Computer Crime
Type: Report
Subject: Information Technology
Topic: Computer Crime
Standard: Bachelor
Language: English (U.K)
Pages: 10
THE CASE:
The hazardous materials team is called suddenly at 3a.m. May 10 to a warehouse behind Roma St station in Brisbane. Team member Moti identifies the scene as a drug manufacturing location, and the people there have hurriedly packaged up the loose powders they were working with, leaving traces on the floor and across many desk surfaces. Moti makes a decision not to call the forensic squad in when he sees the drug traces, because he suspects the drug is at the top of the current most dangerous list and he needs to take samples back to his lab for analysis before identifying it.
However, Moti is familiar with the protocol when there is a computer in the area, and calls his colleague Sandra, waking her at 3:17a.m. to walk him through a capture of computer data for forensic analysis. He is able to shut down the laptop, and removes it from the scene along with several CDs found in the desk.
Later that day, Sandra analyzes the laptop and CDs in the police forensics lab. The computer is equipped with Windows and only a basic Word document facility and Internet Explorer, and has software for showing DVDs and image files. No documents appear to have been stored on the machine. Three of the CDs are actually DVDs with recent movies. The fourth contains a suspicious TrueCrypt volume.
Sandra makes three forensic copies of all the data and stores two of them safely in the lab. She then delegates the laptop and CDs to various staff members for analysis, distributing the third copies to them. As most of the staff are also involved in a large on-going investigation she decides to ask for the help of an additional team member who is holidaying overseas.
You receive a secure e-mail from Sandra with an attachment containing two NTLM hash strings retrieved from the criminal’s laptop, the TrueCrypt volume from one of the CDs along with a request to analyse it as quickly as possible for any pertinent information, and an apology for interrupting your holiday.
The two NTLM hashes are:
668C957E50B65F5B043CBBFD5DFFFDAB:02D5A8D26965684F756A54C56764BD0F
and
2B7FDC950D1FE9E717306D272A9441BB:88CD7C07A8ECCF7CC6CD0E9C8F272C02
You can download a copy of the TruCrypt volume in the e-mail attachment from
http://www.deakin.edu.au/~zoidberg/SimpleEncryption.TC
And you are advised that the MD5 hash value of the executable file should be
12e5d758d697dfab23eae6ce4ac0a9fb
Analyze this file and report your findings using the outline below. (For marking purposes, it is strongly recommended that you follow this outline.)
- Explain how you downloaded the file, what precautions you took, and how you ensured its integrity.
1 mark
- Describe how you decrypt the two given NTLM hash values by using OphCrack including screen shots.
2 marks
- Describe the process that you open the downloaded file by using the information obtained in Step 2.
2 marks
- Describe the actual content of the encrypted file that you identified in Step 3. If there are multiple files, list their file names, types and MD5 hash values.
2 marks
- What tools will you now use to proceed your investigation and why?
1 mark
- Describe how your investigation proceeded at this point, including screen shots.
8 marks
- Write a two page report for Sandra listing your findings and recommendations. Make appropriate suggestions on how a further investigation should proceed. Construct and complete a single-item evidence form as part of your report.
4 marks
Feasibility study of new product concept
Type: Report
Subject: INNOVATION AND NEW PRODUCT DEVELOPMENT
Order Topic: Feasibility study of new product concept
Instructions: to their company, and been asked to investigate its feasibility. You will construct a report which could be presented to your senior managers. It should detail the rationale for the new product concept, the activities that you undertake in your tutorials and the results and outcomes of these activities, and come to a justified conclusion as to whether the product development process should proceed. The project should be constructed in a number of sections: Section A (c 300 words) The product concept defined Rationale for proposing the product concept Section B (c 400 words) Concept testing (focus group) – methods, outcomes, conclusions. Include quotes from the focus group to illustrate points. Section C (c 400 words) Market research – methods, outcomes, conclusions Section D (c 400 words) Safety assessment using HACCP, presented as a table. Section E (c 400 words) Packaging and legal issues – present the proposed packaging/menu (including wording/pictures) and discuss the legal issues arising from this. Section F (c 500 words) Your justified advice over whether the NPD process should proceed on the basis of the evidence that you have collected. You must demonstrate that you have read original studies and reports by systematic use of references in your project to support substantive statements and evidence. Include a list of references cited in the report, using the Harvard System of referencing Attachments:
Broadband Communication by Light – Interim Report
Type: Dissertation Lit / Review
Level: Master’s
Subject: IT – Networks
Order Topic: Broadband Communication by Light – Interim Report
Instructions:
Should be in LaTeX. I upload an example of what the uni considers to be a “good” report Attachments: