Enterprise Information Security - Engineering Assignment Help

Download Solution Order New Solution
Assignment Task :

Step Two: Analyse the information in the generated reports. What information can you find? For example 

• who are the users? 

• what personal information is found? 

• which Internet sites have been visited? 

• which communication trails are found? 

• what are the users’ hobbies or interests? 

• what did you find that surprised you? 

• did you find potential threats? 

For each step in your analysis make detailed notes for your forensic report. Other tools may be used, such as grep (grepWin or greppie), Hex editor (HxD or 0xED), ExifTool, SleuthKit (Autopsy) 

Step Three: Write the Case Report which should contain these headings 

The Case Summary In the case summary, the basic information about the situation is briefly described. What happened to lead to an investigation being launched? Remember you are role playing a digital forensic analyst. 

Acquisition and Preparation The report goes into the steps taken in preparing the devices and media for examination and how the examination of the materials was conducted. This section of the final report summarises the details that are in the various examinations logs that were collected along the way. It is not necessary to be quite as detailed here, but it is important that no steps be left out. You should not include details of sensitive information in the 

  

Individual Assignment  Enterprise Information Security 

report. Details that should be included are any actions taken prior to evidence acquisition (such as photographic records; how the media where forensic copies were stored was prepared, including what tools were used to protect and/or sanitise the media; before/after hash values of disk images examined; tools that were used for making images; individual steps that were taken during each process. Include times and dates that evidence items were handled. 

Findings The findings section is not a place for coming to conclusions. This is only where the re- sults of the various tests, examinations, and procedures are reported. As with the preparation stage, it is necessary to document what tools were used and what steps were taken, but not a minutely detailed description. The process used in any given file search should be described, including such details as search strings used, Boolean operators used, and so forth. Rather than list each and every file found during the search, a summary of findings, including the number and types of files found, is in order. The results of an Internet search would include a listing of any Web sites visited by users on the target system, organised by user. A histogram of Internet activity could be included to show where most activity occurred. 

 

This Engineering Assignment  has been solved by our Engineering  Experts at My Uni Papers. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.

Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

Get It Done! Today

Country
Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
+

Every Assignment. Every Solution. Instantly. Deadline Ahead? Grab Your Sample Now.