answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
eimsori [14]
2 years ago
9

As part of the duties of a digital forensics examiner, creating an investigation plan is a standard practice. Write a 3 to 4 (no

t including title or reference page) page paper that describes how you would organize an investigation for a potential fraud case. In addition, list methods you plan to use to validate the data collected from drives and files such as Word and Excel, with hashes. Specify the hash algorithm you plan to use, such as MD5 or SHA1. Make sure you follow the grading rubric and write your paper in APA format.
Computers and Technology
1 answer:
Simora [160]2 years ago
7 0

Answer:

A digital forensic investigation is a special case of a digital investigation. Where the procedure and techniques are used will allow the results to be entered into cost of low foreg on investigation may be started to answer a question about whether or not centraband digital images exist on a computer.

Here we are considering the case of Global Finance Company with wide range of financial products and wide range of customers throughout the world. A suspect of compromise has been detected from the manager's computer. Now the team has been deployed to the branch office and conduct the Digital Forensic Investigation.

Concern of the Company

1. Regular updates for application infrastructure and network infrastructure.

2. One branch managers from porisbane branch felt compromises in his computer.

3. Both the servers and work station from all the offices are based on Microsoft Windows.

4. The firewalls and network segmentation are fully implemented.

5. Through intrasion detection and logging exist in the brances these are hardly used.

Digital Forensic Investigation Approach

The audit term of the Global Finacnce Company can follow four step. The digital forensic investigation model stands to be most effective model for investigation of the compromise happened int he reginal branch of the Global Finance Company.

1. Collection

a. All information from the manager's workstation, servers and other workstations must be collected.

b. Obtain all the important informtation.

c. Identify storage context noth internal and external devices.

d. Forensic tools that are applicable and to be used for the investigation are to be listed and made available for usage.

e. Target computer forensic imaging to be done and hashed to check the integrity of data.

f. Line network traffic has to captured.

Digital Evidance Collection done in two stages:

Volatile memory is the temporary memory and primary volatile memory is RAM

By cinning command: Cryptcat6543 -k key

Computer data can now required with the command Cryptcat -1 -p6543 -k key>>

Non volatile Memory Acquisition: Permanent memory or volatile memory stands significant source for the digital forensic investigation.

Parmanent data is collected through both online and offline methods:

Offline data is collected from the hard drive applications tool such as Guymayers etc.

Online data like firewall logs, antivirus logs and domain controller log with help of wires work and ethernal collected.

2. Examination

Once the data collected detailed examination is done by comparing the original and logical copies collected. Such examination gives us clues of how manege for window registry examination. Command used echo text_mess > file1.text : file2.txt

The above file retrieved through the command more < file1.txt : file2.txt

The network forensic is enabled using the tools and techniques so that the following potential information can be accessed.

System Information, Service listing, Process listing, Registry information, Binary dumped of memory

3. Analysis with Assumption

Many tools and methodologies are used by the audit team to analyse the collection and examined evidence. Analysis is done according to the following:

a. Leyword searches in all the files

b. Recovering the deleted files

c. Registry information extraction from the workstation

The tools used in this phase are FTK and ILOOKIX. These tools are helpful to recover the document, chat, logs, emails.

4. Report

The final report is generated by the audit team

Purpose of report Digital Forensic investigation conducted on the compromise of manager's computer

Author of the report Aufit Team

Incident Summery The source of compromise are x, y, x

Evidence All the effected files, registry, log files

Analysis All the analyzed data analyzed

Conclusion All digital evidence are extracted and found from the source

Document support volatile and non volatile data, tools, log info, registry info and so on.

You might be interested in
Which is true regarding pseudocode
Andrews [41]

Answer:

The features of pseudocode are:

It uses plain english statements.

It emphasizes on the design of the computer program.

It uses structured english.

It is detailed and readable to draw an inference.

It enables the programmers to concentrate on the algorithms.

Explanation:

Clues!!!! Your welcome

8 0
2 years ago
If the result is for a BART Transit Station: "Daly City Station" with the result address "Daly City,CA". What is the correct rat
Sholpan [36]

Answer:

c. Incorrect street number and correct street name

Explanation:

Bay Area Rapid Transit (BART) is a transportation system that runs along San Francisco in California. The transport system knows the streets of California because it runs on it.

The system keep on improving with time and following the trends of other transport systems in the the world, Like using the Debt cards and credit card to charge for their fares. More than 433,000 people use the transportation system in California.

From the question, The resulting address is accurate while entering ‘Dala city Station’, to the BART Transit Station, the address comes as Dala City CA 94014.

3 0
2 years ago
bill and melinda have two young children ages 2 and 4 and they are not covered under any life insurance policy. Melinda is full
Jet001 [13]
Melinda and Bill should brainstorm to think of ways on how to have another additional income. In the case of Melinda, she could start a small business or any ways in which she could earn at home. Also, they could track down their expenses and find ways to cut down expenses to have some spare money to start paying for a life insurance policy. 
4 0
1 year ago
Your company wants to conduct an exploratory study to gain new insights into some product changes you are considering. Which typ
Lina20 [59]

Answer: Primary Research (Focus Group).

Explanation:

Exploratory Research is an inquiry that seeks to understand the basic causal factors of a problem. This effort can serve as the basis of more intensive research later on.

There are basically two methodologies used, which are the; Primary and Secondary methods. While the Primary method's source of information is the concerned group, the Secondary Methods obtain their information from already existing information (Primary sources), such as Interviews, Journals, etc.

In the case of the company in the question, seeking to gain insight into the changes in a product, it would be best for them to consider what some selected costumers (focus group), think about the existing products and their views on subsequent changes. This method of getting information directly from the focus group employs the primary method.

3 0
1 year ago
The fact that the speed of a vehicle is lower than the prescribed limits shall relieve the driver from the duty to decrease spee
blsea [12.9K]

Explanation:

the answer is false ........

4 0
2 years ago
Read 2 more answers
Other questions:
  • Computer hardware without software is useless while computer software without hardware is meaningless. Discuss. Plz provide exam
    15·1 answer
  • Gaven's instructor told him to include a personal statement in his work portfolio. Why did his instructor recommend including a
    6·1 answer
  • Blender questions
    8·2 answers
  • Someone else can drive your car if _____.
    12·2 answers
  • QUESTION 2 of 10: New shoes are on SALE. You find a pair you like for $85 dollars. But you only have $45 with you. So, you pay $
    13·1 answer
  • A company wants to publish Knowledge articles to its Customer Community. The articles should be organized for easy navigation by
    6·1 answer
  • Write a program to determine all pairs of positive integers, (a, b), such that a &lt; b &lt; 1000 and [a2 + b2 + 1)/(ab) is an i
    13·1 answer
  • 14.28. Consider the relation R, which has attributes that hold schedules of courses and sections at a university; R = {Course_no
    7·1 answer
  • Write a program that generates 1,000 random integers between 0 and 9 and displays the count for each number. (Hint: Use a list o
    12·1 answer
  • The variable isopen is to be used to indicate whether or not a store is currently open. Which of the following is the most appro
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!