see attached Lab 3 Assignment: Recovering Deleted and Damaged Files Locate and complete Lab 3: Recovering Deleted and Damaged Files. Upon completion

see attached

Lab 3 Assignment: Recovering Deleted and Damaged Files

Locate and complete Lab 3: Recovering Deleted and Damaged Files. Upon completion of Section 2 of the lab, you are required to provide the deliverables listed below.

Note: You do not have to complete Section 3 of the lab.

1. Include the Lab Report file with the following screen captures:

· list of recovered files and folders in the E3 Trash folder,

· patent file in the File Viewer,

· recovered files in the File Explorer,

· contents of the list of deleted files in Autopsy,

· recovered patent file,

· deleted patent file in DiskDigger,

· recovered patent file,

· contents of the RAR archive in the /mnt/media/home/ash directory,

· failed mount attempt on the /dev/sdb2 device,

· compressed files recovered by PhotoRec, and

· backup files recovered from the RAR archive.

When you have completed the lab, click the “Download Lab Report as PDF” icon, located in the top right corner of the lab (as shown below)

2. Save the following file downloaded from the virtual environment:

· yourname_lab3_recovery.pdf

3. Upload the PDF Lab Worksheet in the Blackboard course.

Lab 4 assignment: Conducting an Incident Response Investigation

Locate and complete Lab 4: Conducting an Incident Response Investigation. Upon completion of Section 2 of the lab, you are required to provide the deliverables listed below.

Note: You do not have to complete Section 3 of the lab.

1. Include the Lab Report file with the following screen captures:

· time graph,

· details of the 2021-Jul-13 15:33:00 session,

· email containing FTP credentials and the associated timestamps,

· email from Dr. Evil demanding Marvin install a keylogger,

· email from Dr. Evil reminding Marvin to update the firewall and scheduler, and

· registry key value associated with the keylogger and the local SPMservice.

When you have completed the lab, click the “Download Lab Report as PDF” icon, located in the top right corner of the lab (as shown below):

2. Save the following file downloaded from the virtual environment:

· yourname_lab4_ incident_response.pdf

3. Upload the PDF Lab Worksheet in the Blackboard course.

4. Then, write one page that discusses the elements listed below.

· Explain how to prepare a computer for forensic examination.

· Describe procedures for seizing, transporting, and preparing evidence.

· Describe how to handle evidence appropriately.

· Explain legal implications related to computer crimes.

Remember to include an introduction for the written portion of the paper. APA formatting is required, and citations and references for any paraphrased material should be present. A minimum of one reference is required for your assignment (it can be the textbook).

TEXTBOOK

Easttom, C. (2022). Digital forensics, investigation, and response (4th ed.). Jones & Bartlett Learning.

image1.png

image2.png

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

200 word response 1 reference due 6/8/2024 Franco 2-1: Aligning an IT Security Assessment The Gramm-Leach-Bliley Act (GLBA) was established in 1999 a

200 word response 1 reference due 6/8/2024 Franco 2-1: Aligning an IT Security Assessment The Gramm-Leach-Bliley Act (GLBA) was established in 1999 and was enacted to assist reform the financial industry and address consumer financial privacy concerns (Federal Trade Commission, 2023). GLBA possesses requirements for the Federal Trade Commission and

Find videos showing a real-world health system. Then, conduct research for each following items: Provide the title of the video, and the Web link. Then,

Find videos showing a real-world health system. Then, conduct research for each following items: Provide the title of the video, and the Web link. Then, summarize it–including details, features, functions, contents, etc.), stakeholders, markets, and elaborate business value(s) it delivers and/or enables. Imagine you are the owner or the system analyst

300 words due 6/5/5024 2 references Discussion 2-1: Aligning an IT Security Assessment

300 words due 6/5/5024 2 references Discussion 2-1: Aligning an IT Security Assessment How does the Gramm-Leach-Bliley Act (GLBA) impact information systems security and the need for information systems security practitioners and professionals? If an organization is a financial institution or insurance company that is also publicly traded, what other