Computer Forensics – Assignment

   

download the .ova file. download and install the virtual box tool.

open virtual box and import the ova file .

In this assignment you will work on the first steps of seizing and imaging an evidence disk. And create a well-organized report that has documentation with Text and Pictures about your work. 

Objectives:

– Learning how to seize a digital evidence found on the scene of the incident

– Being aware of the Dos and Don’ts when handling the evidence

– Filling the chain of custody and Learning its importance.

– Identifying the tools, both hardware and software, required for imaging the evidence data

– Preforming the imaging process which can be cloning or just imaging

– Validating the created image of evidence data

Context: [Fictional]

Scenario: The XYZ security team received a notification that suspicious cyber activity is taking place in Wilson Building. Surveillance cameras showed that a person, who could be the suspect, was seen in room Wilson 106 and then he left. When the team arrived at the scene, they only found a USB drive that could have been used in implementing the suspicious activity. They decided to seize it so they can perform the needed analysis to identify its content. 

Scene Location: Wilson 106 

· [For pictures, you can use your own place if you cannot access Wilson 106] 

Evidence: A USB drive 

· [a please have/use your own USB blank flash drive for this work. For faster performance you can use 8GB or less drives. Also, you can use SAU machines in case your machine is not powerful enough.]

Please follow all the steps/guidelines/phases below, as much as possible, however points in green only will be considered while grading.

· Will a warrant be needed in this case? Justify your answer and Add legal references [ 5 pts] [Based on: Scientific Working Group on Digital Evidence.]

· General Instructions: [Seizing the Evidence] 

1- Ensure the safety of all individuals at the scene. [X]

2- Protect the integrity of evidence. [X]

3- Evaluate the scene and formulate a search plan. [X]

4- Identify potential evidence. [The USB drive given to you]

5- All potential evidence should be secured, documented, and photographed. [ 5 pts ]

a. For this assignment No need to secure; just document and photograph.

i. In the report, the caption for photos/figures is required.

6- Conduct interviews. [X]

7- Any item to be removed from the scene should be properly packaged and secured. [X]

 

· For Removable Drives: 

1- Document in writing the location and condition of all removable media [ 2 pts]

a. For this assignment: The only the USB drive.

2- Remove any connected external media (e.g. external drives or thumb drives) after the computer has been powered down. [X]

 

· Creating the image: 

1- Document the tools you plan to use. [ 5 pts ]

a. For this assignment: 

i. Hardware [X]

1. Tableau Forensic USB 3.0 Bridge

2. T8u: 

a. Firmware:1.5.0.1, Date: 10/31/2016 , Time: 11:47:27

b. Serial: 000ecc13 0008415f

ii. Software.

2- List clearly the steps/work plan for creating the disk image. [ 3 pts ]

3- Use snapshots for each step while creating the disk image using the Parrot Security Linux distribution. [10 pts]

a. Using hashing, Verifying the disk and the image are important [5 pts]

4- Use the Chain-Of-Custody (COC) document to describe the item and fill required information. [ 5 pts]

a. Assume that the evidence was released to another person on the team, and fill the necessary information.

Notes: 

· Deliver The above work in a very well formatted and organized report that you will submit, in PDF format. [5 pts]

o Poorly formatted report will badly affect your grade regardless of the accuracy of your work, i.e. > 50% of the grade.

§ Have to have: Title Page, TOC, Pictures with Captions, Divide text into Sections…etc. 

· The COC document should be the last page of the report.

EVIDENCE CHAIN OF CUSTODY TRACKING FORM

Case Number: ________________________ Offense: ______________________________

Submitting Officer: (Name/ID#) _______________________________________________

Victim: ______________________________________________________________________

Suspect: _____________________________________________________________________

Date/Time Seized: __________________Location of Seizure: ______________________

  

Description of   Evidence

 

Item   #

Quantity

Description of Item (Model, Serial #, Condition, Marks, Scratches) 

 

 

 

 

 

 

 

 

 

  

Chain of Custody

 

Item #

Date/Time

Released by
(Signature & ID#)

Received by
(Signature & ID#)

Comments/Location

 

 

 

 

 

 

 

 

 

APD_Form_#PE003_v.1 (12/2012) Page 1 of 2 pages (See back)

EVIDENCE CHAIN-OF-CUSTODY TRACKING FORM
(Continued)

  

Chain of Custody

 

Item #

Date/Time

Released by
(Signature & ID#)

Received by
(Signature & ID#)

Comments/Location

 

 

 

 

 

 

 

 

 

 

 

  

Requirements Document

  

Requirements Document

Application title:  Mobile Phone Purchase

Purpose:  This windows application calculates the cost for a mobile phone from the Mobile Phone Store.

Program 

Procedures:  From a windows application, a buyer selects a mobile telephone for purchase. The buyer also can elect to buy a charger for the particular phone. A buyer is either in the store or is buying over the internet. The program calculates the cost of the phone and charger purchased.

Algorithms, Processing, and conditions:

1. The consumer enters their last name, street address, and zip code. If buying over the internet, the buyer also enters an email address.

2. The buyer selects a phone from a list of phones.

3. The user can select the type of charger from the list of chargers.

4. Based on the phone and charger selected, the program calculates the total cost.

5. The total cost for a store purchase must include 7.75% sales tax. No sales tax is included for internet sales.

6. An internet sale generates a shipping charge of $28.00.

7. The types of phones an their costs are: Blasstur 451: $279.81; Elecque 9801: $193.71; Gainlet 3: $328,44; Nomadic 2900: $253.72; Querta 332: $479.36.

8. Three types of chargers are available: Auto: $63.92; Mobile: $42.66; Desktop: $27.31.

9. Write a comma-delimited text file to record each sale. The text file should contain the user last name, zip code, phone choice, charger style, and total cost.

Notes and Restrictions:

1. Validate data the user enters using accepted standards.

2. In-store is the default of buyer.

3. The Email label and text box does not display unless the user is an Internet buyer. An Internet buyer must enter an email address.

Comments:

1. The picture shown in the application has been inlcuded. Its name is cell phone.jpg.

2. The program should use a three-tiered structure with presentation, business, and persistence classes.

USE CASE DEFINITION

1. The user views the opening screen

2. the user enters last name, street address, and zip code

3. The user selects a phone from the phone choice list and, if desired, a charger from the charger style list.

4. The user selects either In-store or Internet as the type of buyer. If an Internet buyer, the user must enter an email address.

5. The user clicks the Calculate Cost button.

6. The program displays the cost of the sale.

7. The program writes a record of the sale in a text file.

8. The user can click the clear form button to enter another sale.

Other notes: I need an event planning document and the entire VB project

Cybersecurity

                                   

Discussion -wk13 Performing Forensic Analysis and Techniques

There are a number of Digital forensics tools available.  Do some research on both software tools and  hardware tools.  Choose one of each to present in your Discussion essay.  Describe each tool and it’s capabilities and the advantages of having it in your Forensics Toolkit.  Considerations should include, functionality, ease of use, reliablity, reputation cost and other factors.
Notes: Your essay should be unique, do not duplicate your other classmates selection. (First come first served) If you must write on a tool that another classmate has chosen, be sure to approach your essay from a different angle.
These consideration very important in the course functionality, ease of use, reliability, reputation cost and other factors.

REFERENCES OR WORKS CITED SHOULD BE INCLUDED.

Network Infrastructure Design Diagram

Background: Kamehameha Institute is an organization that provides educational offerings to non-traditional students via the institute’s website in a three-tier web, application, and database configuration. The State of Hawai’i regulates the educational sector, driving the need to ensure Kamehameha follows the State’s strict security and regulatory requirements. Kamehameha’s leadership is also very concerned with the threat posed by the online theft of their unique intellectual property. Additionally, the number of Hawai’ian entities breached by threat actors is on the rise. Thus, security, privacy, and compliance are all important considerations for the Kamehameha network architecture.

Your boss, the Kamehameha Institute’s Chief Operating Officer (COO) has tasked you to design a network infrastructure for three facilities located in the Hawaiian Islands of Honolulu, Hilo, and Lihue. The COO stipulated that you must provide for strengthened defenses to protect Kamehameha’s cultural heritage. After meeting with the COO, the two of you drafted the following set of requirements for your network design:

  • Each of the facilities has three floors:
    • The first and second floor of each building requires 150 network connections each for machines connected to the management network used by administrators to manage the network devices
    • The third floor of each building requires 75 network connections for the servers
    • All sites require redundant connectivity to the other sites (e.g., Internet redundancy between the sites can be accomplished through a single Internet connection and a point-to-point link between the sites or two Internet connections provided by separate vendors along with point-to-point VPN connections between the sites)
  • Each datacenter is a redundant failover environment to the other datacenters (Hilo, Honolulu, Lihue)
  • A constant connection between the three locations, carrying at least 75 Mbps of data
  • All servers at all locations must have redundancy
  • Protection from intrusions is required and should be documented
  • A plan to verify security and failover measures is required

Submission: Using a network diagramming tool such as Microsoft Visio, or free tools such as LibreOffice Draw or Draw.io available at https://draw.io (no sign-in or registration required), create a network diagram (drawing) specific to the organization that encompasses the three facilities and also depicts any necessary interconnections. Figure 1 shows the draw.io ‘new network diagram’ dialog window:

Figure 1. Draw.io New File Dialog Showing the Network Diagramming Templates

Your diagram should include enough detail to show the topology interconnections. The viewer should be able to understand the Kamehameha Institute’s network environment and be able to implement the architecture you develop. Ensure that you properly cite any external sources.

One of the keys to producing a viable network diagram is labeling the objects consistently and descriptively. Think about what you would want to know about a network device if you logged into it with little prior information. Consider location, floor number, or other pertinent information. At a minimum, include the following elements:

  • IMPORTANT: Your network diagram must include an identifying label (e.g., callout box) that includes your class and section, assignment title, your name, and the date. Edit the items in italics. Your assignment will not be accepted if this element is missing:

Example Network Diagram Callout Box.

CMIT 350 6980
Project #1 Network Diagram
Student Name: Name
Date: 6/22/2010

  • Any necessary hardware
  • Site-to-Site (WAN) connections (e.g., leased line connectivity, satellite, etc.)
  • Annotate the following values for each of the Sites:
    • Network ID
    • Useable Range
    • Subnet Mask
    • CIDR Value
    • Broadcast Address
  • All devices require hostnames complying with the following naming conventions:
    • Routing Devices: Rx; where x is the site number incremented by a value of 1 for each routing device
    • Switching Devices: Sx; where x is the site number incremented by a value of 1 for each switching device
    • Servers: SRVx where x is the server number incremented by a value of 1 for each server
  • For each site routing device, implement a private ip addressing scheme using a range suitable for corporate infrastructure and include the following:
    • management vlan
    • production vlan
  • High availability

When finished, export the diagram as a PDF document (Note: You will need to use this diagram again in Project 3, so ensure you save the xml source file!) and submit it to the Assignment folder. Figure 2 demonstrates how to export your draw.io diagram as a PDF document:

Relational Database

 Assume that your boss knows  nothing about relational database theory. The goal of this paper is to obtain your boss’s approval to  proceed with your stated project. Do not focus on technical aspects of a database management  system. Focus on how the information will be captured, manipulated, managed, and shared, and the  value the database brings to the organization. Include brief examples of how other industries (both  domestic and international) have successfully used relational databases to increase efficiency. 

Kindly find the instructions of the paper below.