Analyze all e-mail messages found in the pst file

Assignment Help Computer Engineering
Reference no: EM13811044

Assignment- E-mail Forensics

The purpose of this lab is to learn more about forensic analysis of e-mail using FTK to present evidence and create a report.

Use the version of FTK (1.81.2) available on the Nelson textbook CD or downloaded from the shared course drive to process the Lab file under Course Content.

As with other labs, it is important in this lab to not only discuss the processes and results but also show them. Make sure take screenshots and discuss them. Please make sure to embed them in your document and label them (e.g., Lab4-Image1: Complete E-Mail Header).

Assignment

For this lab, analyze the <Jim_Shu.pst> file to collect and present evidence that implicates him in industrial espionage. Jim's company suspects him of selling designs and other information to a competitor. The company has hired you to collect and present evidence that supports their suspicions.

You will need the image in the Course Content called Lab4.pst

1. Use FTK to analyze all e-mail messages found in the pst file.

2. Find correspondence that supports the company's suspicions. The company wants a solid case, so showing the information was exchanged is important.

3. Write a report that will be presented to the company that includes screens of e-mail messages to support your findings.

Reference no: EM13811044

Questions Cloud

Discuss the positives and negatives of affirmative action : Discuss the positives and negatives of affirmative action in general and whether you agree or disagree with the specific findings of the case.
Business-government-society interdependence : 1. Which statement is NOT correct about the business-government-society interdependence?
Find the magnitude of the angular acceleration : How many more revolutions would it take the disk to reach an angular speed - magnitude of the frictional force exerted by the track on the car tires to keep the car in a circle.
Challenging apple trademark for the term : Apple is also in a legal dispute with Microsoft Corp., which is challenging Apple's trademark for the term "app store."
Analyze all e-mail messages found in the pst file : Use FTK to analyze all e-mail messages found in the pst file. Find correspondence that supports the company's suspicions. The company wants a solid case, so showing the information was exchanged is important
Solutions to genetic discrimination based on genetic privacy : Solutions to Genetic Discrimination based on Genetic Privacy
Subcontractors for a government project : Why would subcontractors for a government project want their activities on the critical path? Under what conditions would they try to avoid being on the critical path?
Find all the pictures of real weasels : Use FTK to find all the pictures of real weasels and created a bookmark. Using the Report Wizard, create a report containing the bookmark you just created
What powers are extended to the federal government : What powers are extended to the federal government. Explain in detail. What components of the US Constitution describe and detail the powers extended to the federal government

Reviews

Write a Review

Computer Engineering Questions & Answers

  How to display the sorted data

Using Java write down a program to create a file named Exercise8_5.txt if it does not exist. Write 100 randomly created integers into the file using text I/O. Integers are separated by spaces in the file. Read the data back from the file and displ..

  In short define asynchronous communications

express packet switching and the benefits of packet switching. What are examples of packet switching networks.

  A brief explanation of how the game was integrated

A brief explanation of how the game was integrated with the concepts of computing, if the game already exists. Three scenarios of game play including

  What part will the internet play in your plans

If you were responsible for setting up a network for a company that had offices in 5 different states, how would you do it? What part will the Internet play in your plans.

  As a new graduate of umucs cybersecurity program you have

as a new graduate of umucs cybersecurity program you have decided to apply in a competitive selection process to a

  How the smallest word is at offset 0000

Sort all the words in memory that could be considred to be decimal ASCII-coded numbers. An ASCII-coded word can vary from 3030h (00d) to 3939h (99d). Sort the ASCII words so that the smallest word is at offset 0000.

  Some it department policies are designed to prevent

some it department policies are designed to prevent behaviors by it staff. while some depend upon the employee

  How to insert a row into the student table

Make yourself a student by writing and executing an INSERT statement to insert a row into the STUDENT table with data about you. Use one of the zip codes you inserted.

  The default text-based command-driven communication

If you need to create clean Web pages, which of the following is the best choice. If you need to create a text document with some graphics and format it for printing, which of the following is the best choice. Computer directories or folders are use..

  How is the logical-to-physical address

How is logical-to-physical address mapping accomplished in this system? (For the indexed allocation, assume that a file is always less than 512 blocks long.)

  Disadvantages of using mobile computing technology

Analyze the advantages and disadvantages of using mobile computing technology to monitor patients. Assess the security concerns with regard to the transmission of personal medical information over wireless networks

  Discuss various types of dbmss

Discuss differences among data, information, and knowledge.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd