Analyze a hacking case using wireshark

Assignment Help Basic Computer Science
Reference no: EM131086212

Investigative

Using tools that you learned about in the labs and other course materials, you will analyze digital evidence and construct an argument about the culpability of a criminal suspect. You will be expected to write an Activity Log that documents the analysis steps that you take. You should also write a short Report (4-5 pages).

The Report should include an executive summary, a list of the evidence items examined, a brief discussion of the methods and tools used to perform the analysis, findings, conclusions, any relevant exhibits, and suggestions for further action.

Some options for evidence that you can analyze have been posted. Some of these are images of flash drives that you can analyze with WinHex, using the cslab.sou.edu virtual computer. More advanced students can use open-source software such as SANS Investigative Forensic Toolkit (SIFT), if they prefer.

Another option for the project is to analyze a hacking case using Wireshark. Wireshark is a free and open-source packet sniffer and protocol analyzer that you will learn about near the end of the class. Wireshark is running on the cslab.sou.edu virtual computer or you can install it on your own computer.

As another option, if you prefer, you can analyze evidence not listed. For example, have you received any phishing emails? Have you been the victim of malware, a virus, a cyber attack, cyber stalking? Can you recover and analyze some digital evidence related to these problems?
You could also examine evidence found at your workplace, but a word of caution: Get permission from your supervisor before you analyze workplace evidence. In general, don't snoop on any files on a computer that isn't your own personal computer without getting the permission of the owner of the computer.

In summary, your mission is to analyze digital evidence associated with a possible crime, using skills that you developed in this class. Numerous cases with digital evidence have been posted, or you can select your own case. Just send me email if you are wondering if your case would make a good project.

Reference no: EM131086212

Questions Cloud

Create a windows application that includes four groups : Create a Windows application that includes four groups of two radio buttons each.
Marketing plan together based on the research : It is time to put your marketing plan together based on the research that you have done through Weeks 1-4 (Part 1 tasks). Review the draft of your marketing plan from your assignments, and expand on any sections that need additional detail.
What is the concept behind india growth : India is recognized as a growing Asian emerging power in outsourcing and, subsequently, advanced to international great powers of outsourcing.  Explain what is the concept behind India's growth!
Summarize major perspectives and theories in psychology : Theories lead to hypotheses, which lead to research. Explain which theory you think may have been the influence for the research study that you chose. (For example: psychodynamic, humanistic, social cognitive, behaviorism, or trait theory) Explain..
Analyze a hacking case using wireshark : Another option for the project is to analyze a hacking case using Wireshark. Wireshark is a free and open-source packet sniffer and protocol analyzer that you will learn about near the end of the class.
Advertising regulations in foreign market : What steps should be considered with advertising regulations in that foreign market?" Use examples to illustrate and consider culture, religion, tradition, and form of government.
Broad range of talent management efforts : Describe the broad range of talent management efforts that use software applications by reading The User's Voice: Understanding the Impact of Talent Management Software by Dr. K. Jones and hosted at IHRIM.org.
Can higher percentage of women have high blood pressure : Survey on Inevitability of War A sample of 200 teenagers shows that 50 believe that war is inevitable, and a sample of 300 people over age 60 shows that 93 believe war is inevitable. Is the proportion of teenagers who believe war is inevitable dif..
Describe the set of actions that survive the elimination : In the following game, Describe the set of actions that survive the iterated elimination of strictly dominated actions. Describe the set of actions that survive the iterated elimination of weakly dominated actions

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  The most important income distribution decisions t

The Lorenz curve is a relative measure of income. This becomes obvious when one compares Lorenz curves between nations.  The after-transfer income distribution is the Lorenz curve closest to the diagonal line. Since transfers favor the poor, they cau..

  Computing cycles to save if registers are available

Determine the number of cycles will be saved if both registers are available?

  Assess an organisation information system

Journal task is to assess an Organisation Information System, and write a report. The assessment should focus on the various components of business systems

  What are federal express estimated annual savings

1. Is technology by itself enough to ensure high-quality customer service? 2. What are federal express's estimated annual savings from using information technology? 3. What are a couple of examples of information technologies used by federal Expre..

  Write a program that reads in an integer

Write a program that reads in an integer, and breaks it into a sequence of individual digits. For example, the input 16384 is displayed as 1 6 3 8 4 You may assume that the input has no more than five digits and is not negative

  Is there a fixed path from past to future

Is there a fixed path from past to future, or do our individual momentary decisions shift and twist the course of human events? What people believe about the effects and consequences of their actions is part of the larger picture of what motivates..

  Describe and contrast maintenance and validation

Describe and contrast maintenance and validation techniques.

  Force p required to overcome rolling resistance

Determine the force P required to overcome rolling resistance and pull the 50-kg roller up the inclined plane with constant velocity. The coefficient of rolling resistance is a = 15 mm .

  Why does segment sequence number remain unchanged

Why does the Segment Sequence Number remain unchanged (indicated by a horizontal line in the graphs) with every drop in the congestion window?

  Evaluate the user dialog strategies used by a menu-driven

Suggest alternatives for menu-driven interface design and explain how these alternatives can be designed to eventually replace all menu-driven interfaces.

  What are ids and ips

Write a 2-3 page paper that fully answers the questions.

  What is the difference between intrinsic and acquired value

What is the difference between intrinsic value and acquired value?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd