Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Prepared by: Mr. Ahsan Aziz XXXXXXXXXXModerated by: Dr. Ammar Alazab July, 2018 Assessment Details and Submission Guidelines Unit Code BN309 – T2 2018 Unit Title Computer Forensics Assessment Type...

1 answer below »
Prepared by: Mr. Ahsan Aziz XXXXXXXXXXModerated by: Dr. Ammar Alazab July, 2018
Assessment Details and Submission Guidelines
Unit Code BN309 – T2 2018
Unit Title Computer Forensics
Assessment Type Individual Assignment
Assessment Title Validating and Testing Computer Forensics Tools and Evidence – Part 1
Purpose of the
assessment (with
ULO Mapping)
This assignment assesses the following Unit Learning Outcomes; students
should be able to demonstrate their achievements in them.

a. Systematically collect evidence at private-sector incident scenes.
. Document evidence and report on computer forensics findings.
c. Implement a number of methodologies for validating and testing
computer forensics tools and evidence.

Weight 15% of the total assessments
Total Marks 50
Word limit 1500 words max
Due Date Friday, 31st Aug, 2018, 11:55 PM. (Week 7)
Submission
Guidelines
• All work must be submitted on Moodle by the due date along with a
completed Assignment Cover Page.
• The assignment must be in MS Word format, 1.5 spacing, 11-pt Cali
i
(Body) font and 2 cm margins on all four sides of your page with appropriate
section headings.
• Reference sources must be cited in the text of the report and listed
appropriately at the end in a reference list using IEEE referencing style.
Extension If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly through AMS. You must submit this
application within three working days of the assessment due date. Further
information is available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct

Academic Misconduct is a serious offence. Depending on the seriousness
of the case, penalties can vary from a written warning or zero marks to
exclusion from the course or rescinding the degree. Students should make
themselves familiar with the full policy and procedure available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-
Procedure. For further information, please refer to the Academic Integrity
Section in your Unit Description.

http:
www.mit.edu.au/about
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
BN XXXXXXXXXXIT Computer Forensics Page 2 of 4
Prepared by: Mr Ahsan Aziz XXXXXXXXXXModerated by: Dr. Ammar Alazab July, 2018
Assignment Questions:
Objective: The objective of the assignment is to acquire data from a drive, perform data recovery
using different techniques and tools, analysing it and finally performing the validation of acquired
data. In addition, students are required to properly document all steps in form a report, the report
should be formal enough that it can be used in a legal process. Marks will be awarded based on the
sophistication and the difficulties of the techniques explored.

Case Study: You have been assigned a case of embezzlement. A USB is found from the suspect’s
office, and it is expected to have very important information regarding the case. The USB contains
several Excel files, a couple of image files and some text files.
Assignment Specification:
Prepare a report on the following sections related to the case study scenario. You can use your own
USB, create/delete files as mentioned in the scenario and perform forensics. Provide the list of
eferences using IEEE referencing style at the end of the report.
Section 1: Data Acquisition
Prepare a forensic image (bit stream copy) with the record of data deletion. Explain the method
and tool you used for acquiring data. You will need this image to perform the consecutive tasks.
Please submit this image with your assignment XXXXXXXXXXwords)

Section 2: Data Recovery
The suspect has deleted two image files from the USB, recover the files and explain the method (with
screenshots) and tool you used XXXXXXXXXXwords)
In addition, recover data from recycle bin, explain the procedure with screenshots. (200 words)
Section 3: Data Analysis
Inspect all files in the USB, use a hex editor and analyse if there is any hidden data in files. Provide
screenshots of your analysis XXXXXXXXXXwords)
Section 4: Data Validation
Explain different methods of data validation and use one of them to validate data on USB XXXXXXXXXX
words)








BN XXXXXXXXXXIT Computer Forensics Page 3 of 4
Prepared by: Mr Ahsan Aziz XXXXXXXXXXModerated by: Dr. Ammar Alazab July, 2018
Marking Criteria:
Questions Description Marks
Section 1 Acquiring data using a standard tool
Explanation of acquisitions and screenshots
5
5
Section 2 Data recovery from USB and explanation
Data recovery from recycle bin and explanation
5
5
Section 3 Data analysis of all file in USB using Hex Editor 10
Section 4 Data validation with explanation 10
Presentation Writing quality, Coherence, Report Structure
5
Reference style Follow IEEE reference style (should have both in-text
citation and reference list)
5
Total 50
BN XXXXXXXXXXIT Computer Forensics Page 4 of 4
Prepared by: Mr Ahsan Aziz XXXXXXXXXXModerated by: Dr. Ammar Alazab July, 2018
Marking Ru
ic
Sections Excellent Good Fair Poor
Section 1
Contingency
Planning
Appropriate
equirements of the
plan specified
explained and
Issues identified and
listed
Requirements
for the plan
specified and
issues identified
and listed
Not a complete
plan with a few
equirements
and issues
Did not address
sub sections of
the section
Section 2
Security
Tools
Addressed the three
tools explained
iefly
as to how they work
and the cost analysis
explained
Addressed the
three tools
however with
minimum
explanation
with cost
analysis
Three tools
selected but not
explained and
not provided a
enough
explanation for
the justification
of cost analysis
Not a complete
list of security
tools and
missing
explanation of
cost analysis
Section 3
Information
Security Act
Explained the act and
the important key
points
Provided an
idea about the
act with the key
points
Did not provide
a clear picture
of the act with
the key points
included
Missing
explanation and
key points
Section 4
Security
Management
Policy
Addressed all the
seven sections of the
policy with necessary
explanation
Addressed all
the sections and
managed to
explain the
equirements of
the policy
Addressed all
sections with
minimum
information
Missing sections
from the policy
(Incomplete)
Answered Same Day Aug 16, 2020

Solution

Meenakshi answered on Aug 27 2020
140 Votes
Facilitate Business Analysis- ICTICT809 – Written Activity
[Type text]
Graduate Diploma of Telecommunications & Network Engineering
ICT80415
Facilitate Business Analysis
ICTICT809
Written Activity
Rashikala Weerawarna
201089076
02.08.2018
Facilitate Business Analysis- ICTICT809 – Written Activity
Executive Summary
In this paper we research about the telecommunication business model and tools. Our company is Telecommunication Company, the name is AAA. In this paper we discuss about how to work the company. What kind of business tool we use it. In this paper we discuss about the telecommunication service company requirement that is automated system that will provides all the telecommunication services by one click and of this project will provide to automate the services. The system requirement is hassle free system that will help to company staff and customer. In this paper we discuss about the telecommunication service requirement and to ensure that the new network system works efficiently. In this paper we complete study about telecommunication service provides company requirement and analysis.
Contents
Introduction
Business Model
Propose System
Hardware Requirement
Operating System Requirement
Data base
Compatible Solution
Cost Benefit Analysis
Conclusion
References
Introduction
In this paper we discuss about the AAA telecommunication company. This paper will complete discussion about the best business model and their tool .The paper will discuss the various cellular technology and cost analysis table. The companies propose model is combination of two GSM and CDMA. This cellular technology will be called CDMIX. The paper discuss about CDMIX that propose network is faster, efficient encrypted and secure .
Business model and tool:
There are various tools that are helping to prepare business model .Some business model tools are free of cost
BM Designe
BM Designer is free tool. The functionality of designer tool is as follows:
1. Embeddable web-page
2. Highly interactive UI
BMFiddle
This is another tool that is free of cost and the functionality of tools is
1. Very attractive
2. JS based UI
3. Pretty colors
4. Markdown support.
Canvanize
This is a free too and for working with tool requirement is enter the email. This is very excellent and provide canvas history reply tool
The Multiple canvas templates will provide
1. Business model
2. Lean
3. Swot
Lean Canvas
This business tool is very good canvas UI.
The cost is between $12 and $49/monthly.
The Business Model Canvas is a simple tool to create, analyze and optimize business models. In this paper we discuss about telecommunication model. The communication play a vital role in business model In addition, a team needs to communicate the business model to outsiders constantly — be it the CEO, strategic partners or an investor. Everyone has to know where the ship is headed in order to actively participate in reaching the goal.  Not long ago the business model was seen as something that only a chosen few had to know and understand. The new way Business Model Canvas is a tool that is for preparing faster and help business model so stakeholder easily understand the business model The project has been divided into four modules Applications, Entries,, Enquiries and Complaints.
Application module: this model provides the service given below.
1. Anyone person could be applies for a new connection by filling the form.
2. Customer can request for transfe
ing the connection if the customer is not satisfied the connection than he can cancel the phone connection.
3.    It can modify the mode of bill payment.
Entries module: This model provides the below services.
1. Customer can request for change the connection number, we will enter the old number and it provides the new connection number.
Enquiries module: this module provide the below services.
1. The customer could be request about his bill.
2. We can check the information regarding the change numbers.
3. We could be enquiry regarding the status of the applications.
Complaints module: this modules has given this services.
1. In this module customers can complaint about the services.
Business processes
In this research we discuss about the business process and IT system. When the business processes and IT systems are outdated for a business that is of a global scale, it can seriously hamper the performance of the organization leading to high costs. The client who is a leading telecom and communication services provider faced a similar challenge with their legacy billing system which needed an overhaul. The existing billing system, though functional, could not perform on different billing models and lead to high latency
inging down the value of their business. 
The telecommunication company provides the facility for faster response is cellular network as this type of network is efficient working with the help of scarce frequency resources.
These are Communication technology
1. GSM
2. CDMA
3. UMTS
4. LTE
5. Adaptive communication
Our company provides dual band service that known as CDMIX that is combination of CDMA and GSM .Our company service s includes video communications, for this purpose we work together with Polycom. Polycom is helping us to install the largest IP video communications network. GSM security level is high so no one can easily
oken the security of GSM. CDMA model speed is fast. We used the Combination of GSM and CDMA model. We used the A5, A8 and A3 algorithm for the security purpose. We are using the link in forward and backward for cellular network. GSM security is based on A3, A5, and A8 algorithm. This algorithm is securing the GSM model by default.
Our company provides lots of services in telecom sector customers as follows
1) Request for a new connection
2) Change of numbe
3) Billing
4) Customer response System
Proposed System
In this assignment or paper we discuss about the old system that is manual system we need a system that will provide all telecom sector services automated on web or online .The our new system will be web base system so that telecommunication service will be globally and...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here