CYBERCRIME FORENSIC ANALYSIS – COCS71193

CYBERCRIME FORENSIC ANALYSIS – COCS71193

CYBERCRIME FORENSIC ANALYSIS – COCS71193

Assignment Specification Weighted at 100% of the module mark.

Learning Outcomes being assessed by this portfolio.

  • Critical understanding of the techniques and procedures used to identify, collect, and analyse digital evidence of computer crime.
  • Critically evaluate methods of evidence handling where digital evidence could be overlooked or misinterpreted.
  • The use of digital forensics tools in digital forensic analysis.

Submission Deadline:

Monday 6th May 2024, 1600Hrs.

Requirements & Marking Scheme

General Guidelines:

This is an individual assessment comprised of four parts and is weighted at 100% of the module mark. All Parts A, B, C and D are equally weighted at 25% of the overall module mark. Part A will assess your understanding of Windows File Systems and how they can be abused by perpetrators. Part B will assess your understanding of Digital Forensic Investigations through evidence collection and preservation. Part C will assess your understanding of Threat and Malware Analysis. Finally, Part D will assess your practical understanding of the digital forensic investigation tools.

You are expected to approach all parts of this assignment as small but comprehensive academic reports. Please DO NOT go more or less than 10% of the recommended word limit.

As such the following report structure is expected:

  1. Introduction, where you will discuss your plan for solving the problem introduced by the instructors.
  2. Main Body, where you will develop your arguments.
  3. Conclusions, where you will critically discuss your findings.
  4. References (At least 25 peer reviewed references in total)
  5. Appendixes (if needed)

You are expected to demonstrate an insight into the implications of the problem introduced in each task by using clear and concise arguments. The report should be well written (and word-processed), showing good skills in creativity and design. Sentences should be of an appropriate length and the writing style should be brief but informative. The report should have a consistent layout and be divided into enumerated sections, sub- sections, sub-sub sections, etc. For the references and bibliography, you are expected to use appropriate peer reviewed sources for developing your arguments, and an appropriate referencing style as per the University regulations.

A digital copy of the report should be submitted using blackboard/Turnitin (email submission will not be accepted), more instructions will be given for this by your instructor(s).

The deadline for this assignment is Monday 6th May 2024 (16:00, hard deadline).

Presentation of the Assignment Report

It is your responsibility to ensure that your work is neatly and accurately presented. The work must be:

  • Word processed.
    • Title Page, table of contents, table of figures, list of tables, etc.
    • 1.5 line spaced.
    • 2.5cm borders around the page (If you are using MS Word, this should be automatic)
    • 12-point font in Calibri, Arial, Times New Roman or Tahoma (choose one and use it consistently throughout the report)
    • Text aligned Justified.
    • Harvard Referenced.
    • Include a word count for every part of the assignment.
    • Word count should exclude, table of contents, table of figures, list of tables, references, and appendices.

Part A – FAT32 vs NTFS

Part A is weighted at 25% of the overall module mark. It is expected that this part of the portfolio will be in the region of 750 1000 words, discussing how a perpetrator can hide data in FAT32 and NTFS file systems by abusing their ‘features’. You are expected to comment on FAT32 and NTFS slack space, alternate data streams, and file deletion.

Part B, Assessment CriteriaMarks Available
Slack Space5
File Deletion5
Alternate Data Streams10
Report Structure and Referencing5
Total25

Part B – Digital Forensic Readiness

Part B is weighted at 25% of the overall module mark. It is expected that this part of the assignment will be in the region of 750 – 1000 words, discussing computer crime in modern society and Incident Response (IR). Additionally, you are required to discuss the concept of Forensic Readiness (FR) within a Small-to-Medium Enterprise (SME), aiming to identify and prevent computer crimes.

Part B, Assessment CriteriaMarks Available
Computer Crime in modern society Discussion5
IR Discussion5
FR within SME Discussion10
Report Structure and Referencing5
Total25

Part C – Threat and Malware Analysis

Part C is weighted at 25% of the overall mark. It is expected that this part of the portfolio will be in the region of 750 – 1000 words, critically discussing the different technologies that are available to a malware analyst. Thus, this section will assess your critical understanding of the methods of malware analysis and malware analysis environments. You are expected to develop your arguments and critically compare dynamic malware analysis to static malware analysis. You should also discuss the use of an isolated physical machine to the use of a virtual machine and briefly explain which environment suits which analysis method. You are also expected to comment on the malware analysis tools used in static and dynamic analysis.

You are expected to use appropriate peer-reviewed sources for developing your arguments and an appropriate referencing style as per the University regulations.

Your report should include:

  • Discussion on malware analysis methods
    • Goals of malware analysis
    • Comparison discussion
    • Mapping to analysis environments
    • Discussion on the tools
Part C, Assessment CriteriaMarks Available
Malware Analysis Methods and Goals5
Comparison between Static and Dynamic Analysis (Include Tools Used)  12
Mapping to Analysis Environments5
Report Structure and Referencing3
Total25

Part D: Practical Digital Investigation

This section will assess your ability to analyse and present evidence in a mock courtroom environment. Part D is weighted at 25% of the overall module mark and has no word count. You will be given a raw image file (on Blackboard under the Assessment Content). You need to produce a report outlining the list of evidence identified, forensic analysis of each evidence and appropriate artefacts in order to resolve the alleged crime. This report should be included within your final portfolio report. For this part of the assignment, you are expected to use EnCase, however, you can use any of the available free/open-source digital forensics investigation tools (e.g., Autopsy – https://www.sleuthkit.org/autopsy/).

Part D, Assessment CriteriaMarks Available
Evidence Handling and Identification7
Evidence Analysis15
Report Structure3
Total25

Evidence Identification/Analysis

In your analysis you are to find the following pieces of evidence (but not limited to) and comment on:

  • Disk geometry analysis of the given exhibit (e.g., partitions present in the collected artefacts, recovery of deleted partitions etc.)
  • Time zone settings.
  • Installed Operating System.
  • Programs installed.
  • Devices and hardware volumes.
  • Steganographic Contents.
  • Encrypted Documents (PDF, text, word, etc.)
  • Binary files (executables)
  • The users’ information.
  • Emails.
  • Internet activities.
  • Cookies information.
  • File carving / recovery of deleted files.
  • When was the last recorded computer shutdown date/time?
  • Who was the last user to logon to the computer?
  • List the network cards used by this computer.
  • Find any IP address and the MAC address of the computer.

Findings/Conclusions

Your findings should be presented in a factual way and should include any relevant information that you have discovered during your investigation. You are expected to include your analysis and evaluation of the tasks in a reflective way.

Report Structure

Logical organisation of thoughts and arguments, clarity, effective presentation of deliverables, word processed report following the discussed guidelines, and appropriate style, punctuations, and spelling. The use of numbering format is highly recommended to make the presentation effective.

Best Wishes!

Marking Scheme

CriteriaFail (< 50)Reasonable (50 59)Good (6069)Excellent (>70)
      Part ANo understanding of the various data hiding techniques. No discussion of the slack space, ADSs or the various ‘deleting’ mechanisms.Clear understanding of data hiding techniques discussing file slack, disk slack, hiding executables in ADSs and other data types as well as file system deletion, directory deletion, and file deletion. May contain some errors. Some examples but very limited.A clear and useful theme is developed. Insight into implications. Clear and concise arguments that lead to appropriate conclusions and recommendations. Very good examples demonstrating all of the techniques. Contains very few errors.As before plus: Excellent understanding and exposition of data hiding issues that shows insight and draws together various investigative techniques. No errors.
      Part BSuperficial arguments. Very limited discussion of the issues presented by the assignment document.Reasonable evidence of adequate understanding of digital forensics. Appropriate discussion on computer Crimes and information security. IR and FR procedures are discussed but may contain errors.As before but correlations between crimes are clearly identified and discussed. The report demonstrates a good understanding of the processes, covering all key issues, and demonstrating a good critical understanding of the implications.High academic learning ability achieved. Exceptional quality of output demonstrating professionalism. The report can be seen as ‘best practice’ for IR and FR and it clearly argues how IR must be coupled with FR.
    Part CNo understanding of static and dynamic analysis. No insight into the analysis environment and tools used.Clear but underdeveloped arguments with inappropriate justification. Limited critical discussion of static analysis vs ‘dynamic analysis, analysis environment and tools used. Contains errors.A clear and useful theme is developed. Insight into the analysis methods and the environment. Clear comparative analysis and tools. Contains very few errors.As before but with excellent flow of ideas, with a sense of understanding containing no errors. Good report structure with relevant peer reviewed sources.
    Part DNo case and no clear evidence handling procedures. No evidence analysis. Very week report structure.Evidence    of    some                 insight                 into the investigative procedure. Very little analysis that covers only the system analysis. Some conclusions are given but contain errors. Some structure to the report is provided.Appropriate management of evidence. Report covers some of the key issues. Complete analysis of evidence that leads to findings. Contains very few errors.High academic learning ability achieved with excellent understanding of the various investigative techniques, demonstrating professionalism. Can participate in case work.
Order Now

Get expert help for CYBERCRIME FORENSIC ANALYSIS – COCS71193 and many more. 24X7 help, plag free solution. Order online now!

Universal Assignment (May 18, 2024) CYBERCRIME FORENSIC ANALYSIS – COCS71193. Retrieved from https://universalassignment.com/cybercrime-forensic-analysis-cocs71193/.
"CYBERCRIME FORENSIC ANALYSIS – COCS71193." Universal Assignment - May 18, 2024, https://universalassignment.com/cybercrime-forensic-analysis-cocs71193/
Universal Assignment March 13, 2024 CYBERCRIME FORENSIC ANALYSIS – COCS71193., viewed May 18, 2024,<https://universalassignment.com/cybercrime-forensic-analysis-cocs71193/>
Universal Assignment - CYBERCRIME FORENSIC ANALYSIS – COCS71193. [Internet]. [Accessed May 18, 2024]. Available from: https://universalassignment.com/cybercrime-forensic-analysis-cocs71193/
"CYBERCRIME FORENSIC ANALYSIS – COCS71193." Universal Assignment - Accessed May 18, 2024. https://universalassignment.com/cybercrime-forensic-analysis-cocs71193/
"CYBERCRIME FORENSIC ANALYSIS – COCS71193." Universal Assignment [Online]. Available: https://universalassignment.com/cybercrime-forensic-analysis-cocs71193/. [Accessed: May 18, 2024]

Please note along with our service, we will provide you with the following deliverables:

Please do not hesitate to put forward any queries regarding the service provision.

We look forward to having you on board with us.

Categories

Get 90%* Discount on Assignment Help

Most Frequent Questions & Answers

Universal Assignment Services is the best place to get help in your all kind of assignment help. We have 172+ experts available, who can help you to get HD+ grades. We also provide Free Plag report, Free Revisions,Best Price in the industry guaranteed.

We provide all kinds of assignmednt help, Report writing, Essay Writing, Dissertations, Thesis writing, Research Proposal, Research Report, Home work help, Question Answers help, Case studies, mathematical and Statistical tasks, Website development, Android application, Resume/CV writing, SOP(Statement of Purpose) Writing, Blog/Article, Poster making and so on.

We are available round the clock, 24X7, 365 days. You can appach us to our Whatsapp number +1 (613)778 8542 or email to info@universalassignment.com . We provide Free revision policy, if you need and revisions to be done on the task, we will do the same for you as soon as possible.

We provide services mainly to all major institutes and Universities in Australia, Canada, China, Malaysia, India, South Africa, New Zealand, Singapore, the United Arab Emirates, the United Kingdom, and the United States.

We provide lucrative discounts from 28% to 70% as per the wordcount, Technicality, Deadline and the number of your previous assignments done with us.

After your assignment request our team will check and update you the best suitable service for you alongwith the charges for the task. After confirmation and payment team will start the work and provide the task as per the deadline.

Yes, we will provide Plagirism free task and a free turnitin report along with the task without any extra cost.

No, if the main requirement is same, you don’t have to pay any additional amount. But it there is a additional requirement, then you have to pay the balance amount in order to get the revised solution.

The Fees are as minimum as $10 per page(1 page=250 words) and in case of a big task, we provide huge discounts.

We accept all the major Credit and Debit Cards for the payment. We do accept Paypal also.

Popular Assignments

EDM9780M CEEL Summative Assignment 2023-2024

Below you will find instructions on completing each of the four parts of your final summative assignment. Part 1 – Personal/professional area of interest in education (1000 – 1,500 words max) For this part of the assignment, you will need to: How to complete this part (Part 1): 1. Choose

Read More »

AT1 PREPARATION REFLECTION TEMPLATE

Weighting: 5 marks (10%) of the assignment. COMPLETE & SUBMIT INDIVIDUALLY. This is the second of THREE documents required for submission for the assignment. Complete the following, describing and reflecting upon your involvement with the preparation for the Group Presentation, including your interaction with other members of your team in

Read More »

SUMMATIVE ASSIGNMENT – Mathematics for Science

IMPORTANT INFORMATION 1 Electric power is widely used in industrial, commercial and consumer applications. The latter include laboratory equipment for example water baths, spectrophotometers, and chromatographs. If you have 17.3 kA and 5.5 MV, what is the power? Give the appropriate unit.                                                                                                               (3 marks) 2 Oil immersion objective lenses

Read More »

Assignment CW 2. Foundations of Biology

The instructions in RED are the ones which are mark-bearing and need to be answered as part of the assignment. The instructions in BLACK tell you how to carry out the simulation Diffusion simulation: Results table Use Excel to calculate the mean and standard deviation. The functions are AVERGAGE and

Read More »

MA Education Dissertation Proposal

Student Name Click here to enter text. Student ID                       Proposed title of research project Click here to enter text.       State the background references on which your research is based (ideally 4 or 5) Click here to

Read More »

Assignment: Implement five dangerous software errors

Due: Monday, 6 May 2024, 3:00 PM The requirements for assessment 1: Too many developers are prioritising functionality and performance over security. Either that, or they just don’t come from a security background, so they don’t have security in mind when they are developing the application, therefore leaving the business

Read More »

LNDN08003 DATA ANALYTICS FINAL PROJECT

Business School                                                                 London campus Session 2023-24                                                                   Trimester 2 Module Code: LNDN08003 DATA ANALYTICS FINAL PROJECT Due Date: 12th APRIL 2024 Answer ALL questions. LNDN08003–Data Analytics Group Empirical Research Project Question 2-The project (2500 maximum word limit) The datasets for this assignment should be downloaded from the World Development Indicators (WDI)

Read More »

Imagine you are an IT professional and your manager asked you to give a presentation about various financial tools used to help with decisions for investing in IT and/or security

Part 1, scenario: Imagine you are an IT professional and your manager asked you to give a presentation about various financial tools used to help with decisions for investing in IT and/or security. The presentation will be given to entry-level IT and security employees to understand financial investing. To simulate

Read More »

DX5600 Digital Artefact and Research Report

COLLEGE OF ENGINEERING, DESIGN AND PHYSICAL SCIENCES BRUNEL DESIGN SCHOOL DIGITAL MEDIA MSC DIGITAL DESIGN AND BRANDING MSC DIGITAL DESIGN (3D ANIMTION) MSC DIGITAL DESIGN (MOTION GRAPHICS) MSC DIGITAL DESIGN (IMMERSIVE MIXED REALITY) DIGITAL ARTEFACT AND RESEARCH REPORT                                                                 Module Code: DX5600 Module Title: MSc Dissertation Module Leader: XXXXXXXXXXXXXXXXX Assessment Title:

Read More »

Bsc Public Health and Health Promotion (Top up) LSC LONDON

Health and Work Assignment Brief.                 Assessment brief: A case study of 4,000 words (weighted at 100%) Students will present a series of complementary pieces of written work that:   a) analyse the key workplace issues; b) evaluate current or proposed strategies for managing them from a public health/health promotion perspective

Read More »

6HW109 Environmental Management and Sustainable Health

ASSESSMENT BRIEF MODULE CODE: 6HW109 MODULE TITLE: Environmental Management and Sustainable Health MODULE LEADER: XXXXXXXXX ACADEMIC YEAR: 2022-23 1        Demonstrate a critical awareness of the concept of Environmental Management linked to Health 2        Critically analyse climate change and health public policies. 3        Demonstrate a critical awareness of the concept of

Read More »

PROFESSIONAL SECURE NETWORKS COCS71196

PROFESSIONAL SECURE NETWORKS– Case Study Assessment Information Module Title: PROFESSIONAL SECURE NETWORKS   Module Code: COCS71196 Submission Deadline: 10th May 2024 by 3:30pm Instructions to candidates This assignment is one of two parts of the formal assessment for COCS71196 and is therefore compulsory. The assignment is weighted at 50% of

Read More »

Social Media Campaigns (SMC) Spring 2024 – Winter 2024

Unit: Dynamic Websites Assignment title: Social Media Campaigns (SMC) Spring 2024 – Winter 2024 Students must not use templates that they have not designed or created in this module assessment. This includes website building applications, free HTML5 website templates, or any software that is available to them to help with

Read More »

ABCJ3103 NEWS WRITING AND REPORTING Assignment

ASSIGNMENT/ TUGASAN _________________________________________________________________________ ABCJ3103 NEWS WRITING AND REPORTING PENULISAN DAN PELAPORAN BERITA JANUARY 2024 SEMESTER SPECIFIC INSTRUCTION / ARAHAN KHUSUS Jawab dalam bahasa Melayu atau bahasa Inggeris. Jumlah patah perkataan: 2500 – 3000 patah perkataan tidak termasuk rujukan. Hantar tugasan SEKALI sahaja dalam PELBAGAIfail. Tugasan ini dihantar secara ONLINE. Tarikh

Read More »

ABCM2103 INFORMATION TECHNOLOGY, MEDIA AND SOCIETY Assignment

ASSIGNMENT/ TUGASAN _________________________________________________________________________ ABCM2103 INFORMATION TECHNOLOGY, MEDIA AND SOCIETY TEKNOLOGI MAKLUMAT, MEDIA DAN MASYARAKAT JANUARY 2021 SPECIFIC INSTRUCTION / ARAHAN KHUSUS Jawab dalam Bahasa Melayu atau Bahasa Inggeris. Jumlah patah perkataan : 2500 – 3000 patah perkataan tidak termasuk rujukan. Hantar tugasan SEKALI sahaja dalam SATU fail. Tugasan ini dihantar

Read More »

ABCR3203 COMMUNICATION LAW Assignment

ASSIGNMENT/ TUGASAN _________________________________________________________________________ ABCR3203 COMMUNICATION LAW UNDANG-UNDANG KOMUNIKASI JANUARY 2024 SEMESTER SPECIFIC INSTRUCTION / ARAHAN KHUSUS Jawab dalam Bahasa Melayu atau Bahasa Inggeris. Jumlah patah perkataan : 2500 – 3000 patah perkataan tidak termasuk rujukan. Hantar tugasan SEKALI sahaja dalam SATU fail. Tugasan ini dihantar secara ONLINE. Tarikh penghantaran        :

Read More »

ORGANISATIONAL STRATEGY PLANNING AND MANAGEMENT ASSIGNMENT

POSTGRADUATE DIPLOMA IN BUSINESS MANAGEMENT ORGANISATIONAL STRATEGY PLANNING AND MANAGEMENT ASSIGNMENT NOTE: At postgraduate level, you are expected to substantiate your answers with evidence from independent research. INTRODUCTION TO THE ASSIGNMENT • This assignment consists of FOUR compulsory questions. Please answer all of them. • When you answer, preferably use

Read More »

Solution: Scenario 1, Mirror therapy in patients post stroke

Title: Scenario 1, Mirror therapy in patients post stroke Part 1 : Summary Ramachandran and colleagues developed mirror therapy to treat amputees’ agony from phantom limbs. Patients were able to feel their amputated limb without experiencing any pain by presenting them a mirror image of their healthy arm. Since then,

Read More »

Solution: Exploring the Dominance of Silence

Slide 1: Title – Exploring the Dominance of Silence The title, “Exploring the Dominance of Silence,” sets the stage for a deep dive into the portrayal of silence in Philip K. Dick’s “Do Androids Dream of Electric Sheep?” Our presentation will dissect the literary techniques used by the author to

Read More »

Solution: Assessment: Critical Reflection S2 2023

The policies that hampered the cultural survival of Indigenous groups have a major effect on their health (Coffin, 2007). Cultural isolation can cause an identity crisis and a sense of loss, which can exacerbate mental health problems. Indigenous people have greater rates of chronic illness and impairment due to historical

Read More »

Solution: The Market – Product and Competition Analysis

Section 1: The Market – Product and Competition Analysis Industry and Competition Analysis: The baking mix market is very competitive, but My Better Batch is entering it anyhow. The prepackaged baking mixes sold in this market allow busy people to have bakery-quality products on the table quickly without sacrificing quality

Read More »

Solution: PDCA model for Riot

Student Name: Student ID: University Name: Date: Learning Outcome 1: Engage actively in recognizing a new product/service for Riot and detect the vital tasks required for its effective growth. In this comprehensive learning outcome, Riot’s progress towards innovation superiority is characterized by a deliberate scheme that draws on components from

Read More »

Solution: EDEN 100 – ASSIGNMENT 1

Part 1: Reflections on the Register Variables Use the questions in Column 1 and analyse the sample oral interactions provided under the assessment tile. The transcript for Viv’s conversation is provided on pages 4-5. Probe Questions  Link to readings and theory Interaction 1 Interaction 2 PART 1 – ANALYSING THE

Read More »

Solution: TCP/IP Questions

Table of Contents Question 1. 1 1. IPSec datagram protocol 1 2. Source and destination IP addresses in original IP datagram.. 1 3. Source and destination IP addresses in new IP header 2 4. Protocol number in the protocol field of the new IP header 2 5. Information and Bob.

Read More »

Can't Find Your Assignment?

Open chat
1
Free Assistance
Universal Assignment
Hello 👋
How can we help you?