diff_months: 11

Draft A Report And Presentation Highlighting" Digital Forensics"

Download Solution Now
Added on: 2023-06-02 06:09:13
Order Code: clt281719
Question Task Id: 0

Assignment Overview

You are required to forensically investigate how to identified (methods/techniques) sources of data on one of the categories listed in the following table. This involves you uploading, downloading and identify who can read data and determine how you can prove who uploads, downloads, watch/read content. You are to use spoofing techniques such as IP/MAC/email spoofing to see if you can still identify the source. Check timestamp issues. You must investigate five (5) forensics techniques throughout your investigation. It is expected to use multiple tools and techniques to establish the claim.

Do NOT engaged in questionable activities (either academic misconduct or illegal activities)
Always submit your own work (e.g. your contribution)

Make sure there is significant proof such as screenshots, video, logs with timestamp, etc of your own work.

You can use any tool(s). Such as Wireshark, Netminer, windows event viewer, logs, etc. Or it is beneficial to learn new tools.

Topics:

You must choose and have your lecturer/tutor approved and record your topic. No two student can do the same topic.

Topic Student No. Student Name
Whatsapp    
Bitcoin    
Bittorrent    
Emails    
Darknet    
Cloud    
Facebook    
LinkedIn    
Non-fungible tokens    
Gumtree    
Jora    
Dropbox    
SugarSync    
NAT/PAT    
VPN    
Google Cloud Platform    
AWS    
Azure    
Docker    
Load Balancer    
Viruses    
Randomware    
Virtual box    
OrangeHRM    
A1 HER    
SimpleHRM    
Sentrifugo    
ADempiere    
IceHRM    
OpenHRM    
Apache OrBiz    
OpenBoxes    
OpenLMIS    
xTuple    
SuiteCRM    
Odoo    
X2CRM    
Vitiger    
Moodle    
Ansible    
FreeCAD    
SALOME    
TimelineJS KnightLab    
Round Cude (free Email Server)    
PacketFence (free NAC)    

Best Techniques:

Install the software under investigation in a sandbox like Cuckoo then, perform normal activities with it. Trace these actives with the sandbox and other forensics methods such as code conversion, network/packet sniffer, source code analysis, events/logs triggered, etc.

  • Uploaded By : Katthy Wills
  • Posted on : June 02nd, 2023
  • Downloads : 0
  • Views : 101

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more