Professional Documents
Culture Documents
This assignment has four questions to be completed. Compile your answers into a Word document
to be uploaded to Study Desk, with or without the optional Excel Spreadsheet in Question 1. Include
your Name, Student Number and course code (CIS8708) in the header of each page and include
references and a bibliography where appropriate.
When submitting your document/s, the file will be submitted to Turnitin for originality checking. You
will be able to see the report come back and can make adjustments if required before resubmitting.
With this data collected, prepare a table or spreadsheet listing vendors in the rows. For the column
headings, list the following features:
● Raw format
● Proprietary format
● AFF format
● Other proprietary formats the tool can read
● Compression of image files
● Remote network acquisition capabilities
● Method used to validate (MD5, SHA-1, and so on)
● Any other comparatives you would like to add such as cost/licensing model, acquisition
speeds based on image format or other features.
Note: if you prefer to do this comparative table in an Excel spreadsheet, which would be acceptable
to submit as a second file.
Write a one-to-two-page report, placing yourself in the shoes of a digital forensics detective for the
local police office (investigating the home computer), and a digital forensics practitioner for the local
business (investigating the work computer). Detail in the report, what you need to do to gather
evidence from each of these computers and what obstacles might you expect to encounter during
the investigation case?
For each question, show the search term that you used and the text/numeric answer to the
question. In conclusion, write an evidence report to the HR investigator to summarise all the things
that you discovered (consider this person to be non-technical and detail the report with this in
mind).
1. Amber Turing was hoping for Frothly to be acquired by a potential competitor which fell
through, but visited their website to find contact information for their executive team. What
is the website domain that she visited? Answer format example: google.com
2. Amber found the executive contact information and sent him an email. What is the CEO's
name? Provide the first and last name.
3. After the initial contact with the CEO, Amber contacted another employee at this
competitor. What is that employee's email address?
4. What is the name of the file attachment that Amber sent to a contact at the competitor?
5. What is Amber's personal email address?
6. What version of TOR did Amber install to obfuscate her web browsing? Answer guidance:
Numeric with one or more delimiter.
7. What is the public IPv4 address of the server running www.brewertalk.com?