logo

Forensic Process From Mr. James Computer

   

Added on  2022-09-08

16 Pages1878 Words14 Views
Running head: FCM 753
ASSIGNMENT 7: FCM 753
(Student Name)
(Course Title)
(Tutor’s Name)
(Date)

FCM 753 2
Table of Contents
Executive summary.........................................................................................................................4
Background of the case....................................................................................................................4
Request............................................................................................................................................5
Collection summary.........................................................................................................................5
Evidence searched from Mr.James’ computer.............................................................................5
Investigation report..........................................................................................................................5
Examination details......................................................................................................................6
Forensic process from Mr. James computer................................................................................6
Server analysis.............................................................................................................................8
Server Access Logs..................................................................................................................8
Timeline...........................................................................................................................................8
List of tools used..............................................................................................................................9
Conclusion.....................................................................................................................................10
References......................................................................................................................................11
Figures and screenshot...................................................................................................................12
Snapshot 1: First file browsing with Autopsy............................................................................12
Figure 1: Autopsy of file on target disk.....................................................................................12
Screenshot 2: Camouflage website............................................................................................13
Screenshot 3: Sematext system log analyzer.............................................................................14

FCM 753 3
Screenshot 4: LogFusion analyzer.............................................................................................14
Screenshot 5: Server access logs................................................................................................15
Screenshot 6: Imaging process...................................................................................................16
Screenshot 5: Imaged data.........................................................................................................16

FCM 753 4
Executive summary
In the current 21st-century technology is rapidly advancing, and it is becoming more
difficult to find the truth hidden in digital footprints. This has led to the employment of
sophisticated tools when carrying out a forensic investigation. Some forensic investigators have
employed the use of forensic neural networks to unmask the truth hidden in digital investigation.
To start with a forensic investigation is a branch of computer science that encompasses
investigation and recovery of material found in digital devices. This is in relation to cyber or
computer crime (Sejean & Warren, 2015). Usually, forensic investigations have a variety of
applications. The most common is to support a hypothesis or refute before civil or criminal
courts. This report will employ the current forensic tools to unmask truth on alleged on data theft
from Nice Corporation Company.
Background of the case
Ms. Eileen Jones is one of the employees at Nice Corporation. Recently she received
calls from the company clients that their confidential information such as names has been found
on a public post. Due to this, the company is concerned about a potential hacking incident and
has requested for a forensic investigation.
To conduct an efficient and effective forensic investigation, I employed the use of
advanced tools to find out what information was stolen and when, and whether the company
server was comprised and how. In addition, I used several forensic tools to find if I can get any
information about the attacker. On the alleged accused person Mr. James, where his computer
hard drive analysis was conducted; this was used to analyze on whether his computer was used to
gain access to the Company and if so the method which was used. Also, the analysis was used to
tell the type of data which Mr. James could have accessed

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital Forensics: Steps Taken as an Expert Forensic Examiner
|14
|4268
|500