Question: A new start-up SME (small-medium enterprise) based in Melbourne with an E-government model has recently begun to notice anomalies in its accounting and product records.

A new start-up SME (small-medium enterprise) based in Melbourne with an E-government model has recently begun to notice anomalies in its accounting and product records. It has undertaken an initial check of system log files, and there are many suspicious entries and IP addresses with a large amount of data being sent outside the company firewall. They have also recently received a number of customer complaints saying that there is often a strange message displayed during order processing, and they are often redirected to a payment page that does not look legitimate. Address the following questions while preparing your report as a digital forensics investigator. a) Discuss a general overview of the methodology that you will use, and provide a reasoned argument as to why the particular method chosen is relevant. [5 Marks] b) How should you proceed if your network forensic investigation involves other companies? [5 Marks] c) Explore the techniques and tools that can be used in this situation. [5 Marks] d) Describe significant challenges with network forensics in this network, including forensic acquisition and evidence preservation. [5 Marks] e) Identify and explain three types of log files you should examine after a network intrusion.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!