Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

A new start-up SME (small-medium enterprise) based in Kuala Lumpur with an Ecommerce model has recently begun to notice anomalies in its accounting and product

A new start-up SME (small-medium enterprise) based in Kuala Lumpur with an Ecommerce model has recently begun to notice anomalies in its accounting and product records. It has undertaken an initial check of system log files, and there are a number of suspicious entries and IP addresses with a large amount of data being sent outside the company firewall. They have also recently received a number of customer complaints saying that there is often a strange message displayed during order processing, and they are often re-directed to a payment page that does not look legitimate. The company has a small team of four IT support professionals, but they do not feel that they have the expertise to carry out a full scale malware/forensic investigation. As there is increased competition in the hi-tech domain, the company is anxious to ensure that their systems are not being compromised, and they have employed a digital forensic investigator to determine whether any malicious activity has taken place, and to ensure that there is no malware within their systems. The company uses Windows Server NT for its servers. Patches are applied by the IT support team on a monthly basis, but the team has noticed that a number of machines do not seem to have been patched.

You are expected to provide the business's leadership team with a report of your findings and recommendations to solve those findings. The report should include the following:

1. Evidence Acquisition. ( Identify possible sources of data, acquire volatile and non-volatile data, verify the integrity of the data and ensure chain of custody. )

2. Evidence Authenticity ( Provide steps taken to ensure that the evidence obtained remain original; not tampered or damaged )

3. Tools ( List and analyze the tools you will need in your investigation and the reason you chose those tools. Support this analysis with relevant research )

4. Analysis (List the analysis performed based on type of data sources, link with tools selection, and describe possible result that can support the Scenario Case.)

5. Conclusion and Recommendations ( Based on your analysis, write your assessment of the type of breach that occurred and how it occurred. What vulnerabilities were exploited and how? Discuss recommendations for preventing such an attack in the future. )

** Answer should includes thorough Identification of possible source of data, and precisely explain the process of documenting, collecting and storing evidence. States the recommended solution with clear rationale

**Precisely describe steps to protect asset and able to address issues that might arise in accessing assets. States the recommended solution with clear rationale.

**Precisely describe tools that involve in the investigation and the justification on selecting the tools. Excellent reasoning.

**Recommends precise type of data sources, and tools. Succinct and comprehensive description of the findings.

**Conclusion is precise, detail and rationale. Solution presented solves the problem stated correctly and meets all requirements of the problem. Solution is clearly presented.

There are 5 questions here, I'll be posting 5 times the same question. Please advise. Thanks. You may C&P to every question I have posted. Thanks

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Design Application Development And Administration

Authors: Michael V. Mannino

3rd Edition

0071107010, 978-0071107013

More Books

Students also viewed these Databases questions

Question

Describe what competencies and competency modeling are.

Answered: 1 week ago