=\"113\" srcset=\"https:\/\/assignmenttask.com\/tutorhelp\/wp-content\/uploads\/2015\/06\/chat-now-300x113.png 300w, https:\/\/assignmenttask.com\/tutorhelp\/wp-content\/uploads\/2015\/06\/chat-now.png 525w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Task 1: Recovering scrambled bits (5 Marks) For this task I will upload a text file with scrambled bits on the subject site closer to the assignment due date. You will be required to restore the scrambled bits to their <a href=\"https:\/\/assignmenttask.com\/tutorhelp\/forensics-report-assignment-help\/\" class=\"read-more\">Read More &#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[310],"tags":[65,6,337,11,10],"class_list":["post-310","post","type-post","status-publish","format-standard","hentry","category-report-writing","tag-assignment-help","tag-australia","tag-forensics-report-assignment-help","tag-uk","tag-usa"],"_links":{"self":[{"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/posts\/310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/comments?post=310"}],"version-history":[{"count":2,"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/posts\/310\/revisions"}],"predecessor-version":[{"id":1123,"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/posts\/310\/revisions\/1123"}],"wp:attachment":[{"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/media?parent=310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/categories?post=310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/assignmenttask.com\/tutorhelp\/wp-json\/wp\/v2\/tags?post=310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}