Describe the environment of your forensic workstation

Assignment Help Computer Network Security
Reference no: EM13330714

1. PROCEEDURE

1.1 Use an evidence form to document the evidence given to you.

1.2 Describe the environment of your forensic workstation and the access to the machine. Describe the procedure that you used to download the image file to your work directory.

1.3 Give at least two SHA-based hash function values of the ISO image.

1.4 Explain why multiple hash values are necessary to verify the validity of the image file.

1.5 Explain the procedure that you used before you could access the image file inside the virtual machine.


2. BINARY DETAILS

2.1 Use a table to document the detailed information of the files found in the root directory of the ISO image-file names, file actual sizes and their MD5 hash values.


2.2 Provide a description of any programs you would like to use based on the files identified on the ISO image.


3. FORENSIC DETAILS
3.1 Describe the key words you used to search the ISO image and explain why you chose them. Detail your search result and give your conclusions. (Document your procedure including commands and screenshots.)

4. LEGAL IMPLICATIONS

4.1 List one violation conducted by Mr. Price against Cybercrime Act 2001, and one violation conducted by Mr. Price against the Crimes Act 1958. Back up your answers with definitions.

4.2 Is this case best pursued as a corporate or criminal investigation? Why? 

Reference no: EM13330714

Conduct an internet search of cyber crimes

Conduct an Internet search of cyber crimes. Find a cyber crime, a crime where a computer is used to commit a majority of the crime that has occurred in the last three months

Explain how you would use the information in item selected

Explain how you would use the information in the item selected with a client or organization. Describe the types of clients or organizations that would benefit from this infor

Defects of gsm networks

Security mechanism, threat, GSM networks, DDoS attacks, IPv4, IPv6, IPsec integrity, authentication and privacy, IPsec AH,  ‘single sign-on' in the context of access control,

Post your thoughts on perception vs reality of cyber threat

Read the article "Cyber Security Risk: Perception vs. Reality in Corporate America". After reading the article, please post your thoughts on the perception vs. reality of a

Secure communication if organization uses symmetric cipher

An organization has 300 members. It is desired that each member of the organization be able to communicate securely with any other member. The organization uses a symmetric

Briefly analyse the candidates - mac, dac and rbac

Each has its own strengths and weaknesses and its own application domain. Each depends on its application domain to choose the suitable authorisation methodology based on th

Server program receives a newline character

The server program receives a NewLine character sent from the client, it will display a message like 'Line from the client: - How much will it be to get some help with this sm

Analyze current state of insider threats to computer systems

Analyze the current state of insider threats to computer systems and infrastructure in terms of numbers, costs and potential problems. What are the various profiles of insid

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd