Click here to get an A+ paper at a Discount
Topic: YOLO
Instructions:
You will need to perform a forensic analysis of a hard drive image and associated captured network traffic This is a forensic image that has been taken and is available for you to download and examine. There is a scenario that goes along with this forensic image as well as an associated network traffic.
http://www.forensickb.com/2008/01/forensic-practical.html
You are to download and examine the image file and the pcap files. You should work through this as if it were an actual case. You are free to ask as many questions as you wish to, this thread will serve as the forum for those questions.
The report that you need to generate should have clear sections, a guide will be provided in the upcoming days so that you are not stabbing in the dark as they say.
What you need to know/do:
Review the scenario that is provided on the web page
Gather the tools that you think will be necessary to analyze these files
There is also a UMUC cyber lab that allows you to use more traditional mainstream forensic analysis software, such as FTK and EnCase, I will be sending out the log in instructions this week.
If you want to get a head start on this portion, send me a private message and I will send you the information.
Start your analysis, consider such things as Registry analysis, email analysis, web surfing artifacts, User account activity, malicious files, etc. There are a lot of ways to analyze the data and many tools to assist you.
The point here is that you have been provided with two data sets, they need to be analyzed and the data correlated.
Your deliverable for this final project will be comprehensive report on your findings. A professional report.
Forensics Report
Students will analyze a forensic image provided by the instructor and then write a case report which summarizes their findings. The case report will cover the following information:
Description of the Case
Investigative Issues and Questions
Investigation Process and Procedures
Analysis and Findings
Summary and Conclusions