Week2_LabHandOut-2%28Ba%20Anh%20Quan%20Pham-24606194%29

pdf

School

University of Technology Sydney *

*We aren’t endorsed by this school

Course

48436

Subject

Computer Science

Date

Apr 3, 2024

Type

pdf

Pages

6

Uploaded by MasterProtonQuetzal28

Report
7108b69a-7a38-42b3-ba59-16568036db32 Page 1 of 6 Lab handout can be discussed in a team. Answers should be submitted individually. No copy pasting. Due: By the end of your today’s lab . Total Marks 32. Weightage 2% of total assessment. Part A (Total 12 Marks) (1) Match the following to their category. Some may belong to more than one (1/2 mark for each correct classification). Computer RAM Keyboard CPU MS Word Scanner Microsoft Outlook Printer iPhone Windows 10 Processor Power Supply Expansion Card Expansion Slot Mac www.Facebook.com Software Hardware Peripherals Other (2) Match the following to their description (1/2 mark for each correct definition) RAM ROM CPU Hard Drive Computer Cache LAN devices BIOS A set of instructions the computer uses during the first initialisation to verify the main hardware components are installed and functioning properly. A special memory subsystem in which frequently used data is duplicated for quick access. Temporary memory that can be read and written to by the microprocessor or other hardware. The control unit of the computer - the device that interprets and carries out instructions. The term used to describe all the hardware components contained in the box. A special type of memory in which data is written onto a chip during manufacture, which is permanent and stores the BIOS. Networked peripherals. A series of magnetically coated disks, which can permanently store data in zeros and ones.
7108b69a-7a38-42b3-ba59-16568036db32 Page 2 of 6 Part B (Total 20 Marks) (1) Assume the following crime scene Here are my responses: (i) Places where digital traces can be found: - Mobile phones of the victim and offender - call logs, text messages, browser history, apps used, location data - Laptops or computers - browser history, documents, emails, chat logs, downloaded files - SIM cards in the phones - contacts, call and text logs - Social media accounts - posts, messages, connections - Cloud storage accounts - files stored or shared online
7108b69a-7a38-42b3-ba59-16568036db32 Page 3 of 6 - Internet service providers - logs of internet usage and connections - Surveillance cameras - video footage - Automated transit cards - travel records - Bank/financial accounts - transaction logs, ATM cameras (ii) Possible digital trace scenarios: - Victim's phone could have call or text logs showing communication with offender - Offender's phone could have internet searches related to crime plans and location - Laptops could have maps and location info of crime scene - Social media posts and messages planning or discussing the crime - Downloaded files or attachments related to tools, plans, research - Automated transit records showing victim and offender travel - Financial transactions purchasing weapons, tools, transportation, etc. (iii) Possible physical traces: - Fingerprints on phones, laptops or other devices
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
7108b69a-7a38-42b3-ba59-16568036db32 Page 4 of 6 - DNA evidence like hair or skin cells - Fibers from clothing, carpets, car seats - Tire tread or shoe imprints - Tools, weapons, or objects left behind - Biological evidence like blood or other fluids In the following two cases (Case A and Case B), two different burglars were caught in a security cameras. Assume that you have access to the cameras. (i) In both these cases, can you find any possible digital traces? If yes, what are they? (2 Marks) Metadata and timestamps on the security camera footage Log files from the security camera system Network logs if the cameras are connected to a network (ii) In both these cases, do you see any possibility of finding physical identities? If yes, what are they? (2 Marks) Possible physical identities: Facial features and other visible characteristics of the burglars Case A Case B
7108b69a-7a38-42b3-ba59-16568036db32 Page 5 of 6 Clothing, shoes, accessories that may be identifiable (iii) In both these cases, do you see any possibilities of finding digital identities? If yes, what are they? (2 Marks) If the burglars interacted with a phone, computer etc. those devices could reveal usernames, accounts Facial recognition search in a criminal database Gait analysis if enough footage of them walking (2) This is the laptop (connected to Web) of a suspect who is accused of viewing child explicit content in the Web (a criminal offense). The suspect denies the charge. Suppose you are investigating this case. (i) Your supervisor asked you to find three possible places to look for digital traces. Where will you look for them? (3 Marks) Three potential places to look for digital traces could be the browser history, cached files, and system logs. These could contain evidence of websites visited and files downloaded. (ii) Suppose you found that child explicit content was indeed viewed from this computer. Now your job is to find digital identity of the person who was using the laptop at that time. List out at least two different ways of establishing these digital identities (3 Marks)
7108b69a-7a38-42b3-ba59-16568036db32 Page 6 of 6 Two ways to try establishing digital identity could be looking for saved usernames/passwords in the browser, or analyzing patterns of usage like timing and writing style in documents. However, digital identities can be obscured, so conclusions should be drawn carefully. (iii) Is there a possibility of finding some physical trace and physical identity on the laptop? If yes, what are they? (2 Marks) Physical traces like fingerprints on the laptop could potentially identify who used it. DNA or hair samples might also be possible to collect from the laptop and keyboard. However, physical evidence alone does not prove what activity occurred digitically.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help