Assignment World

Assignment World logo


Home / Digital Forensic Assignment-2



This subject will help students to understand the principles and different tools of Digital Forensics. Some of the topics included in the unit are-
Threats that modern network infrastructure face in terms of security
Implementation of forensic analysis
How to collect forensic material for expert analysis
How to overcome legal, ethical and professional problems in the field of Information security
Important Terms
The process of capturing data from the world around us so that it may be presented, processed, and stored in a computer is known as Data Acquisition.
The practice of systematically applying statistical and/or logical approaches to describe and demonstrate, condense and recapitulate, and assess data is known as Data Analysis.
Data validation means checking the accuracy and quality of source data before using, importing or otherwise processing data.

Learning outcome of the assessment:
Record and document Digital Forensics in social media.

Assignment Description
This assignment is divided into 2 parts:
Part A: It focuses on the recent digital forensic crime
Part B: Prepare a forensic image, forensic analysis and data validation

Part A Digital Forensic Crime
You need to research one recent digital forensics crime that requires digital forensics investigation, such as malware, embezzlement, extortion, cyberbullying, murder, kidnap, drug trafficking, intellectual property theft, espionage, employment misconduct, fraud, forgeries, inappropriate email and internet use in the workplace. For this part , you will write a 500 – 1000 words report that addresses the necessary steps to ensure that digital evidence is collected, preserved, imaged, and can be examined.
Prepare a report on the following:

1. Provide a detailed description of the case.
a. Summary of the offence being investigated.
b. Report who was involved in the crime, i.e. who was the criminal(s), the suspect(s)
and the victim(s)?
c. Identify and report what type of evidence was used in the criminal investigation of
the case;
d. Explain two acquisition methods that you should use in this case study.
e. Discuss some options that can be used for preserving the data.

2. Explain the importance of a chain of custody for digital forensic evidence. Be sure to explain the process of documenting, collecting and storing evidence from the crime scene you’re investigating (e.g. a laptop computer). Describe the consequences of not following a proper chain of custody.

3. Discuss the procedures for the preservation of evidence; be sure to connect this work with the chain of custody. Describe consequences of not carefully preserving evidence.

4. List and analyse the tools you will need in your investigation and the reason you chose those tools. Support this analysis with relevant research. Critically evaluate the forensic tool(s) and discuss their capacity in various categories of functions, including acquisition, validation, and verification, extraction, reconstruction, and reporting.

Part B Data Acquisition, Data Analysis and Data Validation
The objective of assignment part b is to acquire data from a drive, perform data recovery using different techniques and tools, analyse it and finally perform the validation of acquired data. In addition, students are required to properly document all steps in a report, the report should be formal so that it can be used in a legal process. Prepare a report on the following sections:
Data Preparation
Data Acquisition
Data Recovery
Data Analysis
Data Validation
Comparison of Digital Forensic tools
Your comparison could include- Digital Forensic features, time taken to detect threat and ease of usage.


Will you be able to complete my assignment?
Yes, we have professional experts on board who can complete your assignment smoothly.

How long will it take you to complete the assignment?
You must state the deadline at the time of making an order.

Will you be able to provide the assignment to me before the deadline?
Yes, we can, but you must specify the duration when making the order.

Is it true that some answers may require a Student ID, and that my personal information will be safe with you?
Yes, we will keep all of your personal information secure and confidential.

If my classmate also gets the assignment done with you, how will you make sure that the solution is completely different?
Our writers pay attention to detail and make every assignment from scratch ensuring originality of the work.

Will you give the Turnitin Report?
Yes, we always give Turnitin Report with the assignments and that too free of cost.

What if I need to make modifications to the work after receiving feedback from the professor?
Yes, we can make changes to the assignment based on the feedback until it meets the original standards.

What is the payment process?
We always request to make payment in advance & the writer starts working once the payment is confirmed.