Recent Question/Assignment

Task 2: Case Project (5 Marks)

You are required to acquire an image of a disk on a computer which is removed from an incident scene. You discovered that it is a Linux computer. What are your options to acquire the image? Write one to two pages report to specify the hardware and software you would use.

Deliverable: Write a 300-500 words report outlining two methods of acquiring an image in Linux. Student can use Kali and Ubuntu Linux virtual machine (VM) images provided in this subject’s lab.

Task 3: Research Project (5 Marks)

Your supervisor has asked you to research current acquisition tools that would able to investigate major smart phone operating systems such as Android and Apple vendors. Form a comparison table including the following information:

a. OS and/or phone vendors supported;
b. Platform designed to run on;
c. Type of information possible acquired such as device information, phonebook, logs, etc..;
d. Cost.

Deliverable: Minimum of five forensic vendors listed with in-text references to provide under each vendor column. Wikipedia information will not count as vendor source.

Rationale
This assessment task covers digital crime, forensic process and procedures, data acquisition and validation, e-evidence, e-discovery tools and equipment, operating systems and file systems. This assessment has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to:
• determine the legal and ethical considerations for investigating and prosecuting digital crimes
• formulate a digital forensics process
• evaluate the technology in digital forensics to detect, prevent and recover from digital crimes
• analyse data on storage media and various file systems
• collect electronic evidence without compromising the original data;
• evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab;
• compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation;
• prepare and defend reports on the results of an investigation.
Marking criteria
Task 2: Case Project (5 Marks)
Criteria HD
100% - 85% DI
84% - 75% CR
74% - 65% PS
64% - 50% FL
49% - 0
300-500 words Report on case project Report two methods of image acquisition in Linux. Each method would contain snapshots and with excellent explanations. Report two methods of image acquisition in Linux. Each method would contain snapshots and with reasonable explanations. Report two methods of image acquisition in Linux. Each method would contain snapshots and with some minor errors in explanation. Report two methods of image acquisition in Linux. Each method would contain snapshots but it lacks reasoning for the methods provided. Report is provided but it didn’t address the questions asked.
Possible marks 5.0 – 4.25 4.24 – 3.75 3.74 – 3.25 3.24 – 2.5 2.4 – 0

Task 3: Research Project (5 Marks)

Criteria HD
100% - 85% DI
84% - 75% CR
74% - 65% PS
64% - 50% FL
49% - 0
Your supervisor has asked you to research current acquisition tools that would able to investigate major smart phone operating systems such as Android and Apple vendors. Table is provided listing 5 tools that covers frequently used OS and/or phone vendors. Information such as OS platform, device information, phonebook, logs, and cost is provided. Data is collected from reliable sources and references are provided. Table is provided listing 4-5 tools that covers frequently used OS and/or phone vendors. Information such as OS platform, device information, phonebook, logs, and cost is provided. Data is collected from reliable sources and references are provided. Table lists 4-5 tools that covers frequently used OS and/or phone vendors. Information such as OS platform, device information, phonebook, logs, and cost is provided. Data is collected from reasonable and references are provided. Table lists 4-5 5 tools that covers frequently used OS and/or phone vendors. Information such as OS platform, device information, phonebook, logs, and cost is provided. Data is collected from not well-known sources and there are minor referencing errors. Little or no evidence of research conducted.
Possible marks 5.0 – 4.25 4.24 – 3.75 3.74 – 3.25 3.24 – 2.5 2.4 – 0

Presentation
• Ensure all tasks are identified with headings.
• Use single reference list at the end of document.
• Submit the assignment in ONE word or pdf file on Turnitin. Please do not submit *.zip or *.rar or multiple files
Please write atleast two refrences from this book,
Textbook: Guide to Computer Forensics and Investigations (with DVD) 5th Ed
I need proper assignment with table contents good vocabulary English. thanks
REFRENCE SHOULD BE IN APA STYLE.

Looking for answers ?