logo

Digital Theft and Recovery Procedures

Subject overview and outline for ITC597 - Digital Forensics at Charles Sturt University.

23 Pages1494 Words138 Views
   

Added on  2023-04-03

About This Document

This project discusses digital theft and recovery procedures. It includes the use of Winhex digital forensics tool for data recovery and the preparation of a digital forensics report for intellectual property theft.

Digital Theft and Recovery Procedures

Subject overview and outline for ITC597 - Digital Forensics at Charles Sturt University.

   Added on 2023-04-03

ShareRelated Documents
University
Semester
Networking
Student ID
Student Name
Submission Date
1
Digital Theft and Recovery Procedures_1
Executive summary
We shall be discussing about the Digital theft and recovery procedures in this project.
The project is split in to two parts. In the first part of this project we shall recover, by using
the Winhex digital forensics tool, the scrambled bits for providing the effective data recovery for
digital forensics analysis. In the second part of this project, for the Intellectual property theft for
a new employee of Superior Bicycles Inc, we shall prepare a digital forensics report. At Superior
Bicycles Inc, Jim Shu, an employee had been removed and in his place a new employee Tom
Johnson was taken in. A strange email from Terry Sadler containing the new project details of
Jim Shu was received by the External investor/Contractor, Bob Aspen. As the project looked
interesting and impressive, he forwarded the email to Chris Robinson incase capital investment is
required.
Now for this project, any form of digital photograph as an evidence will be considered for
determining any further data of proprietary Superior Bicycles Inc. We shall make use of tools
like FTK imager and Autopsy tool for further investigation of the USB drive and the data in it.
Finally, after completing the full analysis, we shall prepare a detailed digital forensics report.
This will be further studied and evaluated so as to get a full appraisal for the given project.
2
Digital Theft and Recovery Procedures_2
Table of Contents
Task 1: Recovering Scrambled Bits.........................................................................................................4
Task 2: Digital Forensics Report..............................................................................................................8
1. Introduction and Background......................................................................................................8
2. Analysis..........................................................................................................................................9
3. Findings........................................................................................................................................14
4. Conclusion....................................................................................................................................21
References................................................................................................................................................22
3
Digital Theft and Recovery Procedures_3
Task 1: Recovering Scrambled Bits
Winhex digital forensics tool shall be used in this task for the recovery of the scrambled
data and to get an informative and detailed data recovery for further investigation on the digital
forensics analysis.
We shall follow the below mentioned steps for the recovery of the scrambled bits by
using the Winhex Tool,
Open the Winhex software as shown in the below image (Advances in Digital Forensics
9, 2016).
Open the file by clicking on the file name. Select the provided text file by browsing through the
scrambled bits. The below image shows the scrambled bits of text file as selected,
4
Digital Theft and Recovery Procedures_4
Next as shown in the below image, browse the selected file,
5
Digital Theft and Recovery Procedures_5
Next, run the scrambled bit to display the text format of the file as shown in the below image
(Årnes, 2014).
6
Digital Theft and Recovery Procedures_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
University Semester.
|25
|2602
|55

Digital Forensics Report for EMTS Organization
|28
|2503
|371

Digital Forensics: Recovering Scrambled Bits and Suspicious Data
|25
|2901
|132

University Semester.
|7
|184
|285

Digital Forensics: Recovering Scrambled Bits and Report Analysis
|12
|1876
|318

Digital Forensic Investigation using ProDiscover and WinHex
|18
|2124
|374