Analyze a hacking case using wireshark

Assignment Help Basic Computer Science
Reference no: EM131086212

Investigative

Using tools that you learned about in the labs and other course materials, you will analyze digital evidence and construct an argument about the culpability of a criminal suspect. You will be expected to write an Activity Log that documents the analysis steps that you take. You should also write a short Report (4-5 pages).

The Report should include an executive summary, a list of the evidence items examined, a brief discussion of the methods and tools used to perform the analysis, findings, conclusions, any relevant exhibits, and suggestions for further action.

Some options for evidence that you can analyze have been posted. Some of these are images of flash drives that you can analyze with WinHex, using the cslab.sou.edu virtual computer. More advanced students can use open-source software such as SANS Investigative Forensic Toolkit (SIFT), if they prefer.

Another option for the project is to analyze a hacking case using Wireshark. Wireshark is a free and open-source packet sniffer and protocol analyzer that you will learn about near the end of the class. Wireshark is running on the cslab.sou.edu virtual computer or you can install it on your own computer.

As another option, if you prefer, you can analyze evidence not listed. For example, have you received any phishing emails? Have you been the victim of malware, a virus, a cyber attack, cyber stalking? Can you recover and analyze some digital evidence related to these problems?
You could also examine evidence found at your workplace, but a word of caution: Get permission from your supervisor before you analyze workplace evidence. In general, don't snoop on any files on a computer that isn't your own personal computer without getting the permission of the owner of the computer.

In summary, your mission is to analyze digital evidence associated with a possible crime, using skills that you developed in this class. Numerous cases with digital evidence have been posted, or you can select your own case. Just send me email if you are wondering if your case would make a good project.

Reference no: EM131086212

Questions Cloud

Create a windows application that includes four groups : Create a Windows application that includes four groups of two radio buttons each.
Marketing plan together based on the research : It is time to put your marketing plan together based on the research that you have done through Weeks 1-4 (Part 1 tasks). Review the draft of your marketing plan from your assignments, and expand on any sections that need additional detail.
What is the concept behind india growth : India is recognized as a growing Asian emerging power in outsourcing and, subsequently, advanced to international great powers of outsourcing.  Explain what is the concept behind India's growth!
Summarize major perspectives and theories in psychology : Theories lead to hypotheses, which lead to research. Explain which theory you think may have been the influence for the research study that you chose. (For example: psychodynamic, humanistic, social cognitive, behaviorism, or trait theory) Explain..
Analyze a hacking case using wireshark : Another option for the project is to analyze a hacking case using Wireshark. Wireshark is a free and open-source packet sniffer and protocol analyzer that you will learn about near the end of the class.
Advertising regulations in foreign market : What steps should be considered with advertising regulations in that foreign market?" Use examples to illustrate and consider culture, religion, tradition, and form of government.
Broad range of talent management efforts : Describe the broad range of talent management efforts that use software applications by reading The User's Voice: Understanding the Impact of Talent Management Software by Dr. K. Jones and hosted at IHRIM.org.
Can higher percentage of women have high blood pressure : Survey on Inevitability of War A sample of 200 teenagers shows that 50 believe that war is inevitable, and a sample of 300 people over age 60 shows that 93 believe war is inevitable. Is the proportion of teenagers who believe war is inevitable dif..
Describe the set of actions that survive the elimination : In the following game, Describe the set of actions that survive the iterated elimination of strictly dominated actions. Describe the set of actions that survive the iterated elimination of weakly dominated actions

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd