logo

MN613: Computer Forensics | Assignment

   

Added on  2020-03-04

21 Pages2953 Words207 Views
COMPUTERNETWORKSECURITY
MN613: Computer Forensics | Assignment_1
Case Study I: Leaving Clues to a CrimeCrime scenarioThis crime scenario is based on the email spoofing cyber-attack to get the financialinformation of the employee. Here the attacker pretending himself as a CEO of the companyand sends email to the employee to get his financial information [1]. Here the main idea ofthe attacker is to build a trust on the victim to get his financial information. The senders emailaddress is not the original address of the CEO and it is used by the attacker. Also the messagelanguage contains red flags and there is a difference between these two mails. Here the senderand receiver mail address are changed from the original one. The second email contains the body of the email which is directly sent by the attackerto claim his financial information [2]. Here we can find out two things. The sender emailaddress contains duplicate domain address and the reply address is in different from the usualreply format. Hence the attacker hopes that the employee will fall in this attack and providefinancial information to steal the money.From these instances, it is very clear that the attacker is looking for the financial information to steal the employee’s money. Here two techniques are used by the attacker. SpoofingHere the attacker uses spoofed email address with company’s domain name.Spear phishingHere the attacker sends email to the employee to sensitive information [3]. ImpersonationHere the attacker pretending himself as a CEO of the company.How to preserve the data from this situationDMARC authentication is used to protect the information against thesespoofing emails. It provides anti-fraud training for the individuals to protectthe data from these attack. This message intelligence is used to identify theseanomalies [4].It is important to capture every piece of data and it is important to protect thedata which is stored in the hard disk of the system. To avoid these spoofing attack, it is important to customize the email from thedifferent sources [5].It is also important to personalize everything to find the generic emails whichare send from the hackers.1
MN613: Computer Forensics | Assignment_2
The Digital clues are created by using the ProDiscover software and it is shown below. Case Study II: Create and Delete Files on USB DriveA Pen drive is selected. Few files are created inside the pen drive and the files are deleted. This is the case and clue for the investigation. Further details for getting the files back are explained below [6].ProDiscover Basic has a worked in announcing apparatus to exhibit discoveries asconfirmation for lawful procedures. One accumulate time zone information, drive data,Internet action, and the sky is the limit from there, piece by piece, or in a full report asrequired. One have powerful scan capacities for catching one of a kind information,filenames and file types, information designs, date ranges, and so forth. ProDiscover Basicgives customers the independence they want in dealing with their own information security[7].Downloaded ProDiscoverRelease8205Basic and installed.2
MN613: Computer Forensics | Assignment_3
New project opened as shown above and gave the DEMO Project name.Capture and add image option is selected.PEN Drive is selected for investigation.3
MN613: Computer Forensics | Assignment_4
Rough files are attachedUSB disk file is investigated by ProDiscover.Create and Delete Files on USB DriveScreenshots the below screen shot shows the files in the USB’s folder. There are three files,1.exel file named with MIT1600422.word file named with MIT1600423.JPG format [8].4
MN613: Computer Forensics | Assignment_5
The below screenshot shows the Student information in a word file.na word file name is MIT1600425
MN613: Computer Forensics | Assignment_6

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital Forensics (Doc) | Assignment
|26
|2413
|62

Preventing Social Engineering Attacks in IT Networking Designing
|6
|779
|218

Digital Forensic Technology: Evidence Recovery and Future Challenges
|8
|2390
|82

Management of Information Technology in Small and Medium Scale Firms
|33
|6309
|75