Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

TDS is a national delivery company based at Thornton Science Park. They employ 5 0 staff including administration, vehicle drivers, and warehouse workers. Their system

TDS is a national delivery company based at Thornton Science Park. They employ 50 staff including administration, vehicle drivers, and warehouse workers. Their system is reliant on IT systems. Their Business Systems comprise of financial software for tracking and accounting and asset marking software for tracking parcels through distribution channels. They have the following computers in use across the business: Servers -1x Windows Server 2022 running the following roles: Active Directory Domain Services, DNS, DHCP, File Server -1x Debian 11(Bookworm) for backup of files from the Windows Server Clients (Desktop/Laptops)20x computers which are used primarily by the administration staff, who underpin the day-to-day operations of the company. -3x Windows 7-15x Windows 10-2x macOS Ventura Your job, as a Digital Forensics Officer is to perform the following tasks. Data capture and analysis Change focus from log management to a wider auditing and data collection perspective. You are to discuss practically and in detail the tools and techniques used to capture/extract and then analyse the data for analysis. Consider the following aspects from a hardware and software perspective how you would audit, extract, and examine data from: - Network (Wi-Fi and Ethernet)- Storage mediums (SSD/HDD drives, USBs, etc)- Memory (RAM) Discuss the implications of live capture (powered on) vs offline capture (powered off). The hardware/software that use should be able to run on the environment above. You should be using different software options for these and giving your verdict on the pros and cons of each. For example, what software could you use to capture images of the hard disk on all operating systems in the case study? What could you then use to analyse the disk image? (This is the same then for capturing and auditing the RAM capture). For the network, how would you capture network traffic? Where would be the best place to capture it? On the network router? The PCs themselves? Give details on how you will ensure best practise for capture and audit of the data so that it will hold up in a court of law. Eg. Using write blockers, photographs of the scene, etc.

Step by Step Solution

3.41 Rating (151 Votes )

There are 3 Steps involved in it

Step: 1

We will need to employ a variety of tools and techniques tailored to different types of data sources such as networks storage mediums and memory Below Ill discuss practical methods and tools for each ... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Transportation A Global Supply Chain Perspective

Authors: Robert A. Novack, Brian Gibson, Yoshinori Suzuki, John J. Coyle

9th Edition

1337406643, 9781337406642

More Books

Students also viewed these Programming questions

Question

Is there any other possible conclusion?

Answered: 1 week ago