You are on page 1of 29

Institute Code: 0141

Title of Micro project: “Report on Digital Forensic”

Academic Year: 2023-2024 Program Code: IF-6I

Course: ETI Course Code: 22618

Submitted by:

Roll No Student Name Batch Sign of Student

2331 Sarvesh Khade IF-2


2332 Mahesh Marne IF-2

2333 Sahil Mazire IF-2

Under Guidance of: Mr. V.V Shetkar

[1]
Institute Code: 0141
CERTIFICATE

Certified that this micro project report titled “Report on Digital Forensic” is the bonafide work
of Mr. Sarvesh Khade Roll no: 2331 of Third year diploma in Information Technology
engineering for the course: ETI Course Code: 22618 during the academic year 2023–2024,
who carried out the micro project work under my supervision.

Mr. V.V Shetkar


Name & signature of Course Teacher

[2]
Institute Code: 0141
CERTIFICATE

Certified that this micro project report titled “Report on Digital Forensic” is the bonafidework
of Mr. Mahesh Marne Roll no: 2332 of Third year diploma in Information Technology
engineering for the course: ETI Course Code: 22618 during the academic year 2023–2024,
who carried out the micro project work under my supervision.

Mr. V.V Shetkar


Name & signature of Course Teacher

[3]
Institute Code: 0141
CERTIFICATE

Certified that this micro project report titled “Report on Digital Forensic” is the bonafide work
of Mr. Sahil Mazire Roll no: 2333 of Third year diploma in Information Technology
engineering for the course: ETI Course Code: 22618 during the academic year 2023–2024,
who carried out the micro project work under my supervision.

Mr. V.V Shetkar


Name & signature of Course Teacher

[4]
ALL INDIA SHRI SHIVAJI MEMORIAL SOCIETY’S
POLYTECHNIC, PUNE -01
Information Technology Department

VISION AND MISSION OF THE INSTITUTE


• VISION:
Achieve excellence in quality technical education by imparting knowledge,
skills and abilities to build a better technocrat.
• MISSION:
M1: Empower the students by inculcating various technical and soft skills.
M2: Upgrade teaching-learning process and industry-institute interaction

VISION AND MISSION OF THE INFORMATION TECHNOLOGY


DEPARTMENT
• VISION:
"To enrich intellectual potential by imparting technical knowledge and skills to
become an IT professional"
• MISSION:
M1: To confer the technical education and skills required for IT field
M2: To imbibe social awareness in students to serve the society

[5]
ALL INDIA SHRI SHIVAJI MEMORIAL SOCIETY’S
POLYTECHNIC, PUNE -01
Information Technology Department

PROGRAM OUTCOMES (POs)


PO1: Basic and Discipline specific knowledge: Apply knowledge of basic
mathematics,science and engineering fundamentals and engineering specialization to solve the
engineering problems.
PO2: Problem analysis: Identify and analyse well-defined engineering problems using
codified standard methods.
PO3: Design/ development of solutions: Design solutions for well-defined technical problems
and assist with the design of systems components or processes to meet specified needs.
PO4: Engineering Tools, Experimentation and Testing: Apply modern engineering tools and
appropriate technique to conduct standard tests and measurements.
PO5: Engineering practices for society, sustainability and environment: Apply appropriate
technology in context of society, sustainability, environment and ethical practices.
PO6: Project Management: Use engineering management principles individually, as a team
member or a leader to manage projects and effectively communicate about well-defined
engineering activities.
PO7: Life-long learning: Ability to analyse individual needs and engage in updating in the IT
and allied industry.

PROGRAM SPECIFIC OUTCOMES(PSO)


The Diploma in Information Technology will prepare students to attain: Students will be able
to:
PSO 1: Use fundamental concepts of hardware and software systems.
PSO 2: Identify various career opportunities in IT field
Mr. V.V
Shetkar Course
Teacher

[6]
Acknowledgement

Presentation inspiration and motivation have always played a key role in the success of
any venture.
We express our sincere thanks to Honorable Principal Mr. S. K. Giram Sir, AISSMS
Polytechnic,
We pay our deep sense of gratitude to Respected Head of Information Technology
Department, AISSMS Polytechnic, Mrs. A.S Khandagale Ma’am, to encourage us and to
support us to prepare the Microproject. We feel to acknowledge our indebtedness and deep
sense of gratitude to the course teacher Mr. V.V Shetkar sir whose valuable guidance and kind
supervision have given us throughout the microproject which shaped the present work as its
show.
We are immensely obliged to our friends for their elevating inspiration, encouraging
guidance and kind supervision in the completion of our micro-project. Last, but not the least,
our parents are also an important inspiration for us. So with due regards, We express our
gratitude’s to them.

Group members with roll no.

1. Mr. Sarvesh Khade- 2331

2. Mr. Mahesh Marne- 2332

3. Mr. Sahil Mazire- 2333

[7]
Index

Sr. No. Content Page No.

1. Annexure I 9

2. Annexure II: Rationale 12

3. Aims/Benefits of the Micro Project 12

4. Course Outcome achieved 12

5. Literature Review 12

6. Actual Methodology Followed 13

7. Actual Resources Used 13

8. Output of the Micro Projects 14

9. Skill Developed / Learning outcome of the Micro 21

Project

10. Applications of the Micro Project 21

11. Annexure III 22

12. Annexure IV (Evaluation Sheet) 24

13. Logbook 28

14. Evaluation Sheet 29

[8]
Annexure-I

Micro-Project Proposal

“Report on Digital Forensic”


1.0 Aims/Benefits of the Micro-Project:

Advancements and applications of Computer Engineering and Information Technology are ever-
changing. Emerging trends aim at creating awareness about major trends that will define technological
disruption in the upcoming years in the field of Computer Engineering and Information Technology.
These are some emerging areas expected to generate revenue, increase demand for IT professionals,
and open avenues of entrepreneurship.

2.0 Course Outcomes Addressed:

C22618 c. Describe Blockchain technology.


C22618 d. Describe Digital Forensic Models and Evidence
Handling Procedures.
C22618 e. Describe Ethical Hacking process.
3.0 Proposed Methodology:
1. Arrangement of groups and representatives for groups that are not usually represented as
partners in main projects.
2. Capacity building and networking in relation to the role as partners in micro projects.
3. Collected materials related to project.
4. Support development of more need and user driven projects.
5. Contribute to the maximum requirements of project.
6. An eligible project idea addressing one of the four Priority Axes and a work plan for a micro
project including a description of how the capacity building and networking should take place.
7. The project involves maximum five partners. From five partners, the contributions of micro
project is distributed.
8. An eligible Lead member who will guide the group members and analysed the data.
9. Eligible match finding the proper information.
10. Softcopy corrections by respective teachers.
11. Completion of the micro project properly.
12. Final copy and submission

[9]
4.0 Action Plan:

Sr Details of Activity Planned Planned Name of


No. Start Finish Responsible Team
date date Members
1. Introduction to Micro-project: 03.01.2024 03.01.2024 All group
Study for selecting Micro project topic members

2. Introduction to Micro-project: All group


Discussion about selected Micro 08.01.2024 08.01.2024 members
project topic with concerned Course
Teacher

3. Introduction to Micro-project: All group


Finalize and Study for selected topic 15.01.2024 15.01.2024 members

4. Drafting Proposals Sahil


22.01.2024 22.01.2024
5. Proposal submission All group
22.01.2024 22.01.2024 members
6. Micro project Proposal Presentation Sarvesh
29.01.2024 29.01.2024
7. Making Changes in presentation, if Mahesh
suggested by concerned teacher 05.02.2024 05.02.2024

8 Executing Micro-Project: All group


Study from different resources 12.02.2024 12.02.2024 members

9. Executing Micro-Project: Collect All group


information from studied resources 26.02.2024 26.02.2024 members

10. Executing Micro-Project: Arrange Sarvesh


collected information 26.02.2024 26.02.2024

11. Executing Micro project Sahil


04.03.2024 04.03.2024
12. Drafting Methodology 11.03.2024 11.03.2024 Mahesh

13. Drafting Literature Review Sahil


18.03.2024 18.03.2024
14. Drafting Result, Discusser 25.03.2024 25.03.2024 Sarvesh

15. Micro project Presentation All group


01.04.2024 01.04.2024 members
16. Micro Project final submission 08.04.2024 08.04.2024 All group
members

[10]
5.0 Resources Required:

Sr No. Name of Specifications Qty. Remarks


Resources/material
1. Computer System Intel core i7, 16 GB RAM, 1
Windows 10
2. Software Chrome, MS Word
3. Printed Hp printer

Names of Team Members with Roll Nos.

Sr.No Name of student Roll no.

1. Mr. Sarvesh Khade 2331

2. Mr. Mahesh Marne 2332

3. Mr. Sahil Mazire 2333

(To be approved by Mr. V.V Shetkar)

[11]
Annexure-II

Micro-Project Report

“Report on Digital Forensic”


1.0 Rational:
Digital forensics is a branch of forensic science that focuses on identifying, acquiring, processing,
analyzing, and reporting on data stored electronically. Electronic evidence is a component of almost all
criminal activities and digital forensics support is crucial for law enforcement investigations. Electronic
evidence can be collected from a wide array of sources, such as computers, smartphones, remote storage,
unmanned aerial systems, shipborne equipment, and more.
The main goal of digital forensics is to extract data from the electronic evidence, process it into
actionable intelligence and present the findings for prosecution. All processes utilize sound forensic
techniques to ensure the findings are admissible in court.
2.0 Aim/Benefits of the Micro-Project
Advancements and applications of Computer Engineering and Information Technology are ever-
changing. Emerging trends aim at creating awareness about major trends that will define technological
disruption in the upcoming years in the field of Computer Engineering and Information Technology.
These are some emerging areas expected to generate revenue, increase demand for IT professionals, and
open avenues of entrepreneurship.

3.0 Courses Outcomes Achieved:


C22618 c. Describe Blockchain technology.
C22618 d. Describe Digital Forensic Models and Evidence
Handling Procedures.
C22618 e. Describe Ethical Hacking process..

4.0 Literature review

https://www.interpol.int/en/How-we-work/Innovation/Digital-forensics
https://edusj.mosuljournals.com
https://www.educba.com/what-is-digital-forensics/
https://networksimulationtools.com/digital-forensics-final-year-project-ideas/

[12]
5.0 Actual Methodology Followed:

1. Finalize the Topic


2. Distribution of Work
3. Distribution of Topic
4. Collecting Images/Information
5. Starting animation
6. Completing animation
7. Creating a Word Document
8. Inserting information
9. Arranged the Information
10. Proofread the Information
11. Editing the Word Document
12. Review from the Teacher
13. Editing the Project Report as per Teacher's suggestion
14. Proofread and Finalize the Report
15. Finalize the report
16. Final of the Report

6.0 Actual Resources Used:

Sr No. Name of Specifications Qty. Remarks


Resources/material
1. Computer System Intel core i7, 16 GB RAM, 1
Integrated graphics, Windows
10
2. Software Chrome, MS Word
3. Printed Hp printer

[13]
7.0 Inputs and Outputs of Micro-Project:

What is forensic?
Collection and analysis of evidence Using scientific tests or techniques To establish facts against crime
For presenting in a legal proceeding. Therefore forensic science is a scientific method of gathering and
examining information about the past which is then used in a court of law.
Digital Forensics is the use of scientifically derived and proven methods for the protection, collection,
validation, identification, analysis, interpretation, documentation, and presentation of digital evidence
derived from digital devices for the purpose of facilitation or furthering the reconstruction of events
found to be criminal or assisting to anticipate unauthorized actions shown to be disruptive to planned
operations.

Branches of Digital Forensics


• The technical aspect of an investigation is divided into several sub-branches, relating to the type of
digital devices involved:
Computer forensics, Firewall Forensics, Database Forensics, Network forensics, Forensic data analysis,
and Mobile device forensics.

Digital Evidence
• Evidence A piece of information that supports a conclusion.
• Any data that is recorded or preserved on any medium in or by a computer system or other similar
digital device, that can be read or understood by a person or a computer system or other similar device.
• It includes a display, printout, or other output of that data.

[14]
Characteristics of Digital Evidence

Evidence must be:


• Admissible
Conformity with the common law and legislative rules
• Authentic
In linking data to specific individuals and events
• Fragile
Easily altered, damaged, or destroyed
• Accurate
Believed and is consistent
• Complete
With a full story of particular circumstances.
• Convincing juries
To have probative value, subjective and practical test of presentation - To prove beyond doubt.

Examples of Digital Evidence


Many courts have allowed the use of:
 E-mails,
 Digital photographs,
 ATM transaction logs,
 Word processing documents,
 Instant message histories,
 Files saved from an accounting program
 Logs from a hotel's electronic door locks, and digital video or audio files

Types of Digital Evidence


• Persistent data
It is the data that is stored on a non-volatile memory type storage device such as a local hard drive,
external storage devices like SSDs, HDDs, pen drives, CDs, etc. the data on these devices is preserved
even when the computer is turned off.
• Volatile data
Which is data that would be lost if the digital device is turned off. E.g. deleted files, computer history
the computer registry, temporary files, and web browsing history.

[15]
Process Of Digital Forensic Basic Model
In the field of Digital Forensics, we follow a pattern where we first identify each case, then preserve
and analyze the evidence. We document the findings in a manner that enables us to present the
evidence in the court of law, ultimately helping to identify the culprit in the crime.

1. Identification
It is the first and fore more step in the process, including the forensic process, like where the evidence is found,
where it is preserved, and how it is stored.
Electronic Device media includes PC, digital phones, IPads, etc.
2. Preservation
An isolating place stores the evidence to secure and preserve it from theft. People are prevented from buying
digital devices to ensure no proof is meddled with.
3. Analysis
In this phase, the inspection group will reform the chunks of evidence and determine the outcome based on the
resulting proofs or evidence. But it may sometimes take several iterations to discover the support on a criminal
case.
4. Documentation
In this stage, all possible evidence of data is drawn from the given inputs. It will help in rebuilding the crime
scene and analyzing it. The investigators document the correct documentation of the crime scenes by mapping
the crime scene, sketching it, and then relating its photographs with the documents.
5. Presentation
To conclude, we summarize and explain the documents.

[16]
Types of Digital Forensic
 Disk Forensics: It will deal with deriving the evidence from digital storage media like USB Devices,
DVDs, CDs, etc., by gathering the active files or modifying or deleting them.
 Network Forensics: It is generally a sub-part of digital forensics relating to the monitoring and detecting
system network traffic to extract crucial data for all legal evidence to present at the court.
 Wireless Forensics: It is a part of the networking forensics type that aims for wireless forensics to allow
the tools needed to gather and extract evidence from networking wireless traffic.
 Database Forensics: This type of digital forensics relates to the forensic study and collection of databases
and their relevant metadata. It follows investigating techniques to query the database to collect the
evidence.
 Malware Forensics: This branch of forensics handles identifying malicious code and studying malware
issues related to their workload, trojans, viruses, etc.
 Email Forensics: This forensic branch handles the recovery of the trashed data and analyses the contents
of the emails, including the emails that are deleted or the calendar or the contacts in the email.
 Memory Forensics: A forensic analysis collects the data from the computer’s cache memory or RAM
dump and then gathers the evidence.

Need for Digital Forensics


To ensure the integrity of the digital system.
To focus on the response to hi-tech offenses, started to intervene in the system.
Digital forensics has been efficiently used to track down terrorists from various parts of the World.
To produce evidence in the court that can lead to the punishment of the criminal.

Challenges in Digital Forensic


o Digital Media types- There are various digital devices used these days. The technique used for one specific
device cannot be used for some other device because of the different characteristics of each device.
Moreover, the digital forensic expert must be equipped with the use of software for analysis and also the
device being analysed.
o Online Disks- The large firms store their data on online disks. These generate a huge amount of data on
online disks, and thus, imaging of such huge data takes a lot of time and also requires the firm to shut their
services until the imaging is complete.
o Anonymity of the IP- This is one of the big challenge to cyber forensics. IP address allows network
identification and location addressing of a device connected to a network. However, IP address can easily
be spoofed by cybercriminals and hence can become a hindrance in the address location of the device.
Similar to IP address spoofing, there is MAC address and email address spoofing as well that becomes a
challenge for the digital forensic expert.
o Anti- Digital Forensic- This is used by cybercriminals and also used legitimately by individuals who want
to protect their privacy. Anti-digital forensics is a set of techniques and measures used to slow down or
incapacitate the process of investigation by manipulating, erasing, or obscuring the data. One of the most
commonly used anti-digital forensic techniques is RootKit that has been used by cybercriminals for years
to hide the activities of the malicious code.

[17]
Title: Exploring the Ethical Hacking Process Through the Lens of Digital Forensics

In today's interconnected digital landscape, the prevalence of cyber threats continues to rise, necessitating
proactive measures to safeguard sensitive information and critical systems. Ethical hacking, a practice
commonly employed to identify vulnerabilities within a system, aligns closely with the principles and
methodologies of digital forensics. By delving into the ethical hacking process through the perspective of
digital forensics, we gain a deeper understanding of the strategies and techniques utilized to bolster
cybersecurity defenses.

1. Introduction to Ethical Hacking and Digital Forensics:

Ethical hacking, also known as penetration testing, involves authorized individuals or teams simulating
cyber attacks to assess the security posture of an organization's systems, networks, and applications.
Conversely, digital forensics focuses on the identification, preservation, analysis, and presentation of digital
evidence to investigate cybercrimes and security incidents. While their objectives may differ, both
disciplines share commonalities in terms of methodologies and investigative approaches.

2. Planning and Preparation:

The ethical hacking process begins with meticulous planning and preparation. This phase encompasses
defining the scope of the engagement, establishing objectives, and obtaining necessary permissions from the
client or organization. Similarly, in digital forensics, investigators outline the goals of the investigation,
identify the types of evidence to be collected, and ensure compliance with legal and regulatory requirements.
Effective planning lays the foundation for a structured and systematic approach to both ethical hacking and
digital forensics engagements.
3. Information Gathering:

Information gathering forms a crucial aspect of both ethical hacking and digital forensics. Ethical hackers
collect publicly available intelligence about the target organization, including network architecture, system
configurations, and employee information. Likewise, digital forensics investigators gather evidence from
various sources, such as log files, system artifacts, and network traffic captures, to reconstruct events and
identify potential sources of compromise. This phase relies heavily on reconnaissance and reconnaissance
techniques to gather actionable intelligence.

4. Vulnerability Analysis:

Once information is collected, ethical hackers analyze it to identify potential vulnerabilities and
weaknesses within the target system. This may involve conducting vulnerability scans, assessing software
versions, and researching known exploits. Similarly, digital forensics investigators analyze collected
evidence to identify security breaches, unauthorized access, and potential weaknesses in the system.
Vulnerability analysis serves as a critical precursor to the exploitation phase, enabling ethical hackers and
digital forensics investigators to prioritize their efforts and resources effectively.

[18]
5. Exploitation:

In the exploitation phase, ethical hackers attempt to exploit identified vulnerabilities to gain unauthorized
access to the target system or data. This may involve leveraging social engineering tactics, network
exploitation techniques, or software vulnerabilities to simulate real-world attacks. Concurrently, in digital
forensics, investigators recreate the sequence of events leading to a security incident or breach, often
through simulation or controlled experiments. By emulating attacker behavior, ethical hackers and digital
forensics investigators gain valuable insights into the potential impact of security flaws and weaknesses.

6. Reporting and Remediation:

The final phase of the ethical hacking process involves documenting the findings and recommendations in
a comprehensive report. Ethical hackers present their findings to the client, along with actionable insights
and remediation strategies to enhance the organization's security posture. Similarly, in digital forensics,
investigators compile detailed reports of their findings, including the methods used, evidence collected, and
conclusions drawn. These reports serve as valuable resources for legal proceedings, regulatory compliance,
and internal investigations, guiding organizations in implementing proactive measures to mitigate future
risks.

7. Conclusion:

Ethical hacking and digital forensics represent complementary approaches to cybersecurity, each
contributing to the overall resilience and effectiveness of an organization's defenses. By examining the
ethical hacking process through the lens of digital forensics, we gain a comprehensive understanding of the
methodologies, techniques, and best practices employed to identify, analyze, and mitigate cyber threats.
Through collaboration and continuous learning, ethical hackers and digital forensics investigators play
instrumental roles in safeguarding digital assets and preserving the integrity of information systems in
an ever-evolving threat landscape.

Title: Unraveling Blockchain Technology: A Digital Forensic Perspective

In recent years, blockchain technology has emerged as a revolutionary force, offering unparalleled
transparency, security, and decentralization in various sectors, including finance, supply chain management,
and healthcare. From a digital forensic standpoint, blockchain presents both novel challenges and innovative
solutions, reshaping the landscape of investigative practices. Let's delve into the intricacies of blockchain
technology through the lens of digital forensics.

1. Understanding Blockchain Fundamentals:

At its core, a blockchain is a distributed ledger that records transactions across a network of interconnected
nodes. Each transaction is cryptographically linked to the preceding one, forming a chain of blocks that are
sequentially arranged and immutable. This decentralized architecture eliminates the need for intermediaries,
enhancing transparency and reducing the risk of fraud or tampering.

[19]
2. Immutable Nature and Forensic Implications:
The immutability of blockchain data poses both challenges and opportunities for digital forensics. Once a
transaction is recorded on the blockchain, it becomes virtually impossible to alter or erase without consensus
from the network participants. While this ensures data integrity and auditability, it also presents forensic
investigators with the daunting task of analyzing historical transactions accurately. However, this
immutability can serve as a valuable asset in forensic investigations, as it provides a reliable source of truth
for reconstructing digital trails and verifying authenticity.

3. Pseudonymity and Traceability:


Blockchain transactions are pseudonymous, meaning that users are identified by cryptographic addresses
rather than personally identifiable information. While this offers a degree of privacy and anonymity, it also
complicates forensic analysis by obscuring the identities of transaction participants. Digital forensic experts
must employ sophisticated techniques, such as blockchain analytics and transaction clustering, to trace the
flow of funds and attribute transactions to specific entities. Through meticulous analysis of transaction
patterns and metadata, investigators can unravel complex networks of illicit activity and identify potential
suspects.

4. Smart Contracts and Digital Evidence:


Smart contracts, self-executing agreements coded on the blockchain, introduce a new paradigm of digital
evidence within forensic investigations. These programmable scripts automate and enforce contractual
obligations, ranging from financial transactions to decentralized applications (DApps). Forensic analysts
must navigate the intricacies of smart contract code to uncover vulnerabilities, verify contractual
compliance, and identify potential exploits or malicious behavior. Furthermore, the execution of smart
contracts generates a trail of immutable transaction records, serving as valuable forensic evidence in
contractual disputes or legal proceedings.

5. Cryptocurrency and Financial Investigations:


Cryptocurrencies, such as Bitcoin and Ethereum, are the most prevalent applications of blockchain
technology, facilitating peer-to-peer transactions without the need for traditional financial intermediaries.
From a forensic perspective, cryptocurrencies present unique challenges in tracing illicit funds, investigating
money laundering activities, and combating financial crimes. Digital forensic specialists leverage blockchain
analysis tools and techniques, such as address clustering, transaction graph analysis, and coin mixing
analysis, to track the movement of digital assets and identify suspicious transactions. By collaborating with
law enforcement agencies and regulatory bodies, forensic investigators play a pivotal role in dismantling
criminal enterprises and upholding the integrity of the financial system.

6. Conclusion:
In conclusion, blockchain technology revolutionizes digital forensics by introducing unprecedented levels
of transparency, security, and decentralization. While blockchain's immutable nature and pseudonymous
transactions pose challenges for forensic analysis, they also offer opportunities for enhancing investigative
techniques and preserving digital evidence. By embracing innovative methodologies and leveraging
specialized tools, digital forensic experts can navigate the complexities of blockchain ecosystems and
unravel the mysteries of digital transactions with unparalleled precision and efficacy. As blockchain
continues to evolve, so too will the role of digital forensics in safeguarding the integrity of decentralized
networks and preserving justice in the digital age.

[20]
7.0 Skill Developed/Learning Outcomes of this Micro-Project:

• Develop group discussion skills.


• Data collection skills.
• Communication skills improved.
• Some basic digital forensic skills.

8.0 Applications of this Micro project:

o Crime Detection- There are various malwares and malicious activities that happen over digital media and
networks, such as phishing, spoofing, ransomware, etc.
o Crime Prevention- There are various cyber crimes that happen due to lack of security or existing unknown
vulnerabilities, such as zero-day vulnerability. Hence, cyber forensics helps in finding out these
vulnerabilities and avoiding such crimes to occur.
o Crime Analysis- This is the main application of digitalCrime Detection- There are various malwares and
malicious activities that happen over digital media and networks, such as phishing, spoofing, ransomware,
etc.
o Crime Prevention- There are various cyber crimes that happen due to lack of security or existing unknown
vulnerabilities, such as zero-day vulnerability. Hence, cyber forensics helps in finding out these
vulnerabilities and avoiding such crimes to occur.
o Crime Analysis- This is the main application of digital forensics. It involves- [2]
o Preservation- This process involves protecting the crime scene and the digital evidence or setup from
further manipulation and photographing and video graphing the crime scene, for future reference. Also this
process involves stopping any ongoing command that may be linked to the crime.
o Identification- This process involves identifying the digital media and devices that can serve as
thepotential evidence.
o Extraction- This process involves the imaging of the digital evidence, (to maintain the authenticity of the
original evidence), for further analysis.
o Documentation- This involves maintaining the chain of custody and documenting all the evidence collected
from the crime scene.
o Interpretation- This involves making of a report by the digital forensic expert about the analysis conducted
on the digital evidence using various tools such as FTK (for imaging and mounting of evidences),SleuthKit
and Autopsy (analyzes disk images and recover files from them) etc. and presenting it in the court of law.
The conclusion is based on the evidence collected and reconstructing data fragments.

[21]
Annexure - III

Rubric for Assessment of Micro Project


S. Characteristics to Poor Average Good Excellent
No be assessed (Marks 1-3) (Marks 4-5) (Marks 6-8) (Marks 9-10)
1. Relevance to Related to very Related Addressed at- Addressed
the Course few LOs to some least one CO more than one
Los CO
2. Literature Not more At-least 5 At-least 7 About 10
Review/information than two relevant relevant relevant
collection sources sources, at sources, most sources, most
(Primary and least 2 latest latest latest
Secondary),
very old
reference
3. Completion of Completed less Completed 50 Completed 60 Completed
Target as per than 50% to 60% to 80% more than
Project proposal 80%
4. Analysis of Data Sample Size Sufficient and Sufficient and Enough data
and representation all, data appropriate appropriate collected by
neither sample, sample, sufficient and
organized nor enough data enough data appropriate
presented well generated but generated sample size.
not organized which is Proper
and not well organized and inferences
presented well. presented drawn by
No or poor well. But organizing
inferences poor and presenting
drawn inferences data through
drawn tables, charts
and graphs
5. Quality of Incomplete Just Well a Just Well a Just
prototype/Model fabrication/ assembled/ assembled/ assembled/
assembly fabricated and fabricated fabricated
parts are not with proper with proper
functioning functioning functioning
well. Not in parts.in parts.in
proper shape, proper shape, proper shape,
dimensions within within
beyond tolerance tolerance
tolerance limit. dimensions dimensions

[22]
and good
Appearance/ and good finish/
finish is finish. But no appearance.
shabby. creativity in Creativity
design and in design
use of and use of
material material.
6. Report Preparation Very short, Nearly Detailed, Very detailed,
poor quality sufficient and correct and correct, clear
sketches, correct details clear description of
Details about about description of methods,
methods, methods, methods, materials,
materials, materials, materials, precautions
Precautions precautions precautions and
and and and conclusion.
Conclusions conclusion. conclusion. Enough
omitted, some but clarity is Sufficient tables, charts
details are not there in graphic and sketches
wrong. presentation. description
But notenough
graphic
description
7. Presentation of the Major Includes major Includes Well
Micro-Project information is information major organized,
not included, but not well information Includes
information is organized not but not well major
not well presented organized not information,
organized. well. presented presented
well. well.
8. Viva Could not Replied to Replied Replied most
reply to considerable properly of the
considerable number of considerable questions
number of questions but number of properly
question not very question.
properly

[23]
Micro Project Evaluation Sheet

Name of Student: Sarvesh Khade Enrollment No: 2101410320


Name of Programme: Information Technology Semester: 6th
Course Title: ETI Course Code: 22618
Title of the Micro-project: “Report on Digital Forensic”
Course Outcomes Achieved:-
C22618 c. Describe Blockchain technology.
C22618 d. Describe Digital Forensic Models and
Evidence Handling Procedures.
C22618 e. Describe Ethical Hacking process..

Sr Characteristic to be Poor Average Good Excellent Sub Total


No. accessed (Marks (Marks 4-5) (Marks (Marks 9-
1- 6- 10)
3) 8)
(A) Process and Product Assessment (Convert above total marks out of 6 Marks)
1 Relevance to
the course
2 Literature
Review/information
collection
3 Completion of the
Target as per project
proposal
4 Analysis of Data and
representation
5 Quality of the
Prototype/Model
6 Report Preparation
(B) Individual Presentation/ Viva (Convert above total marks out of 4 Marks)
7 Presentation
8 Viva

(A) (B) Total Marks


Process and Product Assessment Individual Presentation/ 10
(6 Marks) Viva (4 Marks)

Comments/ suggestions about Team work/ Leadership/Inter-Personal communication (If


any) …………………………………………………………………………………………………
Name and Designation of the Teacher……………………………………..

Dated Signature………………………………………………………………

[24]
Micro Project Evaluation Sheet

Name of Student: Mahesh Marne Enrollment No: 2101410333


Name of Programme: Information Technology Semester: 6th
Course Title: ETI Course Code: 22618

Title of the Micro-project: “Report on Digital Forensic”


Course Outcomes Achieved:-
C22618 c. Describe Blockchain technology.
C22618 d. Describe Digital Forensic Models and
Evidence Handling Procedures.
C22618 e. Describe Ethical Hacking process..

Sr Characteristic to be Poor Average Good Excellent Sub Total


No. accessed (Marks (Marks 4-5) (Marks (Marks 9-
1- 6- 10)
3) 8)
(A) Process and Product Assessment (Convert above total marks out of 6 Marks)
1 Relevance to
the course
2 Literature
Review/information
collection
3 Completion of the
Target as per project
proposal
4 Analysis of Data and
representation
5 Quality of the
Prototype/Model
6 Report Preparation
(B) Individual Presentation/ Viva (Convert above total marks out of 4 Marks)
7 Presentation
8 Viva

(A) (B) Total Marks


Process and Product Assessment Individual Presentation/ 10
(6 Marks) Viva (4 Marks)

Comments/ suggestions about Team work/ Leadership/Inter-Personal communication (If


any) …………………………………………………………………………………………………
Name and Designation of the Teacher…………………………………………

Dated Signature………………………………………………………………

[25]
Micro Project Evaluation Sheet

Name of Student: Sahil Mazire Enrollment No: 2101410335


Name of Programme: Information Technology Semester: 6th
Course Title: ETI Course Code: 22618
Title of the Micro-project: “Report on Digital Forensic”
Course Outcomes Achieved:-
C22618 c. Describe Blockchain technology.
C22618 d. Describe Digital Forensic Models and
Evidence Handling Procedures.
C22618 e. Describe Ethical Hacking process..

Sr Characteristic to be Poor Average Good Excellent Sub Total


No. accessed (Marks (Marks 4-5) (Marks (Marks 9-
1- 6- 10)
3) 8)
(A) Process and Product Assessment (Convert above total marks out of 6 Marks)
1 Relevance to the
course
2 Literature
Review/information
collection
3 Completion of the
Target as per project
proposal
4 Analysis of Data
and representation
5 Quality of the
Prototype/Model
6 Report Preparation
(B) Individual Presentation/ Viva (Convert above total marks out of 4 Marks)
7 Presentation
8 Viva

(A) (B) Total Marks


Process and Product Assessment Individual Presentation/ 10
(6 Marks) Viva
(4 Marks)

Comments/ suggestions about Team work/ Leadership/Inter-Personal communication (If


any) …………………………………………………………………………………………………
Name and Designation of the Teacher……………………………………
Dated Signature………………………………………………………………

[26]
AISSMS’s Polytechnic, Pune- 01(0141)
Annexure IV: Rubrics Used for Evaluation of a Micro Project

Program/Semester /Master: IF 6I Course code: 22618 Group No.:


Title of the project: Report on Digital Forensic
Course Outcome Achieved: -
C22618 c. Describe Blockchain technology.
C22618 d. Describe Digital Forensic Models and Evidence
Handling Procedures.
C22618 e. Describe Ethical Hacking process.

Assessment of micro project based on rubrics for performance in group activity :( Marks to be
given out of 06) Assessment of performance in individual presentation/Viva of micro project:
(Marks to be given out of 04 Scale used for assessment: Poor (1-3), Average (4-5), Good (6-8),
Excellent (9-10)
A) Process and Product Assessment (A):

Rubric
Characteristics to be assessed Marks Obtained out of 10
No.
1 Relevance to course
2 Literature review/information collection
3 Completion of target as per project proposal
4 Analysis of data and representation
5 Quality of prototype/model
6 Report Preparation
Total Out of (60)
Process and Product Assessment (A) :Total Out of (06)
B) Individual Presentation/Viva(B)

Rubric Individual
Rubric 7 Individual
8 Presentatio
Presentatio
n/Viva
n/Viva
(Convert Total
Individual Individ (Addition of
out of 08 (A+B)
Roll Enrollment Presentatio ual marks in
Name of Student marks into
No. No. n Viva Rubric 7 to
out of 4)
8)
(B)
Marks
Marks Marks out Marks out Marks
out of
out of 10 10 of 20 of 04 out of
10
2101410332 Ms. Sarvesh Khade
2331
2101410359 Ms. Mahesh Marne
2332
Ms. Sahil Mazire
2333 2101410347
Mr. V.V Shetkar
Name & signature of
Faculty

[27]
Log Book of the Student (Hourly Work Report)
Academic Year: 2023-24
Name of Student: Sarvesh Khade, Mahesh Marne, Sahil Mazire.

Title of the Project:“Report on Digital Forensic”


Course: ETI Course Code: 22618
Semester: 6th

Sr. No. Date Time Work Done


1. 03.01.2024 11.30am to Finalize the Topic
12.30pm
2. 11.30am to Distribution of Work
08.01.2024 12.30pm
3. 11.30am to Distribution of Topic
15.01.2024 12.30pm
4. 11.30am to Collecting Data
22.01.2024 12.30pm
5. 11.30am to Collecting Images
22.01.2024 12.30pm
6. 11.30am to Creating a Word Document
29.01.2024 12.30pm
7. 11.30am to Typing Data
05.02.2024 12.30pm
8. 11.30am to Scanned the Images
12.02.2024 12.30pm
9. 11.30am to Arranged the Information
26.02.2024 12.30pm
10. 11.30am to Proofread the Information
26.02.2024 12.30pm
11. 11.30am to Editing the Word Document
04.03.2024 12.30pm
12. 11.03.2024 11.30am to Review from the Teacher
12.30pm
13. 11.30am to Editing the Project Report as per Teacher’s
18.03.2024 12.30pm suggestion
14. 25.03.2024 11.30am to Proofread and Finalize the Report
12.30pm
15. 11.30am to Taken the Printouts of the report
01.04.2024 12.30pm
16. 08.04.2024 11.30am to Final submission of the Report
12.30pm
Mr. V.V Shetkar
(Name & Signature of Faculty)

[28]
Evaluation Sheet for the Micro Project

Academic Year: 2023-2024 Name of Faculty: Mr. V.V Shetkar


Course: ETI Course Code: 22618
Semester: 6th
Title of the Project: “Report on Digital Forensic”

Cos addressed by the Micro Project


C22618 c. Describe Blockchain technology.
C22618 d. Describe Digital Forensic Models and Evidence
Handling Procedures.
C22618 e. Describe Ethical Hacking process..

Major Learning Outcomes achieved by students by doing the project:


(a)Practical Outcomes:

 Recovering and Preserving Digital Evidence.


 Understanding the chain of custody.
 Describing the physical acquisition and safekeeping of digital evidence.
 Recovering digital evidence through forensic imaging processes.

(b) Outcomes in Affective Domain:


 Follow safety practices.
 Demonstrate working as a leader.
 Follow ethical practices.
 Practice energy conservations.
Comments/Suggestions about teamwork/leadership/inter-personal communication.

Roll Student Name Marks out of (6) Marks out of (4) Total out of
No. for performance for performance (10)
in group activity in oral /
presentation
Mr. Sarvesh
2331 Khade
Mr. Mahesh
2332 Marne
Mr. Sahil Mazire
2333
Mr. V.V Shetkar
(Dated Signature)
[29]

You might also like