diff_months: 29

Draft A Report And Presentation Highlighting" Digital Forensics"

Download Solution Now
Added on: 2023-06-02 06:09:13
Order Code: clt281719
Question Task Id: 0

Assignment Overview

You are required to forensically investigate how to identified (methods/techniques) sources of data on one of the categories listed in the following table. This involves you uploading, downloading and identify who can read data and determine how you can prove who uploads, downloads, watch/read content. You are to use spoofing techniques such as IP/MAC/email spoofing to see if you can still identify the source. Check timestamp issues. You must investigate five (5) forensics techniques throughout your investigation. It is expected to use multiple tools and techniques to establish the claim.

Do NOT engaged in questionable activities (either academic misconduct or illegal activities)
Always submit your own work (e.g. your contribution)

Make sure there is significant proof such as screenshots, video, logs with timestamp, etc of your own work.

You can use any tool(s). Such as Wireshark, Netminer, windows event viewer, logs, etc. Or it is beneficial to learn new tools.

Topics:

You must choose and have your lecturer/tutor approved and record your topic. No two student can do the same topic.

Topic Student No. Student Name
Whatsapp
Bitcoin
Bittorrent
Emails
Darknet
Cloud
Facebook
LinkedIn
Non-fungible tokens
Gumtree
Jora
Dropbox
SugarSync
NAT/PAT
VPN
Google Cloud Platform
AWS
Azure
Docker
Load Balancer
Viruses
Randomware
Virtual box
OrangeHRM
A1 HER
SimpleHRM
Sentrifugo
ADempiere
IceHRM
OpenHRM
Apache OrBiz
OpenBoxes
OpenLMIS
xTuple
SuiteCRM
Odoo
X2CRM
Vitiger
Moodle
Ansible
FreeCAD
SALOME
TimelineJS KnightLab
Round Cude (free Email Server)
PacketFence (free NAC)

Best Techniques:

Install the software under investigation in a sandbox like Cuckoo then, perform normal activities with it. Trace these actives with the sandbox and other forensics methods such as code conversion, network/packet sniffer, source code analysis, events/logs triggered, etc.

  • Uploaded By : Katthy Wills
  • Posted on : June 02nd, 2023
  • Downloads : 0
  • Views : 308

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more