Task
Task 1: Hands-On Projects
Complete the following Hands-On Projects from the textbook (Nelson, Phillips, & Steuart 2015):
Hands-On Project 1-4
Hands-On Project 1-6
Deliverable: For project 1-4 and 1-6 provide screenshots of all steps taken to complete the project along with a description of each step.
Complete the following Hands-On Projects from the textbook (Nelson, Phillips, & Steuart 2015):
Hands-On Project 4.3
Hands-On Project 4-4
Deliverable: For project 4-3 and 4-4 provide screenshots of all steps taken to complete the project along with a description of each step.
Task 2: Case Project
You need to acquire an image of a disk on a computer that can't be removed from the scene, and you discover that it's a Linux computer. What are your options for acquiring the image? Write a brief instruction specifying the hardware and software you would use.
Write a 300-500 word instruction outlining the software name and hardware that you may use in the scenario to archive the Linux image acquisition task.
Task 3: Research Project
Several graphics files were transmitted via e-mail from an unknown source to a suspect in an ongoing investigation. The lead investigator gives you these graphics files and tells you that at least four messages should be embedded in them. Use your problem-solving and brainstorming skills to determine a procedure to follow. Write a short report outlining what to do.
Deliverable: Write a 300-500 word report that outlines the investigation and forensic on graphic files.
Rationale
This assessment task covers digital crime, forensic process and procedures, data acquisition and validation, e-evidence, e-discovery tools and equipment, operating systems and file systems. This assessment has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to:
determine the legal and ethical considerations for investigating and prosecuting digital crimes
formulate a digital forensics process
evaluate the technology in digital forensics to detect, prevent and recover from digital crimes
analyse data on storage media and various file systems
collect electronic evidence without compromising the original data;
evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab;
compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation;
prepare and defend reports on the results of an investigation.