• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Organizational Forensics

MIS 5170 - Section 002 - Larry Brandolph

Organizational Forensics

MIS 5216.701 ■ Fall 2019 ■ Paul Warner
  • HomePage
  • Syllabus
  • Assignments
    • Week 1, Week 2 & Week 3
      • Week 1: Introduction to Forensic
      • Week 2: Storage Formats, Acquisitions, Digital Evidence and Forensics Investigations
      • Week 3: Evaluate, Examine and Test Current Digital Forensics Tools
    • Week 4, Week 5 & Week 6
      • Week 4: Digital Forensics Analysis and Validation
      • Week 5: Exam 1 and Independent Challenge Projects
      • Week 6: Virtual Machine, Live Acquisitions, and Network Forensics
    • Week 7, Week 8 & Week 9
      • Week 7: Email and Social Media Investigations
      • Week 8: Mobile and Cloud Forensics
      • Week 9: Final Project Part 1
    • Week 10, Week 11 & Week 12
      • Week 10: Cloud Forensics
      • Week 11: Ethics For The Expert Witness
      • Week 12: E-Discovery
    • Week 13, Week 14 & Week 15
      • Week 13: Data Breach
      • Week 14: Final Project Submission & Presentation
  • Deadlines
  • Webex
  • Gradebook

Week 4: Digital Forensics Analysis and Validation

Week Objective

  • Determine what data to analyze in a digital forensics investigation
  • Explain tools used to validate data
  • Explain common data-hiding techniques

Reading Unit

Chapter 9

Independent Lab

Chapter 9:Hand-on Project 9-1

Chapter 9: Hand-on Project 9-2:

Assignment

Case Project 9-2

Several graphics files were transmitted via e-mail from an unknown source to a suspect in an ongoing investigation.  The lead investigator gives you these graphics file and tells you that at least four messages should be embedded in them.  Use your problem solving skills and brainstorming skills to determine a procedure to follow.  Write a short report outlining what to do.

Discussion Board

Based on the techniques discussed for hiding data on a computer, which method would you use for the following:

  1. Hiding information from a young family member who uses the same computer
  2. Hiding information from a colleague who is a network administrator
  3. Hiding information from an intelligence agency, such as the CIA

Discuss why the validation process is so important when criminal investigators obtain a computer as evidence in a crime.

Topics and Required Reading

  • The importance of developmental validation In Forensic Science – https://blog.bizzmine.com/en/the-importance-of-developmental-validation-in-forensic-science
  • AccessData Password Recovery Toolkit:

https://accessdata.com/products-services/forensic-toolkit-ftk

  • National Software Reference Library:

http://www.nsrl.nist.gov/

  • What a Hex Editor is and Why You Might Use It:

http://www.makeuseof.com/tag/hex-editor-technology-explained/

  • Steganalysis: Detecting hidden information with computer forensic analysis

https://www.sans.org/reading-room/whitepapers/stenganography/steganalysis-detecting-hidden-information-computer-forensic-analysis-1014

For more information about validation of digital forensics tools and technology:

http://www.dfinews.com/articles/2011/03/validation-forensic-tools-and-software-quick-guide-digital-forensic-examiner

Primary Sidebar

Weekly Discussions

  • Week 1 Discussion/Particitpation (1)
Fox School of Business

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in