New User? Start here.
Error goes here
Please upload all relevant files for quick & complete assistance.
MyAssignmentHelp.com is not sponsored or endorsed by this college or university
The main objective of this project is to retrieve a forensic image of the USB data storage device. Farayi is suspected of selling counterfeit International Student Identity Cards to people who are not entitled to claim the discounts this card brings. An undercover sting operation was setup to catch Farayi in the act of selling his counterfeit goods. Farayi attempted to sell a counterfeit ISIC card to an undercover officer who was part of the sting operation. After being arrested and questioned at the local police station, Farayi provided a USB data stick to be further examined. Under questioning Farayi has stated that all the evidence that can be found is on this USB data stick. This USB storage device has been processed by a forensic imaging technician and the forensic image has been obtained. So I have to recover the forensic image of the USB data storage device. Then the copied Data in USB will be determined. The investigation will be carried out to determine that the hidden data in USB, the reasons and facts behind the theft.
This analysis using two main tool to retrieve a forensic image of the USB data storage device.
Data recovery is might be helpful for examination in a wide range of ways. A few Data stay introduce even after Data erasure or USB repartitioning (Gogolin et al., 2013). Also, there are numerous alternatives for offenders with specialized know how to shroud Data, for the most part utilizing a USB supervisor, stenography, encryption and so forth. Discovering, recuperation and remaking of concealed Data can be an extremely tedious and dreary process, however sometimes it might create prove that will split the case. So as to completely see how and why Data stay on a plate, one ought to find out about the idea of putting away Data on a USB. A USB part is a unit of settled size characterized when record framework is made (generally 512 bits). More seasoned hard USBs may have some 'squandered' storage room outwardly tracks, as intelligently each track is partitioned into break even with number of divisions. It is conceivable sometimes to shroud Data in the space between areas on the bigger outside tracks. This is known as the division hole. A few Data recuperation administrations might have the capacity to find and recover Data that is covered up in this hole. Erased records and slack space When a working framework composes a document to USB, it dispenses a specific number of segments. The quantity of areas designated relies upon the restrictions of the working framework and setup choices made by the framework overseer. The areas allotted and their area on the plate are recorded in a registry table for later access. At the point when the record is erased, the space initially dispensed to it is essentially set apart as unallocated. The genuine Data stays on the USB (Larson, 2014).
User needs to create the case file to open the provided the DD image file. The below screenshots is shows the new case creations. First, enter the case name as Unit09 and browser the base directory. Then click Next button to enter the optional information.
Here, we will select the data sources to add the data sources for created case file. So, select the unallocated space image file and click the next button to proceed the adding the data sources. It is shown below (Pollitt and Shenoi, 2010).
After, browse the data source path to select the DD image file. It is shown below.
Then, configure the DD image file to ingest modules and click the next button. It is shown below.
Finally, added the data sources. Then, the Autopsy tool will be analysed the DD image file to click the Ok button.
Here, the below screenshots is used to displayed the successful analysed of DD image file.
But, the DD image file does not have the MD5 hash number. So, it needs to identify by using the WinMD5 tool. First, user needs to download the install the WinMD5 tool. After, open the tool. Then, browse the DD image file. This process is shown below.
Then, the WinMS5 tool provides the MD5 hash values for provided DD image file. It is shown below.
Here, we will perform the initial survey of the evidence. First, user needs to create the keywords list to discover the relevant digital evidence on the DD image file. List of keywords are shown below (Ray and Shenoi, 2011).
Justification for Inclusion
Farayi is suspected of counterfeiting ISIC cards
This is identified as Student Name that student was studied in University of Economics.
There are 6 unallocated blocks are here.
Here three office documents are presented.
6 photos are presented.
Thirteen files are detected.
Curved files are contains the images and documents
MIME type using the 4 Octet stream applications.
MS word application
MIME type using the 2 MS word files
JPEG MIME Type images
MIME type has the 6 JPEG images.
Here, we will click the New list to enter the keywords lists. It is shown below
Once the new list is entered, after enter the new keywords to enter the justification of created keyword list. After, choose the substring match and click the Ok button.
Finally, we are successfully created the keywords lists and justification of keywords. It is shown below.
Then, search the information on image files by using the keyword list. Here, we will search the ISIC on keyword search. It is displayed the ISIC related information.
After, run the ingest modules by click the tool and choose the run ingest modules. It is shown below.
To run the ingest modules on Keyword search by select configure ingest modules as keyword search and click Finish to run the ingest modules. It is shown below.
After search the DD images information by using the keyword search like Unallocated. This process is display the following information. It is shown below.
Here, we will the provided DD image file information. Choose the data sources. It is shown below.
After, right click on data sources and click the properties. It is display the information about the data sources.
The final stage of initial survey is to identify the all the files are relevant to the investigation or not. This process is shown below.
Here, we will ensure the correct documentation is maintained or used. So, check the correct document related to word documents and images. The provided image has three word document. The First word document file is contains the file size is 20480 and Internal ID is 15.
It is shown below.
File Name Allocation
Hash Lookup Results
The second word document is contains the 58368 file size and internal ID is 20. It is shown below.
The third word document is contains the 11477 files and internal ID is 9. It is shown below.
The provided DD image file has six images. This is analysed below.
Here, we will interpret and locate the relevant digital evidence. So, look at keyboard list results. It is shown below.
Click the ISIC images file is shows the following image (Sammons, 2015).
This scan is used to seem entirely relevant to an investigation into counterfeit ISIC cards. Next, we are going to add a bookmark. To add a bookmark by right click on the results and select the tag files to click the book mark.
Similarly examining the counterfeit ISIC cards. It is shown below.
Also search the ISIC counterfeit cards by using the keyword search. It is shown the below.
Then, open the images file to open in external viewer.
It is shown below.
Then, examine the file to again the new keyword lists because it is very useful for a digital investigation. The creation of keyword lists is displayed in below.
The keyword lists are shown below.
After, search the keyword like sheetal on keyword search. The sheetal is one of the customers. It is shown below.
Finally, all the evidence is located on a USB drive and investigated files are copied or created on the the USB drive by a computer. So, this computer needs to investigate and it may reveal the lots of more useful evidence. It is used to provide the ability to reconstruct the activities that caused these files to exist.
Here, we will locate the relevant digital evidence to suggest Farayi has been counterfeiting ISIC cards. So, look at keyboard list results. It is shown below.
Click the ISIC images file is shows the following image (Sammons, 2015).
This scan is used to seem entirely relevant to an investigation into counterfeit ISIC cards.
Here, we will suggest that Farayi knew his actions were illegal. So, check the document related to word documents and images. It is shown below.
Is there any evidence to suggest the names of his customers?
Named in the letter as a customer of the counterfeiter
Named as the author of the letter (payment.docx)
The price of a counterfeit ISIC card
The main objective of this project is to retrieve a forensic image of the USB data storage device. According to the given case, the USB storage device has been processed by a forensic imaging technician and the forensic image has been obtained. So I had to recover the forensic image of the USB data storage device. Then the copied Data in USB is determined. The investigations are carried out to determine that the hidden data in USB, the reasons and facts behind the theft.
Gogolin, G., Ciaramitaro, B., Emerick, G., Otting, J. and Pavlov, V. (2013). Digital forensics explained. Boca Raton: CRC Press, Taylor & Francis Group.
Larson, S. (2014). The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics. Journal of Digital Forensics, Security and Law.
Pollitt, M. and Shenoi, S. (2010). Advances in digital forensics. New York: Springer/International Federation for Information Processing.
Ray, I. and Shenoi, S. (2011). Advances in digital forensics IV. New York: Springer.
Sammons, J. (2015). The basics of digital forensics. Amsterdam: Syngress Media.
To View this & another 50000+ free samples. Please put
your valid email id.
Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.
Get Moneyinto Your Wallet
Total 9 pages
*The content must not be available online or in our existing Database to qualify as
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2020). Digital Forensic Technology. Retrieved from https://myassignmenthelp.com/free-samples/co4514-digital-forensic-technology/documentation-phase.html.
"Digital Forensic Technology." My Assignment Help, 2020, https://myassignmenthelp.com/free-samples/co4514-digital-forensic-technology/documentation-phase.html.
My Assignment Help (2020) Digital Forensic Technology [Online]. Available from: https://myassignmenthelp.com/free-samples/co4514-digital-forensic-technology/documentation-phase.html[Accessed 26 May 2022].
My Assignment Help. 'Digital Forensic Technology' (My Assignment Help, 2020) <https://myassignmenthelp.com/free-samples/co4514-digital-forensic-technology/documentation-phase.html> accessed 26 May 2022.
My Assignment Help. Digital Forensic Technology [Internet]. My Assignment Help. 2020 [cited 26 May 2022]. Available from: https://myassignmenthelp.com/free-samples/co4514-digital-forensic-technology/documentation-phase.html.
The respective sample has been mail to your register email id
* $5 to be used on order value more than $50. Valid for
We have sent login details on your registered email.
Are you looking for someone who can tell you how to reference a book while drafting a paper? You can check out the webpage of MyAssignmenthelp.com where you can hire our experts for quality assistance with every referencing format including APA format, Harvard reference format and IEEE reference format. Referencing can be a critical task, especially when you are completely unaware of the assigned referencing style. We assure you to give you complete help in the specific way as you may require.
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2...
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l...
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba...
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c...
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste...
Get top notch assistance from our best tutors ! Excel in your academics & career in one easy click!
MPM755 Building Success In Commerce
SNM660 Evidence Based Practice
BSBHRM513 Manage Workforce Planning
MKT2031 Issues In Small Business And Entrepreneurship
MN506 System Management
ENGL 100 English Essay
HI6008 Business Research
BUSS5308 Australian Industrial Relations
INFO5301 Information Security Management
MGMT20144 Management And Business Context
CO4515 Trends In Cybercrime
MD4100 Strategy And International Management
EC1401 Introduction To Business Economics And Finance
HR4005 Managing People
BT4215 Business Information Management
BN4402 Quality And Environmental Management Systems
MSIN1007 Business Intelligence
HR3003 Business Issues And The Context Of HR
MP3732 Operations Management
Just refer 5 friends to earn more than $2000.
If you are the original writer of this content and no longer wish to have your work published on Myassignmenthelp.com then please raise the
content removal request.
After the successfull payment you will be redirected to the detail page where you can see download full answer button over blur text.You can also download from there.
Or you can also download from My Library section once you login.Click on the My Library icon
My Library page open there you can see all your purchased sample and you can download from there.
That's our welcome gift for first time visitors
On APP - grab it while it lasts!
*Offer eligible for first 3 orders ordered through app!
ONLINE TO HELP YOU 24X7
OR GET MONEY BACK!
OUT OF 38983 REVIEWS
Received my assignment before my deadline request, paper was well written. Highly