Download as txt, pdf, or txt
Download as txt, pdf, or txt
You are on page 1of 2

** Digital Forensic Assignment Choices (Choose any 2):

**Task 1: Evaluation of Digital Forensic Toolkits

Conduct research to compare various digital forensic toolkits, such as Autopsy and
The Sleuth Kit, and compile a comprehensive report highlighting their distinctive
features and capabilities.

Task 2: Summary of Digital Forensics Case Scenario

Select and read a fictional digital forensics case scenario, then provide a concise
summary outlining essential details, objectives, and the pertinent evidence
involved.

Task 3: Digital Forensic Case Report - Missing Contact on Smartphone

Case Scenario:
A smartphone user has reported the disappearance of a contact from their phone's
contacts list, suspecting accidental deletion. Your mission is to aid the user in
locating and recovering the missing contact.

Key Sources of Evidence:

1. Smartphone's contacts list.


2. Backup or synchronization logs.

Investigation Queries:

1. Is there any evidence within the smartphone's contacts list or logs indicating
the contact's deletion?
2. Can backup or synchronization logs shed light on whether the contact was
recently removed or lost?
3. What steps should be taken to recover or restore the missing contact on the
smartphone?

Task 4: Digital Forensic Case - Unauthorized Social Media Post

Case Scenario:
DigitalAd, a small marketing agency, has detected an unauthorized offensive social
media post on their official company account. The agency is concerned about
potential harm to their reputation. Your mission is to investigate the incident,
determine the identity of the content poster, and assess if any other accounts were
compromised.

Case Details:

- Company: DigitalAd
- Incident Date and Time: Occurred during the weekend when the office was closed
- Incident Description: Offensive content posted on the company's official social
media account.

Key Evidence Sources:

1. Social media account access logs.


2. IP addresses related to login attempts.
3. Employee login history.

Investigation Questions:

1. Can you identify the individual who accessed and posted the offensive content on
DigitalAd's social media account?
2. Were there any unauthorized login attempts or suspicious activities detected on
the company's social media accounts during the incident timeframe?
3. Were any other company-related accounts compromised or accessed during the same
period?
4. What security measures can DigitalAd implement to prevent similar unauthorized
social media posts in the future?

You might also like