Fill in order details

  • Submit your instructions
    to writers for free!

Chat with the writer

  • Chat with preferred expert writers
  • Request a preview of your paper
    from them for free

Editing

  • Project edited by the quality evaluation department

Download Your Completed Project

  • Download the completed project from your account or have it sent to your email address

How does an organization’s cyber defense methods affect

System Forensics and the Attack

You are scheduled to have a job interview with the FBI and you are preparing an intriguing presentation on digital forensics.

Research a recent (within 2 years) cyber crime found on the U.S. Justice Department website, provide a report on how digital forensics were used within the FBI’s investigation, and what could have been improved.

Your report (PowerPoint or another presentation style) should include:

  1. Brief overview of the cyber crime
  2. Methods of digital forensics used for investigation
  3. Your evaluation of the investigation

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite.

Host Forensic Analysis

How can you tell what information an attacker has infiltrated from a network? Performing a forensic analysis of the compromised system will provide the cybersecurity professional with a road map of the attacker’s goals and compromises.

Using one of the exploited VMs that you compromised earlier in the class, perform a host forensic analysis on the specified virtual system that was compromised in the exploit topic of the course. At a minimum, include system logs and file system changes.

Respond to the following questions:

  1. What did the attacker do?
  2. What traces did they leave?
  3. Could you use your findings in legal proceeding? Why or why not?

Keep in mind that you exploited this virtual machine using Metasploit and a well-known vulnerability exploit tool. Ensure that you understand the evidence that these tools leave behind.

Document the analysis in a 500- to 750-word paper, taking screenshots as you go.

In addition, within the analysis, address the following questions. Refer to the required readings prior to addressing these questions.

  1. How could the “Kill-Chain Methodology” be used to prevent this type of attack in the future?
  2. Would the Diamond Model of Intrusion Analysis influence your analysis?

While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Course Materials if you need assistance.

Topic 7 DQ 1

As the internet grows, it becomes an everyday part of our lives (smartphones, homes, and cars). What is online anonymity? In today’s information age, can you truly be anonymous online, and should you? Does the government have the right to mandate internet access to only verifiable entities?

What our customers say
_____

error: Content is protected !!