Analyze all e-mail messages found in the pst file

Assignment Help Computer Engineering
Reference no: EM13811044

Assignment- E-mail Forensics

The purpose of this lab is to learn more about forensic analysis of e-mail using FTK to present evidence and create a report.

Use the version of FTK (1.81.2) available on the Nelson textbook CD or downloaded from the shared course drive to process the Lab file under Course Content.

As with other labs, it is important in this lab to not only discuss the processes and results but also show them. Make sure take screenshots and discuss them. Please make sure to embed them in your document and label them (e.g., Lab4-Image1: Complete E-Mail Header).

Assignment

For this lab, analyze the <Jim_Shu.pst> file to collect and present evidence that implicates him in industrial espionage. Jim's company suspects him of selling designs and other information to a competitor. The company has hired you to collect and present evidence that supports their suspicions.

You will need the image in the Course Content called Lab4.pst

1. Use FTK to analyze all e-mail messages found in the pst file.

2. Find correspondence that supports the company's suspicions. The company wants a solid case, so showing the information was exchanged is important.

3. Write a report that will be presented to the company that includes screens of e-mail messages to support your findings.

Reference no: EM13811044

Is there the standard for drc

I would like to ask a question about Disaster Recovery Site Certification? Is there certification for DRSC for computers and application? Is there a standard for DRC.

Write down an algorithm which using pseudo code

Write down an algorithm, using pseudo code, to perform one of the following tasks,* Given a string of numbers, identify all of the substrings that form numbers that are divi

Make a perl script that accepts the name of directory

build a Perl script that accepts the name of directory as an argument to the script, and lists out the files in this directory that are older than 2 hours from the time the

Create preventative controls for video game design company

Create Preventative Controls for SunGrafix, a video game design company. In some cases, the outage impacts identified in the BIA may be mitigated or eliminated through preve

Discuss the core security mechanisms

Discuss the core security mechanisms Windows implements to prevent the attacker achievingthat goal - Discuss briefly how the above outlined security mechanisms would fail, and

Draw negative edge triggered t flip flop

Draw a negative edge triggered T flip flop. Circuit has two inputs, T(toggle) and C(clock) and output Q and Q'. Output state is complemented if T=1 and clock C changes from

What do you mean by ado.net

Your boss met with you this morning to inform you that the system you wrote two years ago using dBase IV now needs to be rewritten using Visual Basic.NET and ADO.NET.

Develop and deploy a smart application

You are allowed to use available services of IBM Bluemix like IoT foundation services to develop smart applications. There are many demo codes like Connected Vehicle applica

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd