Mn613 Data Acquisition Answers Assessment Answers
The assessment requires the students to acquire data from a drive, perform data recovery using different computer forensics techniques and tools, analysing it and finally performing the validation of acquired data. The students are required to submit a report. Follow the marking guide to prepare your report.
Prepare a report on the following sections. You can use your own USB, create/delete files and perform computer forensics.
Steps:
- On your USB drive create a word file named your Student ID, where the file should contain your name, studentID, mobile number, address and some other personal information.
The file should also contain the following sentence: “I have enrolled for MN613 Computer Forensic.” followed by your full name and the the date when you registered for this unit.
- On the same drive create an excel file named “StudentID.xls”, where the First column should be filled with your units name that you had at MIT last semester and the second column should be filled with your marks with those units.
- Store your current Photo on USB drive as JPG format or any other image format.
- Take a screenshot of your Windows Explorer window showing the content of the USB’s folder hosting the three files. Include this screenshot in your final report! Now delete those files, and then take another screenshot of the respective folder’s content (after the two files have been deleted). Include this screenshot in your final report.
Prepare a forensic image (bit stream copy) with the record of data deletion. Explain the method and tool you used for acquiring data. You will need this image to perform the consecutive tasks. Please submit this image with your assignment.
Use ProDiscover basic to recover deleted images. In your report, include screenshot for each steps.Inspect all files in the USB, use a hex editor and analyse if there is any hidden data in files. Provide screenshots of your analysis.explain different methods of data validation and use one of them to validate data on USB.
Answer:
Here, we will make and erase the records on USB. We are makes the word report that contains the understudy ID, name, address and individual information. This word record is spared in to USB drive named as Student ID. After, makes the exceed expectations records that contains the unit name and denotes that document additionally spared in to USB drive named as understudy ID. At last, spare the understudy picture spared into USB drive. These are demonstrated as follows.
After, delete these three file. So, user must ensure on recovering the file that is deleted on USB, with the help of digital forensic tool. These are will be discussed in detail.
Data Acquisition
Data securing is the path toward making a scientific picture from PC media. For instance, CDROM, hard drive, removable hard drives, thumb drive, thumb drives, servers and other media which stores electronic data along with gaming guarantees as well as distinctive contraptions. Scientific picture is made using certain gear which shields any data from being formed for the source media. Thus, it remains consummate. Criminological picture, not the primary media, is used by the legal analyst for leading examination.
The data getting process fuses the record of each serial number and distinctive markings using a propelled camera. Measurable picture is affirmed against the first to ensure the criminological picture is a right duplicate of the primary media. To do data securing by utilizing the star find fundamental device. The prodiscover legal sciences device is most intense PC security instrument that used to empower the criminology agent to decide the every one of the data on the PC framework while ensuring the proof and making the evidentiary quality reports. This device has different highlights and advantages, for example,
- It makes the bit stream duplicate of circle to be dissected to protect the first confirmation.
- It effectively look through the whole circle and records including the PC data streams which is utilized for finish plate scientific investigation [1].
- It keep up the multi instrument similarity by composing and perusing the pictures.
- It inspect the PC document to give the data uprightness.
- It additionally analyse the all record frameworks for most extreme adaptability.
- It used the Perl contents to mechanize the examination undertakings.
- It personality the record makers to separates the EXIF data from JPEG documents.
- It enhances the similarity and precision via robotized the report age in XML design.
- It intended to NIST plate imaging instrument to guarantee the high calibre.
- It bolster for VM product to run a caught pictures.
Data Recovery
Open Pro discover basic Tool.
Click action to select the capture image. It is shown below.
After, choose the destination to capture the image. It is shown below.
The deleted folder must be located successfully using the pro discover tool. It automatically loads the file that is deleted on the context view. Then, it shows the deleted images on the USB Drive. It is shown below.
Data Analysis
To analysis the data on the USB drive and also identify the hidden files on the USB file by using the Winhex forensics tool. This process is shown below [2].The images are needs to be recovered. For recovering the deleted images, the following steps should be followed:
Initially, the Winhex forensic tool must be opened.Click the tools for choosing to open the disk.
Ensure to choose the file location of the deleted image. Next, in USB select the images from the deleted location. Further, Winhex forensic tool is used for displaying the data that is deleted, as represented in the below figure.
Here, by clicking on the tool initialize the hard drive and then choose the disk initialize. This displays the properties of the recovered images.For recovering the deleted images in Winhex recovery window, once initialization of disk is completed, right click on the recovered file. Then, choose the option, Recovery and copy, as illustrated in the below figure.
Later, select the output path for saving the recovered file [3].Finally, it represents the file, then it even recovers the file to a normal file as illustrated in the below figure.
Data Validation
- A champion among the most essential parts of PC wrongdoing scene examination
- Ensuring the uprightness of information you accumulate is fundamental for presenting evidence in court
- Most PC criminological instruments give robotized hashing of picture records
- Computer wrongdoing scene examination instruments have a couple of imprisonments in performing hashing
- Learning how to use advanced hexadecimal editors is essential to ensure information respectability.
- Progressed hexadecimal editors offer various features not open in PC wrongdoing scene examination devices
- Such as hashing specific records or portions
- Business PC wrongdoing scene examination programs have innate endorsement features
- Pro Discover's .eve reports contain metadata that joins the hash regard
- Validation is done normally
- Raw game plan picture reports (.dd enlargement) don't contain metadata
- So you ought to affirm unrefined course of action picture records physically to ensure the genuineness of information
Case Study II: Investing a Case
Here, we will examining the case and it including the 2 GB drive that client need to duplicate at the scene and it has following alternatives to duplicate the drive precisely.
- Data Acquisition
Data acquisition suggests picking up the information from the place of bad behaviour to clarify the case. In the PC wrongdoing scene examination gadget affirmations are secured as the photo report one of three arrangements. Out of three associations two are open source and third is exclusive. Restrictive mastermind was unmistakable in light of the way that each dealer have various surprising component. Information getting occurs in four methodologies:
- Make disk to picture archive.
- Making disk to-plate copy.
- Making honest to goodness plate to circle or plate to-information record.
- Making a lacking copy of a coordinator or record.
- Running Forensic Image is continued running from the Recover.
- Sets the part size of the influenced lawful picture to record [4].
- Sets the objective way and record name for the photo report.
- Ascertains a MD5 or conceivably SHA256 anchoring hash of the imaged information.
- Report
This guide delineates best practices for copying report and investigating a case including a 2 GB drive. These fuse surveying the scene,
- Utilizing media accumulating for the scene.
- Adapting the drive definitely.
- Finishing and recording the scene examination
- Sets the objective way and archive name for the photo record.
- Sets the part size of the influenced lawful picture to record.
- Computes a MD5 and SHA256 acquiring hash of the imaged information.
References
[1]M. Pollitt and S. Shenoi, Advances in digital forensics. New York: Springer/International Federation for Information Processing, 2010.
[2]Advances in Digital Forensics 9. Springer-Verlag New York Inc, 2016.
[3]S. Goel, Digital forensics and cyber crime. Berlin: Springer, 2010.
[4]C. Altheide and H. Carvey, Digital Forensics with Open Source Tools. [s.l.]: Elsevier professional, 2011.
Buy Mn613 Data Acquisition Answers Assessment Answers Online
Talk to our expert to get the help with Mn613 Data Acquisition Answers Assessment Answers to complete your assessment on time and boost your grades now
The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.