Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Assignment 2 Subject: CSE3CFN and CSE5CFN Submission deadline: 16th of May Total Mark: 30 Word Limit: 2000 words (+/- 10%) Instructions: Your report must include: 1. Evidence description. 2. Standard...

1 answer below »

Assignment 2
Subject: CSE3CFN and CSE5CFN
Submission deadline: 16th of May
Total Mark: 30
Word Limit: 2000 words (+/- 10%)
Instructions:
Your report must include:
1. Evidence description.
2. Standard procedure (example: collection steps, imaging, chain of custody,
etc)
3. Examination of FAT32 file structure (include tables for FAT32 file system,
description of each item)
4. In detail explanation of $MFT file record findings (include table showing all the
attribute values and data run)

Question 1 (40% of the total mark of 30)
You are a digital forensic examiner. Your task is to process and perform a
forensically sound acquisition of the following SD card:
The SD card is formatted with FAT 32 file system.
a) Describe your steps in details, including specific forensic equipment,
hardware and software that you will use, to complete forensic acquisition of
the SD card and create an forensic image.

) How would you examine the file system?
Question 2 (60% of the total mark of 30)
Please examine the $MFT FILE Record below and report on its content.
Hints: Read chapter 5 of the textbook and week 6 lecture slides to prepare for your
esponse. You can also look into week 8 lecture slides for the sample structure of
your report.
You are expected to work on this assignment independently and MUST NOT DISCUSS IT WITH
ANYONE.

Assignment 2
Subject: CSE3CFN and CSE5CFN
Submission deadline: 23rd of September, 2022
Total Mark: 30
Word Limit: 2000 words (+/- 10%)
Academic integrity
Academic integrity means being honest in academic work and taking responsibility for learning the conventions of scholarship. The University requires its instructors and course participants to observe the highest ethical standards in all aspects of academic work.
You can demonstrate academic integrity by:
· using information appropriately according to copyright and privacy laws
· acknowledging where the information you use comes from
· not presenting other people’s work as your own
· not commissioning or purchasing work and submitting it as your own
· producing assignments independently, except when you are asked to participate in a group project.
Instructions for Assignment:
Your report must include:
1. Evidence description.
2. Standard procedure (example: collection steps, imaging, chain of custody, etc)
3. Examination of NTFS file structure (include tables for NTFS file system, description of each item)
4. In detail explanation of $MFT file record findings (include table showing all the attribute values and data run)
Question 1 (20% of the total mark of 30)
You are a digital forensic examiner. Your task is to process and perform a forensically sound acquisition of the following memory card:
The SSD card is formatted with NTFS file system.
a) Describe your steps in details, including specific forensic equipment, hardware and software that you will use, to complete forensic acquisition of the SSD device and create a forensic image.
) How would you examine the NTFS file system? Discuss how the files are stored and access in NTFS file system.
Question 2 (30% of the total mark of 30)
The following is a MBR snapshots. Find the following information for each partition.
(Hints: watch this youtube video: https:
www.youtube.com/watch?v=jRj_HzbHeWU)
1. Find Boot indicator bits/flag (check if bootable or not)
2. Find types of File System Type (e.g., FAT32, NFTS, EXT3 etc.)
3. Starting LBA Address (Relative Sectors)
4. Size of the partitions (sector size is 512 bytes).
Question 3 (50% of the total mark of 30)
Please examine the $MFT FILE Record below and report on its content.
Hints: Read chapter 5 of the textbook and week 6 lecture slides to prepare for your response. You can also look into week 8 lecture slides for the sample structure of your report.
For conversion you can use DCode software (https:
www.digital-detective.net/dcode/)
You answers need to include the detail description of the following attributes and their co
esponding values.
· Attributes x010
· Attributes x030
· Attributes x080

You are expected to work on this assignment independently and MUST NOT DISCUSS IT WITH ANYONE.

Assignment 2
Subject: CSE3CFN and CSE5CFN
Submission deadline: 23rd of September, 2022
Total Mark: 30
Word Limit: 2000 words (+/- 10%)
Academic integrity
Academic integrity means being honest in academic work and taking responsibility for learning the conventions of scholarship. The University requires its instructors and course participants to observe the highest ethical standards in all aspects of academic work.
You can demonstrate academic integrity by:
· using information appropriately according to copyright and privacy laws
· acknowledging where the information you use comes from
· not presenting other people’s work as your own
· not commissioning or purchasing work and submitting it as your own
· producing assignments independently, except when you are asked to participate in a group project.
Instructions for Assignment:
Your report must include:
1. Evidence description.
2. Standard procedure (example: collection steps, imaging, chain of custody, etc)
3. Examination of NTFS file structure (include tables for NTFS file system, description of each item)
4. In detail explanation of $MFT file record findings (include table showing all the attribute values and data run)
Question 1 (20% of the total mark of 30)
You are a digital forensic examiner. Your task is to process and perform a forensically sound acquisition of the following memory card:
The SSD card is formatted with NTFS file system.
a) Describe your steps in details, including specific forensic equipment, hardware and software that you will use, to complete forensic acquisition of the SSD device and create a forensic image.
) How would you examine the NTFS file system? Discuss how the files are stored and access in NTFS file system.
Question 2 (30% of the total mark of 30)
The following is a MBR snapshots. Find the following information for each partition.
(Hints: watch this youtube video: https:
www.youtube.com/watch?v=jRj_HzbHeWU)
1. Find Boot indicator bits/flag (check if bootable or not)
2. Find types of File System Type (e.g., FAT32, NFTS, EXT3 etc.)
3. Starting LBA Address (Relative Sectors)
4. Size of the partitions (sector size is 512 bytes).
Question 3 (50% of the total mark of 30)
Please examine the $MFT FILE Record below and report on its content.
Hints: Read chapter 5 of the textbook and week 6 lecture slides to prepare for your response. You can also look into week 8 lecture slides for the sample structure of your report.
For conversion you can use DCode software (https:
www.digital-detective.net/dcode/)
You answers need to include the detail description of the following attributes and their co
esponding values.
· Attributes x010
· Attributes x030
· Attributes x080

You are expected to work on this assignment independently and MUST NOT DISCUSS IT WITH ANYONE.
Answered 145 days After May 03, 2022

Solution

Aditi answered on Sep 25 2022
68 Votes
ANSWER
In the aftermath of a major data security event, it is common practice to employ a forensics firm to conduct a thorough analysis of digital evidence. In many cases, businesses might benefit from having the option to collect and store digital evidence before an event occurs. An organization is said to be forensically ready if it is able to fully use the benefits of virtual evidence at little cost to its research efforts. The costs and benefits of using such a method are discussed. To be ready to use virtual evidence, you may need a better system and team to keep tabs on the technical, physical, and procedural steps taken to ensure that evidence is admissible in court, as well as procedures and practices to make sure that everyone involved understands the significance and legal sensitivity of evidence, as well as appropriate legal counsel and interfacing with law enforcement.
1.a. Evidence obtained is typically flimsy and skewed due to poor management, unreliable experiments, or both. Evidence that has been obtained should be subjected to the same tests as would be applied to the original.
In order to process and even do the forensic job on SD cards coded into the NTFS document framework, a Kali Linux distribution is needed to conduct the forensic inquiry.
The process of locating and recovering an SD card from a device containing relevant data will advance as part of the judicial inquiry. In order to determine the precise location of a certain directory on our SD card, we may use the ls command.
During class, we focus mostly on creating a memory hash for use with an SD card. A hash may be seen as a device that shuffles the letters of a string around more than any other data square. The hash yield is constant regardless of the amount of information known.
Since the hash cannot be generated from scratch, it proves that neither the device nor the data has been tampered with or deleted. Our hashing procedure will take immediate care of the resulting sequence.
This article discusses utilizing Kali Linux for forensic analysis of NTFS-formatted Solid-State Drives (SSDs). The purpose of this article is to provide a step-by-step guide to conducting a forensic investigation with the use of several programs like Hashcat and Forensic Toolkit, with an emphasis on the related security and encryption challenges. First things first, we need to figure out how to locate and format our SD card. Next, we generate a hash of the memory area, a procedure that transforms data of any kind into a string of characters with a predetermined length. Since a consequence of the length of the hash, it is impossible to overwrite or modify the data, as the hash will always result in the same value. After that, we'll need to determine whether there are any secret files lurking on our SD card. Finally, we'll demonstrate how to...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here