Complete guide on how to make the most of professional thesis writing service
August 21, 2018NURBN 3020 – Caring for People Living with Chronic Illness
August 23, 2018
Assessment Details and Submission Guidelines |
|
Trimester | T2 2018 |
Unit Code | MN613 |
Unit Title | Computer Forensics |
Assessment
Type |
Individual Assignment |
Assessment
Title |
Validating and Testing Computer Forensics Tools and Evidence |
Purpose of the assessment (with ULO Mapping) | This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.
a) Develop and implement computer forensics investigative procedures b) Conduct and evaluate the systematic collection of evidence at private-sector incident scenes c) Discuss and analyse computer forensics findings |
Weight | 15% |
Total Marks | 90 |
Word limit | Max 2000 words |
Due Date | Friday, 31st Aug 2018, 11:55 PM. (Week 7) |
Submission Guidelines | · All work must be submitted on Moodle by the due date along with a title Page.
· The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. · Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. |
Extension | · If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at:
http://www.mit.edu.au/about–mit/institute–publications/policies– |
Academic Misconduct | · Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy- Procedure. For further information, please refer to the Academic Integrity
The section in your Unit Description. |
Assignment Description
The assessment requires the students to acquire data from a drive, perform data recovery using different computer forensics techniques and tools, analyse it and finally perform the validation of acquired data. The students are required to submit a report. Follow the marking guide to prepare your report.
Case Study I: Create and Delete Files on USB Drive
Prepare a report on the following sections. You can use your own USB, create/delete files and perform computer forensics.
Steps:
- On your USB drive create a word file named your Student ID, where the file should contain your name, student ID, mobile number, address and some other personal
The file should also contain the following sentence: “I have enrolled for MN613 Computer Forensic.” followed by your full name and the date when you registered for this unit.
- On the same drive create an excel file named “StudentID.xls”, where the First column should be filled with your units name that you had at MIT last semester and the second column should be filled with your marks with those
- Store your current Photo on a USB drive in JPG format or any other image
- Take a screenshot of your Windows Explorer window showing the content of the USB’s folder hosting the three files. Include this screenshot in your final report! Now delete those files, and then take another screenshot of the respective folder’s content (after the two files have been deleted). Include this screenshot in your final
Section 1: Data Acquisition
Prepare a forensic image (bit stream copy) with the record of data deletion. Explain the method and tool you used for acquiring data. You will need this image to perform the consecutive tasks. Please submit this image with your assignment.
Section 2: Data Recovery
Use ProDiscover basic to recover deleted images. In your report, include screenshots for each step.
Section 3: Data Analysis
Inspect all files in the USB, use a hex editor and analyse if there is any hidden data in files. Provide screenshots of your analysis.
Section 4: Data Validation
Explain different methods of data validation and use one of them to validate data on USB.
Case Study II: Investing a Case
You’re investigating a case involving a 2 GB drive that you need to copy at the scene. Write a one-page description of three options you have to copy the drive accurately. Be sure to include your software and media choices.
Marking Criteria:
Marks are allocated as follows:
Section to be
included in the report |
Description | Marks |
Acquiring data using a standard tool | 10 | |
Explanation of acquisitions and screenshots | 10 | |
Data recovery from USB and explanation | 10 | |
Case Study I: | Data recovery from recycle bin and explanation
Data analysis of all files in USB using Hex Editor |
10
10 |
Data validation with an explanation | 10 | |
Writing quality, Coherence, and Report Structure | 10 | |
10 | ||
-Write three options you have to copy the drive accurately. | ||
Case Study II | ||
-Write a clear conclusion of the case study. | ||
10 | ||
Total | 90 |
Marking Rubric for Exercise Answers
Marks are allocated as in the marking criteria but we consider the following.
Grade Mark | HD 80%+ | D 70%-79% | CR 60%-69% | P 50%-59% | Fail
< 50% |
Excellent | Very Good | Good | Satisfactory | Unsatisfactory | |
Analysis |
Logic is clear and easy to follow with strong arguments | Consistency of logical and convincing | Mostly consistent and convincing | Adequate cohesion and conviction | The argument is confused and disjointed |
Effort/Difficulties/ Challenges |
The presented solution demonstrated an extreme degree of difficulty that would require an expert to implement. |
The presented solution demonstrated a high degree of difficulty that would be an advanced professional to implement. | The presented solution demonstrated an average degree of difficulty that would be an average professional to implement. |
The presented solution demonstrated a low degree of difficulty that would be easy to implement. |
The presented solution demonstrated a poor degree of difficulty that would be too easy to implement. |
Explanation/ justification |
All elements are present and well integrated. | Components present with good cohesion | Components present and mostly well integrated |
Most components present |
Lacks structure. |
Reference style |
Clear styles with an excellent source of references. |
Clear referencing/ style |
Generally good referencing/st yle |
Unclear referencing/style |
Lacks consistency with many errors |
Presentation |
Proper writing. Professionally presented |
Properly spoken, with some minor deficiencies |
Mostly good, but some structure or presentation problems |
Acceptable presentation |
Poor structure, careless presentation |