Computer Science  >  Research Paper  >  COIT20267 Computer Forensic Group Assignment 2 (All)

COIT20267 Computer Forensic Group Assignment 2

Document Content and Description Below

Executive summary The report will analyse the problem of ABC University and investigate suing the computer forensic tools. The implementation of information security and network design is providing ... benefit to organization however there are several risks to be considered. The threats and risk involved are lack of protection of vital information of organization, staffs and users from various malicious attacks and spam. Digital forensic tools have been used in this case to find out where the spam mail has been sourced from and inappropriate image has been viewed. The overall process requires a methodology and for this report SANS methodology has been used. Finally the recommendation has been developed in order to protect from such issues in the given case in the future. 2Table of Contents 1.0 Introduction...............................................................................................................................5 1.1 Case background..........................................................................................................................5 1.2 Aim and objective........................................................................................................................5 1.3 Report outline..............................................................................................................................5 2.0 Justification of digital forensic methodology...................................................................................6 2.1 Digital forensic.............................................................................................................................6 2.2 Methodology...............................................................................................................................6 2.3 Systematic computer approach...................................................................................................8 3.0 Resources for the investigation........................................................................................................8 3.1 Planning investigation for evidence gathering.............................................................................8 3.2 Forensic workstation and peripheral needed..............................................................................9 3.3 Forensic tools...............................................................................................................................9 3.4 Skills required by team member..................................................................................................9 4.0 Approach of data Acquisition.........................................................................................................11 4.1 Contingency Planning................................................................................................................11 4.2 Tools of Data Acquisition..........................................................................................................11 4.3 Data validation and verification.................................................................................................11 4.4 Data approaches Acquisition for the investigation of different types of Evidence.........................12 4.4.1 Static Analysis:........................................................................................................................12 4.4.2 Live Analysis approaches:.......................................................................................................12 5.0 Forensics investigation Procedures and steps................................................................................13 5.1 Acquiring the Evidences:............................................................................................................13 5.2 Analysis the result:.....................................................................................................................13 5.3 Reporting...................................................................................................................................14 5.4 Validation and verification of Computer Forensics approaches:................................................14 6.1 Forensics Investigation Techniques:...........................................................................................15 6.1.1 Header Analysis:.................................................................................................................15 6.1.2 Bait Tactics:.........................................................................................................................15 6.1.3 Network device investigation:.............................................................................................15 6.1.4 Server Investigation:...........................................................................................................15 6.2 Email and video Forensics tools:................................................................................................16 36.2.1 Email Tracker Pro:...............................................................................................................16 6.2.2 EnCase Forensic:.................................................................................................................16 7.0 Information Security Policies for ABC University............................................................................17 8.0 Recommendations:........................................................................................................................19 9.0 References.....................................................................................................................................20 41.0 Introduction 1.1 Case background The case scenario is about ABC University that is one reputed university in USA all together having 10 campuses located in 5 different states. The university has RFID technology in ID card to access the building. However, university has no deigned firewall system that makes university network unsecured and university also using old version of OS. Now the university has planned to open its branch in India and China. The university has two cases that involved email spam and inappropriate view of image. The case is handed over to professional computer forensic investigator as ABC University has only two members of IT staff. 1.2 Aim and objective: The main aim of the report is to carry out various investigating forensic tools to solve the given case. The investigation uses tools like Encase software and Access data FTK tools. 1.3 Report outline: The report will first discuss about the methodology of computer forensic and how it varies from other techniques. Secondly, the report will discuss about resources and investigation plan as well as workstation and tools to be used in this case. Then the report will describe about the data acquisition followed forensic analysis procedure depending upon the case evidence. Finally, policy for university is developed and recommendation is made for ABC University [Show More]

Last updated: 3 years ago

Preview 1 out of 20 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of COIT20267 Computer Forensic Group Assignment 2 document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$11.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

65
0

Document information


Connected school, study & course


About the document


Uploaded On

Jun 08, 2021

Number of pages

20

Written in

All

Seller


Profile illustration for Cheryshev
Cheryshev

Member since 4 years

102 Documents Sold

Reviews Received
6
4
1
0
1
Additional information

This document has been written for:

Uploaded

Jun 08, 2021

Downloads

 0

Views

 65

Document Keyword Tags

Recommended For You

Get more on Research Paper »

$11.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·