Answered step by step
Verified Expert Solution
Question
1 Approved Answer
TDS is a national delivery company based at Thornton Science Park. They employ 5 0 staff including administration, vehicle drivers, and warehouse workers. Their system
TDS is a national delivery company based at Thornton Science Park. They employ staff including administration, vehicle drivers, and warehouse workers. Their system is reliant on IT systems. Their Business Systems comprise of financial software for tracking and accounting and asset marking software for tracking parcels through distribution channels. They have the following computers in use across the business: Servers x Windows Server running the following roles: Active Directory Domain Services, DNS DHCP File Server x Debian Bookworm for backup of files from the Windows Server Clients DesktopLaptopsx computers which are used primarily by the administration staff, who underpin the daytoday operations of the company. x Windows x Windows x macOS Ventura Your job, as a Digital Forensics Officer is to perform the following tasks. Data capture and analysis Change focus from log management to a wider auditing and data collection perspective. You are to discuss practically and in detail the tools and techniques used to captureextract and then analyse the data for analysis. Consider the following aspects from a hardware and software perspective how you would audit, extract, and examine data from: Network WiFi and Ethernet Storage mediums SSDHDD drives, USBs, etc Memory RAM Discuss the implications of live capture powered on vs offline capture powered off The hardwaresoftware that use should be able to run on the environment above. You should be using different software options for these and giving your verdict on the pros and cons of each. For example, what software could you use to capture images of the hard disk on all operating systems in the case study? What could you then use to analyse the disk image? This is the same then for capturing and auditing the RAM capture For the network, how would you capture network traffic? Where would be the best place to capture it On the network router? The PCs themselves? Give details on how you will ensure best practise for capture and audit of the data so that it will hold up in a court of law. Eg Using write blockers, photographs of the scene, etc.
Step by Step Solution
★★★★★
3.41 Rating (151 Votes )
There are 3 Steps involved in it
Step: 1
We will need to employ a variety of tools and techniques tailored to different types of data sources such as networks storage mediums and memory Below Ill discuss practical methods and tools for each ...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started