logo

Forensics Report: Digital Forensics Examiner

3 Pages1304 Words355 Views
   

Added on  2019-09-22

About This Document

This task covers data validation, e-discovery, steganography, reporting and presenting, and has been designed to ensure that you are engaging with the subject content on a regular basis. You are required to produce a formal report consisting of facts from your findings to your attorney who has retained you.

Forensics Report: Digital Forensics Examiner

   Added on 2019-09-22

ShareRelated Documents
Forensics Report In this major task assume you are a Digital Forensics Examiner. Considering a real or a hypothetical case you are required to produce a formal report consisting of facts from your findings to your attorneywho has retained you. You are free to choose a forensics scenario which can be the examination of a storage media (HDD, USB Drive, etc), email or social media forensics, mobile device forensics, cloud forensics or any other appropriate scenario you can think of.Deliverable:A forensics report of2000word.RationaleThis assessment task covers data validation,e-discovery, steganography, reporting and presenting, andhas been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to:determine the legal and ethical considerations for investigating and prosecuting digital crimesanalyse data on storage media and various file systemscollect electronic evidence without compromising the original data;evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab;compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation;prepare and defend reports on the results of an investigationPresentationThe following should be included as minimum requirements in the report structure:• Executive Summary or AbstractThis section provides a brief overview of the case, your involvement as an examiner, authorisation, major findings and conclusion• Table of Contents• IntroductionBackground, scope of engagement, forensics tools used and summary of findings• Analysis Conductedo Description of relevant programs on the examined itemso Techniques used to hide or mask data, such as encryption, steganography, hidden attributes, hidden partitions etco Graphic image analysis• FindingsThis section should describe in greater detail the results of the examinations and may include:o Specific files related to the requesto Other files, including deleted files that support the findingso String searches, keyword searches, and text string searcheso Internet-related evidence, such as Web site traffic analysis, chat logs, cache files, e-mail, and news group activityo Indicators of ownership, which could include program registration data.• ConclusionSummary of the report and results obtained• ReferencesYou must cite references to all material you have used as sources for the content of your work• GlossaryA glossary should assist the reader in understanding any technical terms used in the report. Use a generally accepted source for the definition of the terms and include appropriate references.• Appendices
Forensics Report: Digital Forensics Examiner_1

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital Forensics: Recovering Scrambled Bits and Suspicious Data
|25
|2901
|132

Digital Forensics Report (DOC)
|7
|1104
|53

Digital forensic investigation PDF
|21
|2438
|167

Report on Cloud Storage Forensics
|14
|3009
|117

Digital Forensics : Files System
|4
|761
|30

Principles of Digital Forensics PDF
|22
|1932
|375