System Forensics and the Attack
You are scheduled to have a job interview with the FBI and you are preparing an intriguing presentation on digital forensics.
Research a recent (within 2 years) cyber crime found on the U.S. Justice Department website, provide a report on how digital forensics were used within the FBI’s investigation, and what could have been improved.
Your report (PowerPoint or another presentation style) should include:
- Brief overview of the cyber crime
- Methods of digital forensics used for investigation
- Your evaluation of the investigation
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are not required to submit this assignment to LopesWrite.
Host Forensic Analysis
How can you tell what information an attacker has infiltrated from a network? Performing a forensic analysis of the compromised system will provide the cybersecurity professional with a road map of the attacker’s goals and compromises.
Using one of the exploited VMs that you compromised earlier in the class, perform a host forensic analysis on the specified virtual system that was compromised in the exploit topic of the course. At a minimum, include system logs and file system changes.
Respond to the following questions:
- What did the attacker do?
- What traces did they leave?
- Could you use your findings in legal proceeding? Why or why not?
Keep in mind that you exploited this virtual machine using Metasploit and a well-known vulnerability exploit tool. Ensure that you understand the evidence that these tools leave behind.
Document the analysis in a 500- to 750-word paper, taking screenshots as you go.
In addition, within the analysis, address the following questions. Refer to the required readings prior to addressing these questions.
- How could the “Kill-Chain Methodology” be used to prevent this type of attack in the future?
- Would the Diamond Model of Intrusion Analysis influence your analysis?
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Course Materials if you need assistance.
Topic 7 DQ 1
As the internet grows, it becomes an everyday part of our lives (smartphones, homes, and cars). What is online anonymity? In today’s information age, can you truly be anonymous online, and should you? Does the government have the right to mandate internet access to only verifiable entities?
Topic 7 DQ 2
How does an organization’s cyber defense methods affect others’ access to the internet? Is it acceptable for a private company to “hack back”? What are the dangers?
Place your order now on a similar assignment and get fast, cheap and best quality work written by our expert level assignment writers.
Solved Questions:
SOLVED! Describe the difference between a nursing practice