Describe the tools and procedures used for acquiring

Assignment Help Computer Engineering
Reference no: EM133422833

Scenario: LMJ-Ad corporate management has been informed by the network administrative team that there was a malware attack and infection overnight at the system level, now spreading to the network enterprise level, requiring the incident response team to take immediate action. The infection came from a malware attachment on a phishing email and was reported by a user with a priority trouble ticket. Initial interviews suggest the incident may have come from an internal employee.

section 1.0 : Date, time, and time zone for first detection
Example: Threat identified 8/6/20; 11:34am; ET

Section 2.0 Impacted Personnel : List names and contact information for all persons involved in detection and initial investigation
Example: Mr. John Doe; Incident Response Lead; 555-555-5656; Mrs. Jane Doe; Network Engineer; 556-557-5678

Section 3.0 Incident Detection Specific: How was the incident detected?
Example: IDS/IPS/HIDS/NIDS alerts; Violation of user behavior baseline; security event threat detection; suspicious network traffic patterns; ransomware, or malware alerts from anti-virus/malware software

Section 4.0 Threat Identification : What do you think the threat is?
Example: Classification of threat is based on type of behavior analyzed either live or via logs, and recovered digital forensics data

Section 5.0 Infected Resources ( List of systems and network components involved both at the system and network levels: System 1, 2, 3; Network component A, etc., and infections found

Example: Lenovo 20L5000; Serial #; IP Address x; infection

Section 6.0 Digital Evidence : Where can supporting evidence be found?

Example: Location of log file, log file types, time stamps, screen shots, IDS reports

Section 7.0 Tools and Procedures : Describe the tools and procedures used for acquiring the media (ex., disk-to-disk, disk to image, sparse copy), thus creating the forensic image of the media for examination.

Reference no: EM133422833

Questions Cloud

Explain the normal functioning of muscle contraction : Be sure to explain the normal functioning of muscle contraction, and how the injury is affecting that normal functioning.
Explain specialized terms or concepts to facilitate audience : Explain specialized terms or concepts to facilitate audience comprehension and Produce grammatically correct material in standard academic English that supports
Discuss about the four types of markets : Now that you know about the four types of markets, see if you can find a company example that fits in each of the four types of markets, share and explain those
What is opinion of oregon physician-assisted suicide law : According to research, the Oregon's physician-assisted suicide law is a law that allows individuals to end their lives through a lethal dose of medication.
Describe the tools and procedures used for acquiring : Describe the tools and procedures used for acquiring the media (ex., disk-to-disk, disk to image, sparse copy), thus creating the forensic image of the media
Determine the size of the equal replacement payments : Diana has to settle a debt, for which scheduled debt payments of $3800.00 was due seven months ago, $4700.00 was due two months ago, and $8800.00 due in five
Difference between psychology-anthropology : What is the difference between Psychology, Anthropology, and Sociology? What does each of them study? Can one exist without the other?
How did amazon use process design : how did amazon use process design? what type of processing did they use ? did they use technology innovation ? what kind kd automation did they use ?
Would we expect gasoline inelasticity to differ between : Consider that although the demand for gasoline is generally inelastic, the demand for gasoline from any single gas station, or chain of gas stations

Reviews

Write a Review

Computer Engineering Questions & Answers

  Summarize the advantages of modular data centers

Do some Internet research on modular (pod) data centers. Summarize the advantages of disadvantages of modular data centers.

  Identify the main feature or features of website

COIT 20268 - Responsive Web Design (RWD) - Identify and elaborate the main feature or features of the website - Invite two other persons to review the nominated

  How the emerging technologies are impacting organizations

Complexity of Information Systems Research in the Digital World. Complexity is increasing as new technologies are emerging every day. This complexity impacts.

  Minimum size of instruction

An imaginary computer has the 16 data registers (R0 to R3), 1024 words in memory, and the 16 different instructions (add, subtract, etc.). Explain the minimum size of the instruction in bits.

  Find speed of execution of application programs

As computer word size gets larger and larger, there is a law of diminishing returns; the speed of execution of application programs does not increase and may, in fact, decrease. define why this can occur.

  Collect a message from the user and writes it out again

Write a main function (Method,Procedure) that collects a message from the user and writes it out again.

  How ordered list implemented as a doubly linked list used

Describe how an ordered list implemented as a doubly linked list could be used to implement the map ADT

  Describe two cryptocurrencies with applicable examples

The vast majority of the population associates Blockchain with cryptocurrency Bitcoin; however, there are many other uses of blockchain; such as Litecoin.

  What are cookies and what are the functions of cookies

What are cookies? What are the functions of cookies? How can cookies be a privacy risk? What is a supercookie and how is it different than a regular cookie

  Describe positive and negative aspects of employing a mac

Compare and contrast the positive and negative aspects of employing a MAC. DAC. and RBA. Suggest methods to mitigate the negative aspects for MAC, DAC.

  Show a rightmost derivation for aacab

Show a rightmost derivation for aacab. For the following grammar and the right sentential form T * (E + T * F) determine the handle.

  Create a user account and add and activate the tag

In order to use the newly purchased tag a user must create a user account and add and activate the tag by ID. A user is either personal or commercial.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd