logo

Digital forensic investigation PDF

   

Added on  2021-05-31

21 Pages2438 Words167 Views
userAssignment 3 Tasks and Forensics Report
Digital forensic investigation PDF_1
Abstract:Digital Forensic is viewed as the part of the art and Science. In digital forensicsmany methods and tools are used. In our project, using the most powerful tool like as Hex Editorand Pro discover basics. Both the tool are used to analysis and recovery the information. Digitalforensic investigation is introduced to recover the evidence and investigated by differentComputer resources. EMTS release advertising for the Superior Bicycles. One of the employeein EMTS gathering the information to delivered the other Company and Conduct side business.Based on the analysis, EMTS manager find out the USB drive .The USB drive contains theadvertising Information and some information gathering from the Web Server. Report aregenerated using information collected from evidence form. Using Stenography tool to recoverthe hidden information.1
Digital forensic investigation PDF_2
Table of ContentsAbstract:.....................................................................................................................................................11. Introduction...........................................................................................................................................12. Background Scenario:...........................................................................................................................13. Forensic Tools used:..............................................................................................................................23.1Win hex:................................................................................................................................................23.2Pro discover basic:................................................................................................................................24. Scope of Engagement:...........................................................................................................................24.1Three types of digital Forensics communities:...................................................................................24.2 Process:.................................................................................................................................................34.3Subtypes of DFS:..................................................................................................................................34.3.1Media Analysis:.................................................................................................................................34.3.2Methodology of Digital Forensics:....................................................................................................34.3.3Context of Computer Forensic........................................................................................................44.3.4 Forensic Report Security Control:..................................................................................................45. Summary of findings:............................................................................................................................56. Analyzing digital Evidence....................................................................................................................57. Task 1: Recovering Scrambled bits......................................................................................................68.Acquire a USB Drive using ProDiscover basics.................................................................................109. Findings................................................................................................................................................1310. Stenography techniques....................................................................................................................1411. Conclusion:.........................................................................................................................................1512. Reference............................................................................................................................................152
Digital forensic investigation PDF_3
1. IntroductionIn computer forensic digital information is identified and analyzed and used as a digital evidence in criminal, civil and administrative cases .Using different rules documents are maintained in a computer. Computer forensics need search warrants when preparing to search fora digital evidence. Reporting, analysis and analysis are the three stages in digital forensics. First we have to gather the evidence from the suspect computer and identify whether the crime happenare not. Using computer forensics tools we can determine whether the suspect committed a crimeor violated the company policy. Investigation process involves investigating the suspect computer and then collecting the evidence and preserving the evidence on a different computer. Computer forensic involves recovering deleted files and hidden files. In computer crimes and misuses evidence must be required. 2. Background Scenario:EMTS is one of the best marketing and Service Company for the customer. In thiscompany finished the marketing and customer service with Superior bicycles. EMTS is the best one compare to other Company. EMTS aimed to advertising the Superior Bicycles Product.in this EMTS Company, the person are gathering the Sensitive data for the marketing purpose to transfer the other Company. The EMTS are find out the suspected person. Thus the Company signed the agreement for Superior bicycles, so the company details are much secured. The Bob Aspen stored the all information about the Superior Bicycles into the USB derive. The EMTS manager found out the USB drive and check out all the files, but the person deleted the whole files. The EMTS manager used to retrieve the data using the forensics tool. Thus help of the tool to retrieve all the deleted message, through the network. Web based is received the attachments fie through e-mail.3
Digital forensic investigation PDF_4
3. Forensic Tools used:Win hexPro discover BasicHex Workshop3.1Win hex:Win hex is the most powerful tool. Win hex tool is discovered by AG Germany. Win hex tool is the latest version, it will produced the new advance one called hex editor. The tool is mainly used to gathering the information for the purpose of evidence. The tool widely used for analysis the data , editing and recovery the deleted data.3.2Pro discover basic:Pro discover basic tool is one of the forensic tool. Mainly used for the change the image file into the bootable file. It’s made by the Technology pathways, it’s one of the user friendly tool.4. Scope of Engagement: DFS:The method are used to derive the scientific tools, they are collection, validation, analysis, identification and presentation. The digital source are most important for gathering the evidence.4.1Three types of digital Forensics communities:Law EnforcementMilitaryBusiness and IndustryDigital Forensics Science:4
Digital forensic investigation PDF_5
4.2 Process:The DFS activities are naturally investigated by the following Process are given below:IdentificationExaminationAnalysisDecision4.3Subtypes of DFS:They are three types of the DFS Analysis are given below:Media AnalysisCode AnalysisNetwork Analysis4.3.1Media Analysis:Computer are mainly used to refer the Media. Media is the major parts of the Digital Forensics Science. Media analysis is the stored medium, it could be focused on the flash Memory and RAM. Media Analysis is also called as the network Analysis.4.3.2Methodology of Digital Forensics:5
Digital forensic investigation PDF_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital Forensics: Recovering Deleted Files from USB using Winhex and Stenography Tool
|22
|2401
|395

Digital Forensics Report for Exotic Mountain Tour Service
|24
|2567
|203

Digital Forensic Report for EMTS Organization
|18
|1989
|460

Digital Forensics Report for a Case Study on Intellectual Property Theft
|19
|2633
|66

Digital Forensics: Investigation and Recovery of Lost Data
|21
|2379
|235

Digital Forensics Report for EMTS Organization
|28
|2503
|371