University | Coventry University (CU) |
Subject | PSB318SE: Data Recovery and Advanced Digital Forensic Analysis |
Learning Outcomes:
The Scenario-based questions cover the following Learning Outcomes:
2. Apply data recovery techniques to forensic investigation in the network and mobile environments.
4. Apply forensic methodology to digital corporate and crime investigation in an ethical and professional context and employ appropriate technically writing skills in its report presentation.
SCENARIO
You’re an analyst at a Singapore manufacturing corporation named WoW Pvt. Ltd. On Wednesday 2015-08-05, you saw some alerts while working at the corporation’s Security Operations Center Department.
While investigation, your team contacts one of the suspected employee, who is not aware of the suspicious files found on his desktop.
The Network administrator helps to retrieve a pcap of traffic for the timeframe of the alerts and the HTTPS traffic logs for that IP address. Another analyst searches the company’s mail servers and retrieves four malicious emails that might be related.
You now have
- Network.pcap – a pcap of the traffic,
- HTTPS traffic logs,
- a collection of artifacts from that HTTPS traffic, and
- malicious emails the suspected employee received during that timeframe.
Stuck with a lot of homework assignments and feeling stressed ? Take professional academic assistance & Get 100% Plagiarism free papers
The scope of DF’s investigation covers :
Inclusion:
- Analyze the Network.pcap (packet capture) files that were captured by the network administrator at WoW Pvt. Ltd.
- Conduct an interview with the alleged employee and general manager of WoW Pvt. Ltd. Take statements from both parties.
- Conduct digital investigation into the alleged employee’s mobile device (corporate-issued) and corporate computing device (workstation).
- Technically evaluate the corporate email server logs in lieu of the footprints of the alleged employee’s computing and mobile devices.
- Figure out how the computer became infected and document your findings. Your report should include:
- List down the name of protocols used in the given pcap.
- List the required protocols to be analyzed for the given case.
- The IP Address of the computer where you found the alerts??
- Who used this computer?
- The infected computer’s hostname.
- The infected computer’s MAC address.
- The infected computer’s operating system.
- The date, time, subject line, and sender of the malicious email that caused the infection.
- Information on any malware associated with the infection.
- Domains and IP addresses of any related traffic.
- A timeline of events leading to the infection.
- How you did the Malware Analysis
Exclusion:
- DRADFA Forensics is not investigating any other devices nor interviewing other parties aside from those mentioned.
- Mr. Lim is the WoW’s general manager (GM). He is the client of DRADFA Forensics with you as the assigned forensic investigator.
Objective:
- Analyze the digital evidence and recommend if the alleged employee had any role in Malware found on the company’s mail server.
- Figure out how the computer became infected and document your findings.
Research, critically analyze, and purposely propose the following for your approach to the forensics investigation:
- Planning consideration and procedures to adopt for investigation
- Technical Tools (hardware, software) to use for acquisition and analysis
- Technical recommendations for analysis and considerations
- Procedures & Guidelines for interviews and considerations
- Considerations for documentation (forms, templates) and reporting
Acquire perfect (PSB318SE) data recovery and advanced digital forensic analysis assignment help at Singapore Assignment Help. We have a group of expert homework helpers who offer impeccable help with Computer forensics assignments to Coventry University (CU) students. Our writers can deal with any level of complex information technology assignments.
Looking for Plagiarism free Answers for your college/ university Assignments.
- HRM331: Talent Management – Strategic Shift from the War for Talent to the Wealth of Talent
- Marginalised Populations – The Structural and Cultural Exclusion of People Experiencing Homelessness in Singapore
- CVEN3501 Assignment 2: Groundwater Modelling of Drawdown from a Pumping Bore
- CSCI312 Assignment 2: Conceptual Modelling and Implementation of a Data Warehouse and Hive Queries
- CH2123 Assignnment : Fugacity, VLE Modeling & Henry’s Law Applications
- BAFI1045 Assignment -Constructing and Evaluating Passive and Active Portfolios Based on the Straits Times Index (STI)
- PSB501EN Assignment 1: Engineering Systems Integration: A Multi-Technique Approach to Mechanical Analysis
- FIN2210E/FIN2212E Group Assignment: Financial Risk Management Analysis of Bursa Malaysia Companies
- FLM101 Assignment: A Cinematic Dissection: Stylistic Elements and Their Thematic Significance
- Assignment: Transforming Talent in the AI Era: From War to Wealth through Ecosystem Innovation