Question: Coursework Objectives This assignment develops skills in digital investigation, focusing on computer forensics procedures and tools, while addressing legal issues in multi - jurisdictional contexts.
Coursework Objectives
This assignment develops skills in digital investigation, focusing on computer forensics procedures and tools, while addressing legal issues in multijurisdictional contexts. The tasks cover standard forensic techniques and methodologies.
Case Study : Folder Naming Analysis
As a computer forensic analyst at Cado Security, you must analyze a client issue related to restricted folder names.
Introduction: Describe standard OS procedures for creating folders.
Folder Naming Restrictions: Explain why names like AUX or CON cannot be used. Provide a technical analysis.
Applicability: Identify other restricted names and verify if these restrictions apply across different OSs. Provide screenshots.
Verification of Claims: Analyze evidence from a user claiming to have created a restricted folder name, detailing if and how it was falsified.
Conclusion: Present findings with screenshots as evidence.
Case Study : EHR Business Case for SEGi Medical Hospital
Examine the value of Electronic Health Records EHR for improving doctors practice management.
Objectives: Analyze EHR benefits and IT value issues to develop a business case.
Requirements: Identify needs, challenges, and regulatory factors at SEGi Medical Hospital.
EHR Vendor Analysis: Research an EHR provider in Malaysia, examining system features, IT architecture, security, costs, benefits, and implementation.
Data Collection: Explore doctors practice workflows, service processes, and areas for improvement.
Key Sections:
Requirements and business context.
SEGi Medical Hospital challenges.
Regulatory, social, and ethical considerations.
EHR functions clinical appointments, billing
IT architecture and EHR benefits.
Case Study : Memory Forensics
Analyze a memory dump from a suspects computer to identify running processes, network connections, and potential malware.
Preparation: Set up a secure forensic workstation with tools like Volatility or Rekall, isolated from the internet.
Process Identification: Use volatility f pslist to list running processes; look for suspicious processes.
Network Analysis: Identify active connections with volatility f netscan; note suspicious IP addresses or unusual ports.
Malware Detection: Run volatility f malfind to locate hidden code, and dump suspicious processes with procdump.
Documentation: Compile a report on findings, detailing malicious activities, including screenshots, logs and analysis results.
Key Tools:
Volatility: Memory forensics for process and malware detection.
Rekall: Similar to Volatility, useful for comprehensive memory image analysis.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
