Premium Essay

Assignment 4 Computer Forensics Tools

In:

Submitted By djackson121212
Words 1005
Pages 5
Assignment 4 Computer Forensic Tools
Derek Jackson
Computer Crime Investigation
Professor: Dr. Jessica Chisholm
03/06/2016

When purchasing computer forensics tools and resources for a company, you always want to make sure you are doing the necessary research and determining which of these programs are the best options for the company. This is very important job in any company as you are in charge of not only protecting the company’s data with these tools, but also recovering any information that may have been lost or deleted. There are many programs that are available that can be used to recover deleted files. Two of the programs that you could use are the MiniTool Partition Recovery and PC Inspector File Recovery. The MiniTool Partition Recovery is a free program that has a wizard-based interface which makes it very easy and straightforward to use and understand. You can point the MiniTool Partition Recovery at the problem drive, specify the area to be searched, and it will scan for the missing partition. Then a report will generate that will let you know what the program has found, and you can then recover that partition in a few seconds typically. The only downfall is that you won’t get a bootable recovery disk, so if the partition is damaged then the MiniTool Recovery program won’t be able to recover the deleted partition. The PC Inspector File Recovery allows you to be able to recover a full set of missing files on both FAT and NTFS drives. They are clearly presented in a simple folder view and there is also a simple search dialog to help you locate the files by name. The program can then restore them to local or a network drive. There are quite a few tools that can be used to gather digital evidence from a cell phone. Two tools that can be used are the Fernico ZRT 2 HD and the Paraben Deployable Device Seizure. The Fernico allows you to

Similar Documents

Premium Essay

Forensic Computing Practice Case Study

...SCHOOL OF COMPUTING Bachelor of Computer Science / Bachelor of Software Engineering Forensic Computing Practice Assignment 2 Student declaration: I declare that:  I understand what is meant by plagiarism  The implication of plagiarism have been explained to me by our lecturer This assignment is my own work. Name ID 1)Nicholas Tan Tian Shen 0307878 Forensic Computing Practice Assignment 2 Due Date : Soft-copy submission on 10/11/14. Individual Assignment Question 1 a. What can a cloud provider do in terms of providing digital forensics data in the event of any legal dispute, civil or criminal case, cyber-attack, or data breach? Cloud provider need to provide the evidence by being forensically ready. To...

Words: 3104 - Pages: 13

Premium Essay

Advance Issue in Ict

...| | | | | | Course Synopsis The course contains current issues in Information and Communication Technology that focus on the area of information science, computer networking, multimedia, medical informatics and information security and computer forensic. Exposure through visitation, events, and seminar will be implemented in this course in order to obtain the global technology as it is impacting all walks of life all over the world. Course Objectives The objectives of this course are: * To expose students to the various area in IT through visitation and events. * To provide a series of seminar in order to gain current issues and trends in ICT. * To develop a knowledgeable and skilled computer professionals guided by the needs of companies and employers. Learning outcomes * Present verbally on current issues in different areas of information and communication technology through group presentation and discussions. * Summarize the latest technology offered in order to solve the real world problem. * Document the finding on current issues and trends in ICT from the series of seminar attended and visitation organized. Recommended/Required Materials Main Reference(s) | Newspapers, magazine, articles, journals, research paper | Course Assessment Participation | : | 5% | Assignments/Project | : | 45% | Final Examination | : |  50% | Total: | 100% | Course Requirements & Policies   Example: You are expected to fulfill the following...

Words: 832 - Pages: 4

Free Essay

Digital Forensic Investigation Bsc Submission

...Assessment Criteria (Marks Breakdown) Please note that during the preparation of your assignment documentation, you must include the following marking table. Ensure you fill in the details of your full name and student ID. Name/ Student ID: Preperation of the executive summary and legal warrants (10) Documentation (10) Conclusions/recommendations (10) Referencing (10) Evidence identification and preservation (15) Critical analysis and evaluation of the case (15) Q&A session during presentation (30) Total (100) The marking table must be placed on a single page, located as either the second or third page of your final assignment documentation.   Contents EXECUTIVE SUMMARY 2 AUTHORIZATION 3 IDENTIFICATION 4 COLLECTION AND PRESERVATION 5 Mr. Mike’s Work-Station 5 TTBANK Server 5 CHAIN OF CUSTODY FORM 7 EXAMINATION AND ANALYSIS 8 EVIDENCES RECOVERED 8 RECONSTRUCTION 11 RELATIONAL ANALYSIS 12 CONCLUSION & RECOMMENDATION 13   EXECUTIVE SUMMARY This is the case involving the staff of TTBANK that was suspected of misuse of company property due to that staff bragging about gaining access to privileged information to his colleagues that he should have otherwise not have gotten access to. The issue first came to the attention of Mr. Ali, the Enterprise Systems Administrator of TT Bank who had investigated silently to discover the identity of the staff and that the person was a member of the Loans Department and his name was Mr. Mike...

Words: 1635 - Pages: 7

Free Essay

Lab #10 Securing the Network with an Intrusion Detection System (Ids)

...(IDS) is installed on a host machine, such as a server, and monitors traffic to and from the server and other items on the system. A network-based IDS deals with traffic to and from the network and does not have access to directly interface with the host. Intrusion detection systems are alert-driven, but they require the information systems security practitioner to configure them properly. An IDS provides the ability to monitor a network, host or application, and report back when suspicious activity is detected, but it does not block the activity. In this lab, you will configure Snort, an open source intrusion prevention and detection system, on the TargetSnort virtual machine and the Web-based IDS monitoring tool called Snorby. You also will use the OpenVAS scanning tool to scan the...

Words: 3209 - Pages: 13

Premium Essay

Research Topic of Interest

...NORTHCENTRAL UNIVERSITY ASSIGNMENT COVER SHEET Learner: Uchendu, Prince | | BTM7102 | Dr. Dmitry Eremin | | | Research Topics of Interest | Assignment 2 | | | Although the main task instructions did not include the turning in of the 8 to 10 topics of interest list required, but it did not exclude its submission either. So I decided to add it at the end of the document post reference section. It can be disregarded if it does not need to be considered as part of the main task submission requirement. Thank you. ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Faculty Use Only ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- ------------------------------------------------- Dr. Randy Brown Annotated Biographies Oreku, G. S., & Li, J. (2009). End user authentication (EUA) model and password for security. Journal of Organizational and End User Computing, 21(2), 28-43. Retrieved from http://search.proquest.com.proxy1.ncu.edu/docview/199920202?accountid=28180 This article proposes an End User Authentication flexibility...

Words: 2303 - Pages: 10

Free Essay

Organic vs Inorganic

...Organic versus Inorganic Jeremy Merritt CRJ 311 Forensics Instructor Janice Bella March 4, 2013 Organic versus Inorganic Growing up as a kid I was forced to watch the television shows my parents enjoyed. During that era murder mysteries were extremely popular. Shows like Jake and the Fatman, Colombo, Matlock, and Murder She Wrote just to name a few. None of those shows relied heavily on science per say, moreover, those shows were written with the most insignificant clue becoming the one piece of evidence that is the key to the whole case. Just as dated as those television shows, so is the investigative practice. Present day, almost all investigative crimes involve the collection of forensic evidence that is broken down into two categories: organic versus inorganic evidence. This paper will detail the differences between organic and inorganic evidence, explain the strengths and weaknesses of each, and breakdown the significance of either organic or inorganic evidence as it travels through the justice system from the crime scene to prosecution. The way evidence collected can be broken down into two categories; organic and inorganic. According to Saferstein (2011), “Organic substances contain carbon, commonly in combination with hydrogen, oxygen, nitrogen, chlorine, phosphorus, or other elements. Inorganic substances encompass all other known chemicals substances. Each of these two broad groups has distinctive and characteristics properties (p. 123, Para 3). In laymen’s...

Words: 1197 - Pages: 5

Free Essay

Today’s Risk of Fraud: Forensic Accountants Help Protect Identity Theft

...Risk of Fraud: Forensic Accountants Help Protect Identity Theft Megan Laughman Financial Accounting Theory Michael Miller 4/7/15 Abstract The purpose of this study is to explore the recent cyber breaches that have occurred within companies throughout the United States and to look at the different ways these cyber breaches could have been prevented. The research also examines the need for forensic accountants within the business field, as they are able to help protect a company’s credibility and reputation. The study looks at the different internal controls a forensic accountant can incorporate into a company to help prevent cyber breaches and fraud from taking place. The results of the research provide confirmation that forensic accountants are essential in every company in order to help prevent and detour cyber breaches and fraud. Table of Contents Introduction……………………………………………………………………………………4 Literature Review………………………………………………………………………………7 Data Analysis........................................................................................................................…...14 Results and Conclusion…………………………………………………………………………17 References………………………………………………………………………………………19 Today’s Risk of Fraud: Forensic Accountants Help Protect Identity Theft Introduction Technology today is more advanced than it ever has been and almost everyone this day and age owns a computer, tablet, or smart phone. Most Americans utilize their computers, tablets, or phones...

Words: 4916 - Pages: 20

Premium Essay

Term Paper

...Journal of Forensic & Investigative Accounting Vol. 4, Issue 2, 2012 The Obvious Fraud: A Short, Problem-Based Case Study to Highlight Inappropriate Fraud Examination Techniques David O’Bryan Jeffrey J. Quirin* INTRODUCTION Assume you are an internal auditor for a large, multinational, manufacturing organization with a division in Mexico. One of your responsibilities is to investigate allegations made on the company’s fraud hotline. When you arrive at work one morning you learn an anonymous tip was left on the hotline that alleges fraud involving the division manager. “Pat’s significant other is a fraudulent vendor,” was the anonymous tip left on your company’s fraud hotline. Pat is a division manager at your company. “Wow. I can’t believe this guy is so blatant,” you’re thinking as you review some accounts payable invoices while following up on this anonymous tip. The invoice that caught your attention is shown in Table 1. A quick search of the AP file reveals a total of three invoices like the one in Table 1, all for identical amounts but on different dates. The division manager, Pat, has the authority to approve payment of invoices for less than $10,000. It is obvious to you that the manager has a created a shell company. You happen to know that Pat’s significant other is named Kim, hence the name Kimco Marketing. There is no documentation to support these transactions other than the invoices, all of which are purportedly for marketing services. * The authors are, respectively...

Words: 3900 - Pages: 16

Premium Essay

Forensic Accounting

...value of their company. Forensic accountants are becoming much needed as accounting frauds, financial scams, and various economic scandals are beginning to increase globally. This type of accountant does more than the typical accountant of a business or corporation, because their objective is to investigate fraudulent activities being used in the accounting departments of these companies. The amount of fraud being used by companies globally is most likely going to increase in the future as technology is evolving and scammers are getting more creative. This will also lead to a gradual decrease in the investment rates in companies, because the risks of investing in a corrupt business world will outweigh the benefits. Potential investors in companies using creative accounting techniques will increasingly become more at risk if there is no exponential growth in the field of investigative accounting. Accounting scams are becoming a part of the normal occurrence of day to day activities as this type of fraudulent activity is frequently gaining exposure in the daily news worldwide. As owners and managers conceal the financial state of their companies by manipulating their financial statements, the reliability and trust of these statements by investors are decreasing. Illegal accounting procedures are not being presented solely in America, but in other countries as well. In those countries with high rates of corruption, individuals specialized in the area of forensic accounting can have...

Words: 1908 - Pages: 8

Premium Essay

Forensic Accountant

... 05/19/2013 05/19/2013 forensic accountant CONTEMPORARY BUSINESS forensic accountant CONTEMPORARY BUSINESS 125/19/20135/19/20135/19/2013 fraud busters In today’s world, it is knows by everyone that different developments were taken place in the last periods. Our globalized world in a state of continuous technological change and innovations has been challenged by new generation criminology risk factors. From business, government, regulatory authorities, and the courts evidence indicates that a higher level of expertise is necessary to analyze current financial transactions and events. Forensic accounting is a specialized area of an accounting practice that describes engagements which results from actual or anticipated disputes or litigations. Forensic accounting has been defined as accounting analyzers that can uncover possible fraud that is suitable for presentation in court. A Forensic accountant needs accounting, law, finance, investigative and research skills to identify and prevent fraud. Forensic accountant uses her/his knowledge of accounting, law, and criminology to uncover fraud, as well as gather any evidence and present it to the court....

Words: 2300 - Pages: 10

Premium Essay

Forinsic Accounting

...A Project Report On “Forensic Accounting And Auditing” Submitted By Durvesh S. Naik Roll No: - 6025 MCOM PART-II (Advanced Accountancy) 2014-15 MULUND COLLEGE OF COMMERCE SAROJINI NAIDU ROAD, MULUND (W.) MUMBAI-80 SUBMITTED TO UNIVERSITY OF MUMBAI ACADEMIC YEAR 2014-15 DECLARATION I Durvesh Naik student of Mulund College of Commerce, S. N. Road, Mulund (W.) Mumbai – 80 of Mcom Part II (Advanced Accounting) Seat no: - 6025, hereby declare that I have completed the project on the title “Forensic Accounting and Auditing” during the academic year 2014-15. The information submitted is true and best of my knowledge and belief. Date of submission: - Signature Place:- Parle Tilak Vidyalaya Association's MULUND COLLEGE OF COMMERCE Sarojini Naidu Road, Mulund West, Mumbai 400080. Certificate This is to certify that Mr. __________________________________________________________ Of Mcom. Part II (Advanced Accountancy) Semester _______ has undertaken completed the project work titled _________________________ ______________________________ during the academic year __________ under the guidance of Prof. ______________________________________. Submitted on _________________ to this college on the fulfillment of the curriculum of Mcom (Advanced Accountancy) University of Mumbai. This is a bonafide project work & the information presented is true/ and original to the best of our knowledge...

Words: 8287 - Pages: 34

Premium Essay

Wk 3 Lab

...exploitation Overview This Lab will demonstrate a Cross-site Scripting (XSS) exploit and an SQL Injection attack on the test bed web application and web server using the Damn Vulnerable Web App (DVWA) loaded on an Apache Web Server on “TargetUbuntu01” Linux VM server. They will first identify the IP target host, identify known vulnerabilities and exploits, and then attack the web application and web server using XSS and an SQL Injection to exploit the web application using a web browser and some simple command strings. Assignment Requirements Watch the Demo Lab in Learning Space Unit 5 and then answer questions 1-10 below. Lab Assessment Questions & Answers 1. Why is it critical to perform a penetration test on a web application prior to production implementation? 2. What is a cross-site scripting attack? Explain in your own words. 3. What is a reflective cross-site scripting attack? 4. What common method of obfuscation is used in most real world SQL attacks? 5. Which web application attack is more prone to extract privacy data...

Words: 1054 - Pages: 5

Premium Essay

Paper

...File Version: 16.5 http://www.gratisexam.com/ Exam Code: 312-49 Exam Name: Computer Hacking Forensic Investigator Practice Testw CHFI-1-105 QUESTION 1 When a file or folder Is deleted, the complete path, including the original file name, Is stored In a special hidden file called "INF02" In the Recycled folder. If the INF02flle Is deleted, It Is re-created when you _______ A. B. C. D. Restarting Windows Kill the running processes In Windows task manager Run the antivirus tool on the system Run the anti-spy ware tool on the system Correct Answer: A Section: (none) Explanation Explanation/Reference: A QUESTION 2 Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for Images with up to 256 distinct colors per frame. A. B. C. D. 8-bit 16-bit 24-bit 32-bit Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 3 The IIS log file format is a fixed (cannot be customized) ASCII text-based format. The IIS format includes basic items, such as client IP address, user name, date and time,service and instance, server name and IP address, request type, target of operation, etc. Identify theservice status code from the following IIS log. 192.168.100.150, -, 03/6/11, 8:45:30, W3SVC2,SERVER, 172.15.10.30, 4210, 125, 3524, 100, 0, GET, / dollerlogo.gif, A. B. C. D. W3SVC2 4210 3524 100 Correct Answer: D Section: (none) Explanation Explanation/Reference: QUESTION 4 International Mobile Equipment Identifier (IMEI) is a 15-digit number that indicates...

Words: 11383 - Pages: 46

Premium Essay

Leafc

...Module Learning Outcomes for this assignment: 1. Evaluate and interpret evidence and generate resulting reports that are coherent and compliant with law and sympathetic to social and ethical standards. 2. Critically evaluate case studies and analyse evidence gathered from simulated realistic incidents. Scenario Ms. Conlay, a sales representative of CC Terminals has complained that Mr. Lawrence, another sales representative of CC Terminals, has been harassing her. She has indicated Mr. Lawrence has made several romantic advances, attempting to contact her both at work and during off-hours, and that his emails have been getting increasingly aggressive. When Ms. Conlay allegedly saw Mr. Lawrence show up while meeting a friend at an out-of-the-way coffee-shop, she contacted security the following day. The first responder team in CC Terminals investigated the computer device found during an off-hours search of Mr. Lawrence's cubical and analysed its contents. The first responder team recovered several documents and computer programs from the USB storage device which further indicate Mr. Lawrence's advances, aggression, and illegal activities. Based on their findings, apparently Mr. Lawrence typed his emails to Ms. Conlay in Microsoft Word and saved them as Word documents on this USB device before sending the emails. They found three letters apparently to Ms. Conlay. One asked her out to dinner. The second was a response to her apparently telling him to “get lost”...

Words: 1182 - Pages: 5

Free Essay

History of Digital Crimes and Digital Terrorism and Their Common Current Forms

...History of Digital Crimes and Digital Terrorism and Their Common Current Forms Stephanie Fisk Strayer Universality CIS 170 Professor CIANCIOTTA Dec. 12th, 2013 Introduction Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Net crime refers to criminal exploitation of the internet. Dr. Debarati Halder and Dr. K. Jaishankar (2011) defines cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as internet chat rooms, emails, notice boards, groups, and mobile phone. Such crimes may threaten a nation’s security and financial health. Problems surrounding these types of crimes have become high profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. Internationally, both governmental and non-state actors engage in cybercrimes, including espionage, financial theft, and other cross-border crimes. Activity crossing international borders and involving the interests of at least one nation state is sometimes referred to as cyber warfare. The international legal system is attempting...

Words: 2411 - Pages: 10