Bowling Green State University Digital Forensics Challenges Project
Question DescriptionDigital forensic investigators are often challenged to access encrypted
data or to process data and systems that have been subjected to antiforensic techniques. In
both cases, a user or system designer has taken steps to make the data more difficult to
access and the investigator must apply all known and reasonable techniques to access the
data. The goal of this project is to familiarize you with encryption basics, various encryption
implementations, antiforensic techniques, and attacks on encryption systems and
passwords.This project consists of six steps. Completion will lead to the development and
distribution of a job aid and sample investigative report. The job aid (Steps 1 and 5) will
explain basic cryptography, password cracking, and interception attacks. The investigative
report (Steps 2, 3, and 4) will document the processing of files, partitions, and software, and
the data derived from these analyses. As seen in the scenario, cryptography is a complex
topic, and you need to find a simple way to ensure the temporary employees can perform
the work your agency requires. Ready to get started? When you submit your project, your
work will be evaluated using the competencies listed below. You can use the list below to
self-check your work before submission.1.1: Organize document or presentation clearly in a
manner that promotes understanding and meets the requirements of the assignment.1.2:
Develop coherent paragraphs or points so that each is internally unified and so that each
functions as part of the whole document or presentation.1.3: Provide sufficient, correctly
cited support that substantiates the writer’s ideas.1.4: Tailor communications to the
audience.1.5: Use sentence structure appropriate to the task, message and audience.1.6:
Follow conventions of Standard Written English.1.7: Create neat and professional looking
documents appropriate for the project or presentation.2.1: Identify and clearly explain the
issue, question, or problem under critical consideration.2.2: Locate and access sufficient
information to investigate the issue or problem.2.3: Evaluate the information in a logical
and organized manner to determine its value and relevance to the problem.2.4: Consider
and analyze information in context to the issue or problem.2.5: Develop well-reasoned
ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.3.2:
Employ mathematical or statistical operations and data analysis techniques to arrive at a
correct or optimal solution.4.1: Lead and/or participate in a diverse group to accomplish
projects and assignments.5.4: Demonstrate an understanding of the different parts of a
computer5.5: Apply risk management principles to an investigation.6.1: Perform report
creation, affidavit creation, and preparation to testify6.2: Demonstrate ability to investigate
mobile technology6.4: Demonstrate the ability to gather file system evidence.6.6: Perform
malware analysis6.7: Access encrypted data or process data and systems that have been
subjected to anti-forensics techniques9.2: Evaluate Enterprise Architecture

More Related Content

PPTX
MODULE 1_Introduction to Data analytics and life cycle..pptx
PPTX
Unit_8_Data_processing,_analysis_and_presentation_and_Application (1).pptx
DOCX
PurposeThis course project is intended to assess your abilit
DOCX
I need 10 pages of report and 10 slides PurposeThis course p
PPTX
Build an Information Security Strategy
PPTX
BooK of EMC Introduction to Big data Analytics Module 2.pptx
PPTX
Build and Information Security Strategy
PPT
The data science process and fundamentals ppt
MODULE 1_Introduction to Data analytics and life cycle..pptx
Unit_8_Data_processing,_analysis_and_presentation_and_Application (1).pptx
PurposeThis course project is intended to assess your abilit
I need 10 pages of report and 10 slides PurposeThis course p
Build an Information Security Strategy
BooK of EMC Introduction to Big data Analytics Module 2.pptx
Build and Information Security Strategy
The data science process and fundamentals ppt

Similar to Bowling Green State University Digital Forensics Challenges Project.docx (20)

DOCX
University of maryland infa 620 homework help
DOCX
Step 1 Consider the Purpose for the ResearchYou have been given.docx
PPTX
BFCAI-BigDataAnalytics-Lecture lecture 2 .pptx
PPTX
PDF
Data Science (Moradabad).pdf
DOCX
Final Assignment Written assignment (Research Proposal)
PDF
Data science course in Moradabad.pdf
DOCX
Project Access Control ProposalPurposeThis course project i
DOCX
Project Access Control ProposalPurposeThis course project i.docx
PPTX
data science.pptx
PPTX
Data Science course in Hyderabad .
PPTX
Data Science course in Hyderabad .
PPTX
data science course in Hyderabad data science course in Hyderabad
PPTX
best data science course institutes in Hyderabad
PPTX
data science course training in Hyderabad
PPTX
data science course training in Hyderabad
PDF
Data science course in ameerpet Hyderabad
PDF
4200 (1).pdf
DOCX
Outline for Cyber Security Improvement PlanObjectiveThis assig.docx
PPTX
33A1660F-datascience.pptx Data analyst at the end
University of maryland infa 620 homework help
Step 1 Consider the Purpose for the ResearchYou have been given.docx
BFCAI-BigDataAnalytics-Lecture lecture 2 .pptx
Data Science (Moradabad).pdf
Final Assignment Written assignment (Research Proposal)
Data science course in Moradabad.pdf
Project Access Control ProposalPurposeThis course project i
Project Access Control ProposalPurposeThis course project i.docx
data science.pptx
Data Science course in Hyderabad .
Data Science course in Hyderabad .
data science course in Hyderabad data science course in Hyderabad
best data science course institutes in Hyderabad
data science course training in Hyderabad
data science course training in Hyderabad
Data science course in ameerpet Hyderabad
4200 (1).pdf
Outline for Cyber Security Improvement PlanObjectiveThis assig.docx
33A1660F-datascience.pptx Data analyst at the end

More from sdfghj21 (20)

DOCX
you interviewed the CEO and evaluated the organization to gain.docx
DOCX
Write a to paper about genetically vigorous.docx
DOCX
When you talk about the meaning of which sense.docx
DOCX
Virtualization and cloud services continue to gain momentum as more.docx
DOCX
Your name Brief background Your profession What you hope to.docx
DOCX
The ways in which views related to race seem.docx
DOCX
This project provides you an opportunity to apply the marketing.docx
DOCX
The assignment must be submitted on a Microsoft word.docx
DOCX
Using online or library research articles explain the.docx
DOCX
Standards are designed to ensure Without no structure.docx
DOCX
think of a leader or presenter whose communication has.docx
DOCX
The Community of Inquiry frameworkLinks to an external is.docx
DOCX
we focus on notion of the in addition.docx
DOCX
When and how did you become aware of people being.docx
DOCX
To Working with your field identify a social.docx
DOCX
Write Cornell notes after reading Cornell Notes are.docx
DOCX
What are some current challenges your chosen groups.docx
DOCX
To complete this review the Learning Resources for this.docx
DOCX
summarize Jacob and inspirations in a.docx
DOCX
Strong leaders do not only focus on building their own.docx
you interviewed the CEO and evaluated the organization to gain.docx
Write a to paper about genetically vigorous.docx
When you talk about the meaning of which sense.docx
Virtualization and cloud services continue to gain momentum as more.docx
Your name Brief background Your profession What you hope to.docx
The ways in which views related to race seem.docx
This project provides you an opportunity to apply the marketing.docx
The assignment must be submitted on a Microsoft word.docx
Using online or library research articles explain the.docx
Standards are designed to ensure Without no structure.docx
think of a leader or presenter whose communication has.docx
The Community of Inquiry frameworkLinks to an external is.docx
we focus on notion of the in addition.docx
When and how did you become aware of people being.docx
To Working with your field identify a social.docx
Write Cornell notes after reading Cornell Notes are.docx
What are some current challenges your chosen groups.docx
To complete this review the Learning Resources for this.docx
summarize Jacob and inspirations in a.docx
Strong leaders do not only focus on building their own.docx

Recently uploaded (20)

PDF
Environmental Education MCQ BD2EE - Share Source.pdf
PDF
International_Financial_Reporting_Standa.pdf
PPTX
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
PDF
Journal of Dental Science - UDMY (2020).pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PDF
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
PPTX
Climate Change and Its Global Impact.pptx
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
PDF
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
PDF
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
PDF
HVAC Specification 2024 according to central public works department
PDF
English Textual Question & Ans (12th Class).pdf
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
Climate and Adaptation MCQs class 7 from chatgpt
Environmental Education MCQ BD2EE - Share Source.pdf
International_Financial_Reporting_Standa.pdf
DRUGS USED FOR HORMONAL DISORDER, SUPPLIMENTATION, CONTRACEPTION, & MEDICAL T...
Journal of Dental Science - UDMY (2020).pdf
Introduction to pro and eukaryotes and differences.pptx
LIFE & LIVING TRILOGY - PART - (2) THE PURPOSE OF LIFE.pdf
B.Sc. DS Unit 2 Software Engineering.pptx
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Climate Change and Its Global Impact.pptx
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
Myanmar Dental Journal, The Journal of the Myanmar Dental Association (2013).pdf
LIFE & LIVING TRILOGY - PART (3) REALITY & MYSTERY.pdf
Skin Care and Cosmetic Ingredients Dictionary ( PDFDrive ).pdf
HVAC Specification 2024 according to central public works department
English Textual Question & Ans (12th Class).pdf
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
Climate and Adaptation MCQs class 7 from chatgpt

Bowling Green State University Digital Forensics Challenges Project.docx

  • 1. Bowling Green State University Digital Forensics Challenges Project Question DescriptionDigital forensic investigators are often challenged to access encrypted data or to process data and systems that have been subjected to antiforensic techniques. In both cases, a user or system designer has taken steps to make the data more difficult to access and the investigator must apply all known and reasonable techniques to access the data. The goal of this project is to familiarize you with encryption basics, various encryption implementations, antiforensic techniques, and attacks on encryption systems and passwords.This project consists of six steps. Completion will lead to the development and distribution of a job aid and sample investigative report. The job aid (Steps 1 and 5) will explain basic cryptography, password cracking, and interception attacks. The investigative report (Steps 2, 3, and 4) will document the processing of files, partitions, and software, and the data derived from these analyses. As seen in the scenario, cryptography is a complex topic, and you need to find a simple way to ensure the temporary employees can perform the work your agency requires. Ready to get started? When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.1.2: Develop coherent paragraphs or points so that each is internally unified and so that each functions as part of the whole document or presentation.1.3: Provide sufficient, correctly cited support that substantiates the writer’s ideas.1.4: Tailor communications to the audience.1.5: Use sentence structure appropriate to the task, message and audience.1.6: Follow conventions of Standard Written English.1.7: Create neat and professional looking documents appropriate for the project or presentation.2.1: Identify and clearly explain the issue, question, or problem under critical consideration.2.2: Locate and access sufficient information to investigate the issue or problem.2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.2.4: Consider and analyze information in context to the issue or problem.2.5: Develop well-reasoned ideas, conclusions or decisions, checking them against relevant criteria and benchmarks.3.2: Employ mathematical or statistical operations and data analysis techniques to arrive at a correct or optimal solution.4.1: Lead and/or participate in a diverse group to accomplish projects and assignments.5.4: Demonstrate an understanding of the different parts of a computer5.5: Apply risk management principles to an investigation.6.1: Perform report creation, affidavit creation, and preparation to testify6.2: Demonstrate ability to investigate mobile technology6.4: Demonstrate the ability to gather file system evidence.6.6: Perform
  • 2. malware analysis6.7: Access encrypted data or process data and systems that have been subjected to anti-forensics techniques9.2: Evaluate Enterprise Architecture