Task 2: Digital Forensics Report (20%) (20 marks)In this major task you are assumed a digital forensics investigator and asked to prepare a digital forensic report for the following scenario:You are investigating a possible intellectual property theft by a new employee of Superior Bicycles, Inc. This employee, Tom Johnson, is the cousin of Jim Shu, an employee who had been terminated. Bob Aspen is an external contractor and investor who gets a strange e-mail from Terry Sadler about Jim Shu’s new project (shown in Figure 8-5 of the textbook on p. 350). Bob forwards the e-mail to Chris Robinson (the president of Superior Bicycles) to inquire about any special projects that might need capital investments. Chris forwards the e-mail to the general counsel, Ralph Benson, asking him to look into it. He also forwards it to Bob Swartz, asking him to have IT look for any e-mails with attachments. After a little investigation, Bob Swartz forwards an e-mail IT found to Chris Robinson (shown in Figure 8-6 of the textbook on p. 350).Chris also found a USB drive on the desk Tom Johnson was assigned to. Your task is to search for and determine whether the drive contains any proprietary Superior Bicycles, Inc. data in the form of any digital photograph as an evidence. In particular, you may look for graphic files such as JPEG on the USB drive hidden with different format. Note for the USB drive image, you need to download the ‘C08InChp.exe’ file from the download section of Chapter 8 on the student companion site of the textbook (Nelson, Phillips, & Steuart, 6/e, 2019). Your task is to search all possible places data might be hidden (e-mails and USB drive) and recover and present any digital evidence in the report.Deliverable: For this forensic examination, you need to provide a report of 1800-2000 words in the format described in presentation section below. Presentationback to topThe following should be included as minimum requirements in the report structure:Executive Summary or AbstractThis section provides a brief overview of the case, your involvement as an examiner, authorisation, major findings and conclusion• Table of Contents• IntroductionBackground, scope of engagement, forensics tools used and summary of findings• Analysis Conductedo Description of relevant programs on the examined itemso Techniques used to hide or mask data, such as encryption, steganography, hidden attributes, hidden partitions etco Graphic image analysis• FindingsThis section should describe in greater detail the results of the examinations and may include:o Specific files related to the requesto Other files, including any deleted files that support the findingso String searches, keyword searches, and text string searcheso Internet-related evidence, such as Web site traffic analysis, chat logs, cache files, e-mail, and news group activityo Indicators of ownership, which could include program registration data.• Conclusion Summary of the report and results obtained• ReferencesYou must cite references to all material you have used as sources for the content of your work• GlossaryA glossary should assist the reader in understanding any technical terms used in the report. Use a generally accepted source for the definition of the terms and include appropriate references.• AppendicesYou can attach any supporting material such as printouts of particular items of evidence, digital copies of evidence, and chain of custody documentation.Follow the referencing guidelines for APA 6 as specified in Referencing Guides.Please insert screenshots of autopsy of every step .