Conduct a forensic fila analysis

Assignment Help Software Engineering
Reference no: EM132166293

LAB: FILE ANALYSIS INSTRUCTIONS

1. Use the lab virtual environment for this assignment where specific instructions for tasks and deliverables are located. After completing the lab, write a lab report that includes all of the required deliverables, screen shots of each operation, and any additional information you gathered.

2. You are also required to include at least one page of written content with a minimum of 2 referenced citations that discusses your findings from each of the lab operations. This can include reasons why the findings are important, actions the organization can take to solve any discovered problems, and any other pertinent information you discovered. This content can be included anywhere in your lab report as long as you meet the one page requirement.

3. Your report must also include Biblical integration that relates a Bible verse, passage, or concept to the assignment. This will count as one of your required citations.

4. APA style references must be included for each citation used.

5. Extra credit sections are not required but, if you complete them, earned points will be used to offset missed sections in the other parts of the lab.

You can use any tools available to you on the lab system but keep the focus on recovering information without destroying the original files.

Client: Liberty Vacation Planning Inc. (LVP)

Project: File Analysis

1. Project Objectives

With this statement of work, LVP is engaging you to conduct a forensic fila analysis of the suspicious executable file unknowingly downloaded to one of its networked workstations. The objectives of this assessment are as follows:

- Create a digital case file using P2 Commander and index the files on the suspect hard drive. Use your own name as the name of the case file.
- Identify the name and location of the downloaded file.
- Generate an annotated report of the investigation using P2 Commander.

2. Project scope

The scope of the file analysis project is as follows:

- The network-connected workstation named Windows7

Note: Any items not listed here are considered out of scope for this project; the addition of out of scope items to the project scope will not be made without prior approval and authorization from LVP and will be handled through change requests or as separate SOWs.

3. Project deliverables

The deliverable(s) for this project are as follows:

a. Proof of indexed drive in P2 Commander case file

This proof will be provided in the following manner:

- A screenshot of the P2 Commander window showing the number of sorted files in the case.

b. Proof of the name and location of the virus file

This proof will be provided in the following manner:

- A screenshot showing the name and location of the file within the suspect drive.

c. Proof of annotated report

This proof will be provided in the following manner:

- A screenshot showing the P2 Commander report of the investigation with your notes indicating the file location.

4. Access to system

We have dedicated a Windows workstation on our internal network (Windows7) for use in your review. From the dedicated machine, you may access the P2 Commander software.

Use the user account provided in the following table to access our network:

5. Project schedule

All services outlined under the project scope will be completed within two weeks of receiving this statement of Work.

Note: any changes to project objectives or project scope will be handles through change requests or separate SOWs.

6. Authorization

This Statement of Work will serve as written authorization for this assessment activity.

Verified Expert

In this assignment, we have studied and made an analysis of case study for LVS client. We have created a case file and then create an analysis of the index drive and all content in the drive and also perform analysis on the suspect file and viruses and also create the report by using commander p2 tool. We have performed all operations and create evidence of report in p2 commander.

Reference no: EM132166293

Questions Cloud

Understand competitive intelligence : What is competitive intelligence and why is it important for entrepreneurial firms to understand competitive intelligence and possibly use it to gain
Determine the selling price of the bonds : Flint Inc. manufactures cycling equipment. As the controller of the company, determine the selling price of the bonds
Global strategy discussion : There are many options for entering international markets. In some countries the best option is a joint venture. What are the pros and cons of a joint venture?
What is the dual employer common law doctrine : What is the dual employer common law doctrine? Your response should be at least 75 words in length. What are the two criteria that part-time employees.
Conduct a forensic fila analysis : CSCI 681 - Create a digital case file using P2 Commander and index the files on the suspect hard drive. Use your own name as the name of the case file
Determine the final balance of the inventory of materials : Determine the final balance of the inventory of materials (raw material), the inventory of goods in process and the inventory of finished goods at date of fire
How to measure employees productivity : How to measure employees productivity and what is the factor that affect it?
Review problem on persuasive essay : Many people today believe that U.S. executives are paid too much while others believe that the size of their compensation packages are justified.
Demonstrates one of the first amendment or other speech : Describe a current news story/event which demonstrates one of the First Amendment or other speech issues

Reviews

len2166293

11/14/2018 9:05:40 PM

You can use any tools available to you on the lab system but keep the focus on recovering information without destroying the original files. Submit this assignment by 11:59 p.m. (ET) on Sunday of Module/Week 4.

Write a Review

Software Engineering Questions & Answers

  Draw a state transition diagram for a simple stack machine

Draw a state transition diagram for a simple stack machine. Assume the stack holds n data items where n is a small positive number

  Design a data schema

Design a data schema for [insert example here]. // I like to use one of the products or features at my company, but you could also use familiar scenarios

  Write documentation for an app that monitor sleeping pattern

write a documentation for an app that monitors your sleeping patterns. This should define the expected readership of the document and describe its version history.

  What are the functions of a user interface

What are the functions of a user interface? Do you think the user interface design is important? The user interface is the gateway for the user to access your application or to use your system.

  Design and list 10 test cases and explain the purpose

Design and list 10 test cases and explain the purpose of each of them in 1-2 sentences. (e.g., the purpose of [3, 4, 5] is to test that the program correctly identifies a right angle [9 + 16 = 25]).

  Document for strengths of putnam''s life cycle model

Document for strengths of Putnam's Life Cycle Model (SLIM). Need citations from peer reviewed articles . preferably from Google Scholars. Need citations for every paragraph. Need my document in APA style.

  Project brieffor realz is a real estate agency which

project brieffor realz is a real estate agency which focuses on residential leasing. they lease properties houses as

  Compare and contrast three basic approaches to training

Compare and contrast three basic approaches to training. What is the role of the operations group in the systems development life cycle (SDLC)

  Discuss open source vs closed source vulnerability scanners

Reply to this article with 2 APA references. This week's topic of open source vs closed source vulnerability scanners is in interesting topic

  Contrast the types and role of distributed software

The specific course learning outcomes associated with this assignment are- Compare and contrast the types and role of distributed software architecture.

  Data flow diagram for student assistant of local law firm

Design a data flow diagram to include all functions and data flows as described in this situation, starting from time you submit your time sheet.

  Give three network addresses

Subnet 2 is to support up to 95 interfaces, and Subnet 3 is to support up to 16 interfaces. Give three network addresses (of the form a.b.c .dJx) which fulfill these constraints.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd