COIT20267 Computer Forensics
Assessment Specification
Written Assignment — Case study
Due date: 11:45pm AEST, Friday, Week 12 ASSESSMENT Weighting: 45%
3
Length: 3,500 words (excluding title page, ToC and references list)
Objectives
This assessment item relates to the unit learning outcome 1 to 7 as stated on the unit profile.
1. Apply the computer forensics methodologies.
2. Write an analysis of a case study.
3. Prepare an outline of a professional computer forensic plan.
General Assessment Criteria
Incomprehensible submissions. Assessments provide the opportunity for students to demonstrate their knowledge and skills to achieve the required standard. To do this, assessment responses need to be both clear and easy to understand. If not, the University cannot determine that students have demonstrated their knowledge and skills. Assessments will, therefore, be marked accordingly including the potential for 0 (zero) marks where relevant.
Late penalty. Late submissions will attract penalties at 5% for each day or part thereof that it is late of the total available mark for the individual assessment item. This means that, for an assessment worth 45 marks, the mark that you earn is reduced by 2.25 marks each day that the assessment is late (including part-days and weekends).
Check the marking criteria. Before submitting your assignment, you should check it against the detailed assessment criteria included in this specification to ensure that you have satisfactorily addressed all the criteria that will be used to mark your assignment.
Academic Language. All submissions should be thoroughly proof-read for spelling, typographical or grammatical errors before being submitted. Do not rely on the ‘spell-check’ function in your word processing program. If, for example, ‘affect’ is substituted for ‘effect’, your program may not detect the error.
Academic Integrity
All assignments will be checked for plagiarism (material copied from other students and/or material copied from other sources) using TurnItIn (TII). If you are found to have plagiarised material or if you have used someone else’s words without appropriate referencing, you will be penalised for plagiarism which could result in zero marks for the whole assignment. In some circumstances a more severe penalty may be imposed.
Useful information about academic integrity (avoiding plagiarism) can be found at: CQUniversity referencing guides
https://www.cqu.edu.au/student-life/services-and-facilities/referencing/cquniversity-referencing-guides
Submission requirements
Who to submit? For on-campus students, one and only one of the group members needs to submit for the entire group. Distance students need to submit individually.
What to submit? A report in MS Word format (.doc or .docx) needs to be submitted. No other document formats are accepted (no PDF files, Apple Pages, Apple Keynotes or Online Google Doc Link). No Zipped files. Students must not zip multiple files and submit it as one single zip/compressed file.
Means of submission. All assignments must be submitted electronically to Moodle. The submission links can be accessed through the Assessment block on the Moodle unit website. Physical copies/ Email submissions are not accepted.
Auto-submission. Moodle implements an auto-submission process for those items uploaded and left as drafts before the original deadline. However, any assessments uploaded after the original deadline must be manually submitted by the students.
Please note that auto-submission process does not work for assessments which have extensions. Auto submission only works where the original deadline of an assessment has not changed. If you are submitting after the deadline (original or extended), you must complete the Moodle submission process. Further details on completing the submission process are available via the ‘Moodle Help for Students’ link in the Support block of your Moodle pages.
Complete and correct submission. Requests for changing files after the submission deadline may be granted if the Unit Coordinator is contacted. However, if a change of files is allowed by the Unit Coordinator, then the submission time will be taken as the latest time (i.e. when the last update is made), not the original submission time. That will result in a late penalty.
The Case – A Computer Forensic Investigation Plan
This assignment is based on the following case. Please read it carefully:
Creative Minds is a leading technology company in Australia store providing a wide range of computers and office equipment for businesses. The company is established in 2010 and employs 250 employees and serves more than 5000 businesses around Australia. The company has its main office in Melbourne with branch offices in Sydney, Brisbane, Adelaide and Perth.
In order to gain competitive advantages over its competitors, Creative Minds has invested heavily in information technology for supporting its business operations. One of its major investments were made by the company in the 2013, however the management team has lost focus on updating the networks and application infrastructure in recent years. As a result, the network environment among all offices is flat and relatively unrestricted, where users from one office can access systems and servers from another office. Workstations and servers are typically Microsoft Windows based. Firewalls and network segmentation were not properly secured throughout the environment. Intrusion detection and logging were installed on systems, but they were not frequently maintained and thus malfunction.
Due to harassment complaints from several female employees at Melbourne branch, the store IT manager is fired from his job. When the store opened on the next day, the employees found that their computer networks inoperable and their servers erased. The former IT manager was immediately suspected of the crime, but surveillance cameras showed that there is no sign of his entry into the building after he was fired from his job.
As an information security officer, you are asked by the management to form a team of computer forensic investigators and find out the extent of the computer crime. You are tasked to undertake digital forensic analysis of the network and computer systems. This involves conducting a network analysis, gathering digital evidence from servers, PCs and e-mail accounts, conducting a cloud and social media investigations if necessary.
Instructions
Group/Individual assignment. This is a group assignment for on-campus students and an individual assignment for DE students.
Length. For on-campus and DE students, the report is 3,500 words in length, excluding title page, ToC and references list. 10% leeway on either side is applicable.
Assumptions. Students are encouraged to make assumptions wherever necessary subject to two conditions: (1) assumptions should not contradict with the factual information given in the case; (2) assumptions, once made, must be relevant and addressed in your report.
In capacity of a computer forensics specialist, your task is to prepare a computer forensics investigation plan to enable a systematic collection of evidence and subsequent forensic analysis of the electronic and digital data. This plan should detail the following:
1- Justify why the use of the digital forensic methodology and approach is warranted including appropriate procedures for the Company’s investigation.
2- Describe the resources required to conduct a digital forensic investigation, including skill sets and the required software and hardware for the forensics team members.
3- Outline an approach for data/evidence identification and acquisition that should occur in order to be able to identify and review the digital evidence.
4- Outline an approach and steps to be taken during the analysis phase. In particular, explain what would be involved in the network, servers, PCs, e-mail, cloud and social media investigations.
5- Develop relevant security policies for the Company.
6- Provide recommendations to the Company for dealing with similar future problems.
Tips for preparing your computer forensics investigative plan
In writing the computer forensics investigative plan, students need to address following points. Do note that points listed below are not exhaustive and need to be considered as helpful tips.
• Justify a need for computer forensics methodology and consider scope of the case including nature of alleged misconduct leading to consideration of how electronic and digital evidence may support the investigation. The plan should consider how computer forensics differs from other techniques (such as network forensics, data recovery) and detail the overall steps for the systematic computer forensics approach.
• Consider the required resources and include details regarding preparation plan for evidence gathering (such as evidence forms, types, storage media and containers), forensics workstation and peripherals needed, software/tools for analysis depending on the type of evidence to be gathered including rationale for selected tools, and consideration of team member skills in digital analysis (such as OS knowledge, skills for interviewing, consultation, working as per the needs of the auditing team and understanding of law and corporate policies).
• Detail the approach for data acquisition including the different types of evidence that can be gathered and their source depending upon the nature of the case and scope of investigation, develop a plan for data acquisition including rationale for selected plan and contingency planning, detail type of data acquisition tools needed including rationale and an outline for the data validation & verification procedures.
• Provide an outline of the forensic analysis procedures/steps depending upon the nature of evidence to be collected, and detail the validation approach. This can include techniques to counter data hiding, recovering deleted files, procedures for network and e-mail analysis.
• Develop suitable security policies for the Company.
• Provide appropriate recommendations to the Company for dealing with the problems.
• Prepare a professional report with an Executive Summary, a Word generated table of contents, an Introduction, a body of the report with proper headings and sub-headings, and a Conclusion.
• Table of contents for the investigative plan should consider what to include in report, structure of report, focus or scope of the report including supporting material to be provided and references. This table of contents should include headings and sub-headings pertaining to the aspects addressed in the above dot points.
Specifically, your report should include the following sections.
1. Title page: (each) student name (in your group), (each) student number (in your group), (each) student email address (in your group, use CQU email), title of your report, local lecturer/tutor, and unit coordinator. Not counted towards the word count.
2. Executive summary.
3. Table of Contents (ToC): should list the report (sub)sections in decimal notation. Create the ToC using MS Word’s ToC auto-generator rather than manually typing out the ToC. Instructions can be foundhere: https://support.office.com/en-gb/article/create-a-table-of-contents-882e8564-0edb435e84b5-1d8552ccf0c0?redirectSourcePath=%252fen-gb%252farticle%252fCreate-a-table-ofcontentsor-update-a-table-of-contents-eb275189-b93e-4559-8dd9-c279457bfd72&ui=enUS&rs=enGB&ad=GB#__create_a_table. Not counted towards the word count.
4. Introduction.
5. Body of the report (use appropriate headings in the body of the report).
6. Conclusion.
7. Reference list: all references must be in Harvard Referencing Style. Not counted towards the word count.
Assessment criteria
COIT20267 Assessment item 3 – Case study
Criteria Performance levels
Beginning
1 Developing
2 Improving
3 Accomplished
4 Exemplary
5 Score
Justification – Is the justification of “why use of the computer forensic methodology and approach is warranted” sound?
Resources – Are the resources required to conduct a computer forensic investigation completely listed?
Approach – Is the approach for evidence identification and acquisition reasonable?
Steps – Are steps to be taken during the analysis phase reasonable?
Detail – Is the explanation on the validation approach reasonable?
Security policies – Are the policies made appropriate?
Recommendations – Is the recommendation made appropriate?
Table of contents – Is the table of contents professionally prepared?
References – Are the references correctly cited?
Total
Comments:
Marker: Date: