Computer Forensics
The book for class
“Guide to Computer Forensics and Investigations (with DVD)” by Bill Nelson, Amelia Phillips, and Christopher Steuart, 6th Edition.”
Forensics Fundamentals Final Case Description
BRJ Software Intrusion
BRJ Software is a small software engineering company that writes applications supporting financial institutions. You work in BRJ’s IT department and administer several servers. Your company’s software developers create the source code for your company’s products on the servers you control. You are also responsible for maintaining your company’s domain name, so your e-mail address is listed within the publicly accessible WHOIS contact information. On September 8, 2003, the user known as Richard came to you and said he discovered someone else logging into his account when he issued the ‘w’ command.
You discover that the IP address Richard reported, 102.60.21.3, is indeed a Linux machine that your developers occasionally use to test their software. After you realized that you must not have applied the latest security patches, you break out in a cold sweat. Your boss is going to be upset!
You immediately decide to write all of the network traffic you have captured for the past couple of months to CD-R media. After that, you run a Live Response Process on the victim machine to collect the volatile data. The responder’s IP address is 102.60.21.149. Because the machine is not used heavily, you are able to take it offline and perform a forensic duplication to preserve the evidence that may contain deleted files. You begin a chain of custody for all of the evidence you collect in case you decide to hand it over to the authorities.
CIS060 Forensics Fundamentals Final Case Report Templates
There are a variety of templates that one may use to present forensic findings. The template and format of your forensic reports should be part of your overall methodology & standards. Below are a generic outline for a forensic report and references to other formats. Adapt these resources for your final case report and presentation.
Forensic Report Outline
1. Title page
2. Executive summary
3. Table of contents
4. Case summary
5. Forensic methodology, acquisition, and preparation
6. Analysis and findings
7. Conclusions
8.. Appendice
a) Signatures/hashes
https://digital-forensics.sans.org/blog/2010/08/25/intro-report-writing-digital-forensics
http://www.forensicmag.com/articles/2012/05/report-writing-guidelines
http://computer-forensics.privacyresources.org/forensic-template.htm
http://www.academia.edu/12324822/Example_of_An_Expert_Witness_Digital_forensics_Report
http://www.forensic-classroom.com/forensic_downloadable_evidence_forms.html
Top-quality papers guaranteed
100% original papers
We sell only unique pieces of writing completed according to your demands.
Confidential service
We use security encryption to keep your personal data protected.
Money-back guarantee
We can give your money back if something goes wrong with your order.
Enjoy the free features we offer to everyone
-
Title page
Get a free title page formatted according to the specifics of your particular style.
-
Custom formatting
Request us to use APA, MLA, Harvard, Chicago, or any other style for your essay.
-
Bibliography page
Don’t pay extra for a list of references that perfectly fits your academic needs.
-
24/7 support assistance
Ask us a question anytime you need to—we don’t charge extra for supporting you!
Calculate how much your essay costs
What we are popular for
- English 101
- History
- Business Studies
- Management
- Literature
- Composition
- Psychology
- Philosophy
- Marketing
- Economics