¶ … Assurance and Security (IAS) Digital forensics (DF)
In this work, we take a look at three laboratory-based training structures that afford practical and basic knowledge needed for forensic evaluation making use of the latest digital devices, software, hardware and firmware. Each lesson has three parts. The duration of the first section of the three labs will be one month. These labs would be the largest labs. The Second section would consist of smaller labs. The training period duration in these labs would also generally be one month. The third section would consist of smallest labs. The duration of training period in these labs would be one week. The training will be provided in the field of software, programming concepts, flowcharting and algorithms and logical reasoning- both linear and iterative.
Part 1 Larger Labs:
Lab 1(Timeline Analysis)
Purposes and goals of the Lab (Lab VI):
Use MAC (Media Access Control, internet adapter physical address) to extract time-stamped event progress
- Analyze timeline for extracting proof.
Concepts of IAS/DF ( Internet Authentication Service (related to Microsoft) / Digital Forensics)(Lab VI):
Creating a time-stamped sequence to analyze and access of files.
Software Needed: MAC (Microsoft) and Linux-Forensics
Skills Needed: Timeline concept- uses and applications
Main Tasks/Procedures (Lab VI):
Extract Media Access Control (MAC) Times for the files marked Unallocated and Allocated Files
Obtain MAC Times for Unallocated Inodes
Extracting the Timeline with MAC time
Creating a Time-stamp using Autopsy
Expected Outcome: It is expected that the writer express his analysis of the Timelines generated for the possible sequence of events.
Suggested grading criteria: 1) The analytical expression and capability of the student
2) Testing the students on following queries:
From analysis of MAC times, is it possible to determine each instance of access or modification of a particular file? Support your answer with reasoning. (Lab VI)
Explain the significance of MAC times of the unallocated files?
What information of importance does the uptime give the hacker? (Lab VI)
Possible Bonus Work and points: The trainee demonstrates the timeline methodology to the class with his own inputs.
Duration of lab: One month (Trainees should work in pairs and gradually improve upon their timeline skills and retrieval acumen during the course of one month).
Suggested Courses: Digital Electronics Advanced Computer Science,, Communication Theory Advanced Digital Forensics, advanced Digital Forensics, and MAC Forensic Analysis
MAC analysis for Forensic sciences helps to prepare the timeline of the access of files and can hence be a concrete proof of the sequence of events. The physical address pointing to communication modem is a very effective tool for establishing of communication.
Lab 2 (File Recovery: Meta Data Layer)
Purpose and Goals of the Lab: (Lab IV)
- The Meta data for search list entries can provide vital information like properties and encryption. Students are expected to find all such information for evidences.
- Using information in Meta data for evidence, extract a specific file.
- Use of Autopsy Forensic Browser (Linux-based graphical interface) at the Meta data layer (Lab IV)
- understand the 'delete' ramifications when used in other file handling systems when you are at the Meta data layer.
IAS/DF Concepts Covered: File Recovery
Software Needed: Linux and SLEUTHKIT TOOLSTAT/Autopsy Forensic Browser (Lab IV)
Skills Needed: knowledge of meta data and SLEUTHKIT, basic computer skills; how data is stored and different file systems, and file recovery in different file systems
Main Tasks/Procedures: (Lab IV)
Launching the "Linux - Forensics" virtual machine.
-locate the index node (inode) using the Block number.(Understand the data structure system)
Use Meta Data Information to recover files.
Using Autopsy browser a graphical interface in HTML at the Meta Data Layer
Understanding Meta Data on Different (EXT1, EXT2, EXT3…) File Systems
Expected Outcome: connecting the information gained to recover a file using meta data information and meta data layer understanding.
Suggested Grading Criteria: test based on the following questions will be used to grade the students (Lab IV):
1)
Use search word 'keyboard' to recover file05 which is a MS word document. List all the steps that you'll take. Which block in the image will the 'keyboard' be located?
2)
What would it mean if stats showed the index node ( inode) is shown as being allocated, by stats, what does it mean? What would you infer if it was shown unallocated? Would you infer that the inode being viewed is...
High School Longitudinal Study Dataset Using SPSS Software Scenarios 1. This section determines African citizen's perceptions about their current level of democracy. The study uses 2015 Afrobarometer data to determine whether the current level of African democracy is statistically different from the value of 6. Have series of reforms increased African views on the level of democracy? The study uses the following variables to answer the research question: Level of democracy: ten years ago
Accounting and Finance Henkel AG is a multinational company focusing its brand and technologies in three business areas that include Beauty Care, Laundry & Home Care and Adhesive Technologies. Established in 1976, the company holds its global market positions in both the consumer and industrial products with well-known brands that include Lactate, Persil, and Schwarzkopf. Henkel's headquarter is in Dusseldorf in German and the company has over 47,000 employees globally. Typically,
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now