Access over 20 million homework & study documents
search

IT 336 Securing Evidence & Acceptable Use Policy Worksheet

Content type

User Generated

Subject

Law

Type

Worksheet

Rating

Showing Page:
1/24
IT 336 Final Project
The final project is broken into 3 different parts (section 4 is
optional and worth 5 extra credit points).
This is all open book, open source, and open notes.
The material is from the textbook and other references
materials used throughout the course.
You will need access to a hexadecimal editor (prefer WinHex,
but if not, then let me know what hex editor software you
used)
You will need access to steganography software in order to
complete a portion of the lab (I suggest Quick Stego, but you
may use anything you like:
https://download.cnet.com/QuickStego/3000-2092_4-
75593140.html).
There are a couple other software applications you will need to
download, but the instructions/URLs are embedded in the final.
You will need access to evidence. I will be giving you the
evidence on Canvas. You will see underneath the “Final
Project” Module Heading that there are different pages for the
“USB,” “DVD,” and “Deleted File To Use with Disk Drill-2”. Here
you will find all the evidence you need for this final project.
You will also find the templates for different documents
underneath “Final Project Tools, Templates & Software-2.”
The final is worth 175 points

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/24
Deliverables: Screenshots (when requested), journal notes,
and written papers as directed.
Part 1 Getting Started: Evidence Tags, Chain of Custody, and
Search Warrants (worth 25 points total)
Tools/Resources Needed: evidence tags, a blank search warrant
(both found under Final Project Templates & Documents in
Canvas).
Scenario 1a: You are a new digital forensics investigator. This
is your first investigation and you do not want to screw it up.
You come into the office on 28 February and your supervisor
informs you that she has a case for you start investigating. The
case is a bit sketchy. First, there is some intellectual property
that has been stolen from a start-up company known to have a
secret recipe for an “anti-aging serum.” Greta Jean was the
mastermind behind this new serum. She was brilliant, but had a
bit of temper and went off on the CISO after he told her she
cannot be buying and selling stocks during work hours on the
company computer. She storms out of the office yelling back to
the CISO, “if I cannot do what I want here in this s&(T hole, then
I’m leaving!” This was a concern to the CISO so he told the
network administrator to lock her account and that she was not
able to get to the data unless under direct supervision from
himself.
Unbeknownst to the CISO and others in the company, Greta
had already downloaded the secret serum onto a USB. You

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/24

Sign up to view the full document!

lock_open Sign Up

Unformatted Attachment Preview

IT 336 – Final Project The final project is broken into 3 different parts (section 4 is optional and worth 5 extra credit points). This is all open book, open source, and open notes. The material is from the textbook and other references materials used throughout the course. You will need access to a hexadecimal editor (prefer WinHex, but if not, then let me know what hex editor software you used) You will need access to steganography software in order to complete a portion of the lab (I suggest Quick Stego, but you may use anything you like: https://download.cnet.com/QuickStego/3000-2092_475593140.html). There are a couple other software applications you will need to download, but the instructions/URLs are embedded in the final. You will need access to evidence. I will be giving you the evidence on Canvas. You will see underneath the “Final Project” Module Heading that there are different pages for the “USB,” “DVD,” and “Deleted File To Use with Disk Drill-2”. Here you will find all the evidence you need for this final project. You will also find the templates for different documents underneath “Final Project – Tools, Templates & Software-2.” The final is worth 175 points Deliverables: Screenshots (when requested), journal notes, and written papers as directed. Part 1 – Getting Started: Evidence Tags, Chain of Custody, and Search Warrants (worth 25 points total) Tools/Resources Needed: evidence tags, a blank search warrant (both found under Final ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Just what I needed…Fantastic!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4