티스토리 뷰

First step in computer forensics is seize

Running sheet: chain custody is the keeping the record of evidence to keep from tempering

The analysis shouldn't change the evidence during process.

Write background, objectives, strategies from assessment document

Things to see when seize the computer: any volotile memory content, virtual machine, network device.

step and strategies are different.

Answer from lecture 06082018 2.30

    Background

Clack has allegedly accessed clown images. Clack accepts being the owner of the physical device, but denies ownership of the clown content. He blames malware for the clown content on his device. The original device has been forensically wiped after a logical acquisition has been performed on the device.

    Objectives

Find the clown images, if any.

Link the images of the clown with Clack.

Prove intent.

    Strategies

Carve out files from the forensic image to determine if any of the files are linked to clowns.

Find personally identifiable content with Clark in relation to the clown images.

The duration of access of the clown images and the actions performed on them.


'AU Study > CSG2305 Computer Forensics' 카테고리의 다른 글

W7 Mon 10092018  (0) 2018.09.10
W6 03092018 Mon  (0) 2018.09.06
W5 Mon 27082018  (0) 2018.08.27
W4 Mon 20082018  (0) 2018.08.24
W3 Mon 13082018  (0) 2018.08.15
댓글
Announcement
Recent Posts
Recent Comments
Total
Today
Yesterday
Link
TAG
more
«   2024/12   »
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 31
Search by month