You are on page 1of 3

Executive Summary (3 marks)

The purpose of digital forensics is to gather and analyse digital evidence such that it may be processed
quickly or with minimal forensics expertise. The most analytical part provides us with the law
enforcement inquiry to the digital forensics. Digital forensics can deal with including investigations
and data analysis for the instruments used in those investigations. A digital forensic investigation
action plan is included in the medium. Data transmission and storage are done online. Additionally, it
explains how to extract data from illegible or captured devices and aids in determining the likelihood
that a crime would be recorded within a particular time log of the data log in the timestamp of the
data provided online. This study discusses and presents some similarities between the investigation
approaches that can be applied.

1.0 Introduction (3 marks)


The scope of digital forensics is clarified in this section. Computers and other digital devices now have
significantly more capabilities, enabling faster and better data management processes as well as faster
data transport and storage speeds being completed information presented in a unique way. Data
manipulation makes theft more likely. Where the victim or the victim has limited information to
withdraw money or threaten the victim for selfish reasons, a person with basic computer and IT skills
who has malevolent intent can cause great harm to a corporation or a country. Can. Evil motive.

2.0 Analysis Conducted (3 marks)


Superior Cycles, Inc. It is a well-known bicycle company in this instance. Tom Johnson, a close cousin
of the fired Jim Shoe, has been named as the newly recruited secret data leak incident the
organization's explanation for this incident. Therefore, it might be a hint of a data breach at the
company, which would undermine Jim Shoe's edge over rivals and prevent him from committing a
crime to obtain the company's private data Thompson Tom. Jinshu is accused of purchasing Superior
Cycles, Inc. for its project, which was created using material that was initially taken from the business.
The bid was submitted by respected client Bob Aspen, an investment in the business. It illustrates the
organization's perverse goals. Superior Cycles Inc. sells gym shoes gaining financial gain by luring
investors to KK and upsetting its capital investment and sales. The information transferred between
clients and corporate leaders, however, allowed for the detection of the plot well before the firm
executives began the real implementation. Additionally, Chris Robinson, an IT executive, has some
secret information on the USB drive that is physically present on Tom Johnson's desk at work.

3.0 Findings (5 marks)


3.1 Specific files related to the request
The multimedia file that was obtained as part of the insider attack may contain information on
Superior Cycles, Inc. For the forthcoming project's design, there is a graphic image. This is allegedly
proof of a JPEG-format digital image file to take out of a USB device. The email's time stamp serves as
a clue as to when the event is supposed to take place. Additionally, the recovered files' resemblance
to the email attachments from the USB drives can be used as supporting documentation for the
incident.

3.2 Other files, including any deleted files that support the findings
The inquiry reveals that the necessary credentials are not kept on the USB device in a file format like
a digital image; instead, the information connected to the digital photo is concealed in another file so
that it is not the default to the file system open directly by the administrator The operation is carried
out with the use of a method known as steganography.

3.3String searches, keyword searches, and text string searches


Steganography: A method for concealing sensitive information in plain text within a file or message to
prevent its disclosure. When required, secret information is retrieved from the mysterious file. The
word "steganography" comes from the Greek verb "steganos," which means "to cover or conceal."

Steganography has advanced significantly in recent years thanks to advancements in computing


power that enable new methods of concealing information in other data. The military first employed
this technique to maintain covert radio communication because to the strategic significance and
necessity of secret communication to shield sensitive information from adversaries. Sadly, it is also
being utilized for online crimes, including ours. An intruder may use data that is unintentionally visible
to conceal communications.

3.4 Internet-related evidence, such as Web site traffic analysis, chat logs, cache files,
e-mail, and news group activity
There are many different data types where steganography can be applied. Common file formats
include.doc, .gif, .jpeg, .mp3, .txt, and .wav. TEs are typically used to store files for general use. They
are simple to utilize with steganographic tools that make use of straightforward data formats. These
formats are also widely used because they may be stripped of extraneous or distracting data and
replaced with secret messages.

3.5 Indicators of ownership, which could include program registration data.


Many nations have passed legislation to restrict the effectiveness of cryptographic systems and
steganographic tools, as well as to reduce the difficulty of testifying and the risk of abuse in cases of
cybercrime. In other words, Superior Cycles, Inc. The matter is being looked into. Tom Johnson, a
relative of fired Jim Shoe, has been named as a newly hired secret data leaker. So, this can be a sign
of a business data breach when Jim Shoe loses his competitive advantage in order to commit a crime
by accessing private company data. A media file containing the information obtained through the
insider assault may belong to Superior Cycles, Inc. A graphic is present for potential project design.
This will serve as evidence of a JPEG-formatted digital image file.

4.0 Conclusion (3 marks)


Computers and other digital devices now have significantly more capabilities, enabling greater and
faster data processing as well as quicker transmission and archiving. A wicked individual with only
rudimentary computer and IT skills can also do great harm to a corporation or nation whose victim or
victim has little information to withhold from or threaten victims for their own selfish objectives.The
study found that although the USB device has data in a file format like a digital photo, the necessary
credentials are not kept there; instead, the data from the digital photo is concealed in another file.
Steganography is a technique for concealing sensitive information by enclosing it within a single file
or communication. As required, confidential information is gathered from the dark file. Numerous
data formats support steganography. They are simple to utilize with steganographic tools that make
use of straightforward data formats.

5.0 References (2 marks)


You must cite references to all material you have used as sources for the content of your work
6.0 Glossary (Optional)
A glossary should assist the reader in understanding any technical terms used in the report. Use a
generally accepted source for the definition of the terms and include appropriate references.

7.0 Appendices (Optional)


You can attach any supporting material such as printouts of particular items of evidence, digital
copies of evidence, and chain of custody documentation.

You might also like