Conduct a forensic fila analysis

Assignment Help Software Engineering
Reference no: EM132166293

LAB: FILE ANALYSIS INSTRUCTIONS

1. Use the lab virtual environment for this assignment where specific instructions for tasks and deliverables are located. After completing the lab, write a lab report that includes all of the required deliverables, screen shots of each operation, and any additional information you gathered.

2. You are also required to include at least one page of written content with a minimum of 2 referenced citations that discusses your findings from each of the lab operations. This can include reasons why the findings are important, actions the organization can take to solve any discovered problems, and any other pertinent information you discovered. This content can be included anywhere in your lab report as long as you meet the one page requirement.

3. Your report must also include Biblical integration that relates a Bible verse, passage, or concept to the assignment. This will count as one of your required citations.

4. APA style references must be included for each citation used.

5. Extra credit sections are not required but, if you complete them, earned points will be used to offset missed sections in the other parts of the lab.

You can use any tools available to you on the lab system but keep the focus on recovering information without destroying the original files.

Client: Liberty Vacation Planning Inc. (LVP)

Project: File Analysis

1. Project Objectives

With this statement of work, LVP is engaging you to conduct a forensic fila analysis of the suspicious executable file unknowingly downloaded to one of its networked workstations. The objectives of this assessment are as follows:

- Create a digital case file using P2 Commander and index the files on the suspect hard drive. Use your own name as the name of the case file.
- Identify the name and location of the downloaded file.
- Generate an annotated report of the investigation using P2 Commander.

2. Project scope

The scope of the file analysis project is as follows:

- The network-connected workstation named Windows7

Note: Any items not listed here are considered out of scope for this project; the addition of out of scope items to the project scope will not be made without prior approval and authorization from LVP and will be handled through change requests or as separate SOWs.

3. Project deliverables

The deliverable(s) for this project are as follows:

a. Proof of indexed drive in P2 Commander case file

This proof will be provided in the following manner:

- A screenshot of the P2 Commander window showing the number of sorted files in the case.

b. Proof of the name and location of the virus file

This proof will be provided in the following manner:

- A screenshot showing the name and location of the file within the suspect drive.

c. Proof of annotated report

This proof will be provided in the following manner:

- A screenshot showing the P2 Commander report of the investigation with your notes indicating the file location.

4. Access to system

We have dedicated a Windows workstation on our internal network (Windows7) for use in your review. From the dedicated machine, you may access the P2 Commander software.

Use the user account provided in the following table to access our network:

5. Project schedule

All services outlined under the project scope will be completed within two weeks of receiving this statement of Work.

Note: any changes to project objectives or project scope will be handles through change requests or separate SOWs.

6. Authorization

This Statement of Work will serve as written authorization for this assessment activity.

Verified Expert

In this assignment, we have studied and made an analysis of case study for LVS client. We have created a case file and then create an analysis of the index drive and all content in the drive and also perform analysis on the suspect file and viruses and also create the report by using commander p2 tool. We have performed all operations and create evidence of report in p2 commander.

Reference no: EM132166293

Questions Cloud

Understand competitive intelligence : What is competitive intelligence and why is it important for entrepreneurial firms to understand competitive intelligence and possibly use it to gain
Determine the selling price of the bonds : Flint Inc. manufactures cycling equipment. As the controller of the company, determine the selling price of the bonds
Global strategy discussion : There are many options for entering international markets. In some countries the best option is a joint venture. What are the pros and cons of a joint venture?
What is the dual employer common law doctrine : What is the dual employer common law doctrine? Your response should be at least 75 words in length. What are the two criteria that part-time employees.
Conduct a forensic fila analysis : CSCI 681 - Create a digital case file using P2 Commander and index the files on the suspect hard drive. Use your own name as the name of the case file
Determine the final balance of the inventory of materials : Determine the final balance of the inventory of materials (raw material), the inventory of goods in process and the inventory of finished goods at date of fire
How to measure employees productivity : How to measure employees productivity and what is the factor that affect it?
Review problem on persuasive essay : Many people today believe that U.S. executives are paid too much while others believe that the size of their compensation packages are justified.
Demonstrates one of the first amendment or other speech : Describe a current news story/event which demonstrates one of the First Amendment or other speech issues

Reviews

len2166293

11/14/2018 9:05:40 PM

You can use any tools available to you on the lab system but keep the focus on recovering information without destroying the original files. Submit this assignment by 11:59 p.m. (ET) on Sunday of Module/Week 4.

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd