Question: You will need the Jim Cloudy 2 0 1 8 Lone Wolf Scenario Images 1 - 9 , found on digital corpora Conduct a thorough

You will need the Jim Cloudy 2018 Lone Wolf Scenario Images 1-9, found on digital corpora
Conduct a thorough investigation by answering the following questions and presenting your findings in a forensics report. Your report should contain each of the applicable elements. Remember to Document in detail where the evidence is found along with time and date information.
Using OS Forensics and Autopsy, identify the five files that the user jcloudy has deleted. Include the file path, name of the file, and time/date deleted. Do the timestamps match between applications? If not, why would this be?
What are the two email addresses for jcloudy?
What are the email accounts used to log into the following?
Microsoft Account
Google Account
Dropbox Account
Box Account
Amazon Web Services Account
Facebook
Twitter
What is the path the jcloudys box account automatically syncs to?
What is the most recently installed version of Box Sync?
How many times has Boxsync.exe been executed? What was the last execution date?
What is the AWSSecretKey that corresponds to the AWSAcessKey: AKIAJQCL74OG6U6JRXKQ?
In what file and location is this found? What are these keys for?
Identify the document that contains I dont know if this plan will work. Plans never survive first contact.
Jcloudys intention is to commit a crime. Based on your search of the internet activity on jcloudys system, what country is being considered to flee to? Explain your reasoning behind this choice.
Analyze Jcloudys internet searches and write a brief summary of the findings.
Identify two URLs from the internet searches and provide the IP, owner, and reputation scores or blacklist scores from two different resources.
The examination disclosed evidence to show the user jcloudy conducted multiple internet searches pertaining to the procurement of weapons and ammunition, locations to attack, and evading capture and extradition. Explain at least five NEW items of supporting evidence for these actions and illustrate the facts of the evidence. (Do not use items already identified in the previous questions.)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!