Prepared by: Mr. Ahsan Aziz XXXXXXXXXXModerated by: Dr. Ammar Alazab July, 2018 Assessment Details and Submission Guidelines Unit Code BN309 – T2 2018 Unit Title Computer Forensics Assessment Type...

1 answer below »
Assignment computer forencics


Prepared by: Mr. Ahsan Aziz Moderated by: Dr. Ammar Alazab July, 2018 Assessment Details and Submission Guidelines Unit Code BN309 – T2 2018 Unit Title Computer Forensics Assessment Type Individual Assignment Assessment Title Validating and Testing Computer Forensics Tools and Evidence – Part 1 Purpose of the assessment (with ULO Mapping) This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them. a. Systematically collect evidence at private-sector incident scenes. b. Document evidence and report on computer forensics findings. c. Implement a number of methodologies for validating and testing computer forensics tools and evidence. Weight 15% of the total assessments Total Marks 50 Word limit 1500 words max Due Date Friday, 31st Aug, 2018, 11:55 PM. (Week 7) Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using IEEE referencing style. Extension If an extension of time to submit work is required, a Special Consideration Application must be submitted directly through AMS. You must submit this application within three working days of the assessment due date. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy- Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure BN309 IT Computer Forensics Page 2 of 4 Prepared by: Mr Ahsan Aziz Moderated by: Dr. Ammar Alazab July, 2018 Assignment Questions: Objective: The objective of the assignment is to acquire data from a drive, perform data recovery using different techniques and tools, analysing it and finally performing the validation of acquired data. In addition, students are required to properly document all steps in form a report, the report should be formal enough that it can be used in a legal process. Marks will be awarded based on the sophistication and the difficulties of the techniques explored. Case Study: You have been assigned a case of embezzlement. A USB is found from the suspect’s office, and it is expected to have very important information regarding the case. The USB contains several Excel files, a couple of image files and some text files. Assignment Specification: Prepare a report on the following sections related to the case study scenario. You can use your own USB, create/delete files as mentioned in the scenario and perform forensics. Provide the list of references using IEEE referencing style at the end of the report. Section 1: Data Acquisition Prepare a forensic image (bit stream copy) with the record of data deletion. Explain the method and tool you used for acquiring data. You will need this image to perform the consecutive tasks. Please submit this image with your assignment. (200 words) Section 2: Data Recovery The suspect has deleted two image files from the USB, recover the files and explain the method (with screenshots) and tool you used. (200 words) In addition, recover data from recycle bin, explain the procedure with screenshots. (200 words) Section 3: Data Analysis Inspect all files in the USB, use a hex editor and analyse if there is any hidden data in files. Provide screenshots of your analysis. (200 words) Section 4: Data Validation Explain different methods of data validation and use one of them to validate data on USB. (400 words) BN309 IT Computer Forensics Page 3 of 4 Prepared by: Mr Ahsan Aziz Moderated by: Dr. Ammar Alazab July, 2018 Marking Criteria: Questions Description Marks Section 1 Acquiring data using a standard tool Explanation of acquisitions and screenshots 5 5 Section 2 Data recovery from USB and explanation Data recovery from recycle bin and explanation 5 5 Section 3 Data analysis of all file in USB using Hex Editor 10 Section 4 Data validation with explanation 10 Presentation Writing quality, Coherence, Report Structure 5 Reference style Follow IEEE reference style (should have both in-text citation and reference list) 5 Total 50 BN309 IT Computer Forensics Page 4 of 4 Prepared by: Mr Ahsan Aziz Moderated by: Dr. Ammar Alazab July, 2018 Marking Rubric Sections Excellent Good Fair Poor Section 1 Contingency Planning Appropriate requirements of the plan specified explained and Issues identified and listed Requirements for the plan specified and issues identified and listed Not a complete plan with a few requirements and issues Did not address sub sections of the section Section 2 Security Tools Addressed the three tools explained briefly as to how they work and the cost analysis explained Addressed the three tools however with minimum explanation with cost analysis Three tools selected but not explained and not provided a enough explanation for the justification of cost analysis Not a complete list of security tools and missing explanation of cost analysis Section 3 Information Security Act Explained the act and the important key points Provided an idea about the act with the key points Did not provide a clear picture of the act with the key points included Missing explanation and key points Section 4 Security Management Policy Addressed all the seven sections of the policy with necessary explanation Addressed all the sections and managed to explain the requirements of the policy Addressed all sections with minimum information Missing sections from the policy (Incomplete)
Answered Same DayAug 16, 2020

Answer To: Prepared by: Mr. Ahsan Aziz XXXXXXXXXXModerated by: Dr. Ammar Alazab July, 2018 Assessment Details...

Meenakshi answered on Aug 27 2020
126 Votes
Facilitate Business Analysis- ICTICT809 – Written Activity
[Type text]
Graduate Diploma of Telecommunications & Network Engineering
ICT80415
Facilitate Business Analysis
ICTICT809
Written Activity
Rashikala Weerawarna
201089076
02.08.2018
Facilitate Business Analysis- ICTICT809 – Written Activity
Executive Summary
In this paper we research about the telecommunication business model and tools. Our company is Telecommunication Company, the name is AAA. In this paper we discuss about how to work the company. What kind of business tool we use it. In this paper we discuss about the telecommunication service
company requirement that is automated system that will provides all the telecommunication services by one click and of this project will provide to automate the services. The system requirement is hassle free system that will help to company staff and customer. In this paper we discuss about the telecommunication service requirement and to ensure that the new network system works efficiently. In this paper we complete study about telecommunication service provides company requirement and analysis.
Contents
Introduction
Business Model
Propose System
Hardware Requirement
Operating System Requirement
Data base
Compatible Solution
Cost Benefit Analysis
Conclusion
References
Introduction
In this paper we discuss about the AAA telecommunication company. This paper will complete discussion about the best business model and their tool .The paper will discuss the various cellular technology and cost analysis table. The companies propose model is combination of two GSM and CDMA. This cellular technology will be called CDMIX. The paper discuss about CDMIX that propose network is faster, efficient encrypted and secure .
Business model and tool:
There are various tools that are helping to prepare business model .Some business model tools are free of cost
BM Designer
BM Designer is free tool. The functionality of designer tool is as follows:
1. Embeddable web-page
2. Highly interactive UI
BMFiddle
This is another tool that is free of cost and the functionality of tools is
1. Very attractive
2. JS based UI
3. Pretty colors
4. Markdown support.
Canvanizer
This is a free too and for working with tool requirement is enter the email. This is very excellent and provide canvas history reply tool
The Multiple canvas templates will provide
1. Business model
2. Lean
3. Swot
Lean Canvas
This business tool is very good canvas UI.
The cost is between $12 and $49/monthly.
The Business Model Canvas is a simple tool to create, analyze and optimize business models. In this paper we discuss about telecommunication model. The communication play a vital role in business model In addition, a team needs to communicate the business model to outsiders constantly — be it the CEO, strategic partners or an investor. Everyone has to know where the ship is headed in order to actively participate in reaching the goal.  Not long ago the business model was seen as something that only a chosen few had to know and understand. The new way Business Model Canvas is a tool that is for preparing faster and help business model so stakeholder easily understand the business model The project has been divided into four modules Applications, Entries,, Enquiries and Complaints.
Application module: this model provides the service given below.
1. Anyone person could be applies for a new connection by filling the form.
2. Customer can request for transferring the connection if the customer is not satisfied the connection than he can cancel the phone connection.
3.    It can modify the mode of bill payment.
Entries module: This model provides the below services.
1. Customer can request for change the connection number, we will enter the old number and it provides the new connection number.
Enquiries module: this module provide the below services.
1. The customer could be request about his bill.
2. We can check the information regarding the change numbers.
3. We could be enquiry regarding the status of the applications.
Complaints module: this modules has given this services.
1. In this module customers can complaint about the services.
Business processes
In this research we discuss about the business process and IT system. When the business processes and IT systems are outdated for a business that is of a global scale, it can seriously hamper the performance of the organization leading to high costs. The client who is a leading telecom and communication services provider faced a similar challenge with their legacy billing system which needed an overhaul. The existing billing system, though functional, could not perform on different billing models and lead to high latency bringing down the value of their business. 
The telecommunication company provides the facility for faster response is cellular network as this type of network is efficient working with the help of scarce frequency resources.
These are Communication technology
1. GSM
2. CDMA
3. UMTS
4. LTE
5. Adaptive communication
Our company provides dual band service that known as CDMIX that is combination of CDMA and GSM .Our company service s includes video communications, for this purpose we work together with Polycom. Polycom is helping us to install the largest IP video communications network. GSM security level is high so no one can easily broken the security of GSM. CDMA model speed is fast. We used the Combination of GSM and CDMA model. We used the A5, A8 and A3 algorithm for the security purpose. We are using the link in forward and backward for cellular network. GSM security is based on A3, A5, and A8 algorithm. This algorithm is securing the GSM model by default.
Our company provides lots of services in telecom sector customers as follows
1) Request for a new connection
2) Change of number
3) Billing
4) Customer response System
Proposed System
In this assignment or paper we discuss about the old system that is manual system we need a system that will provide all telecom sector services automated on web or online .The our new system will be web base system so that telecommunication service will be globally and...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here