support@savemyessay.com

24/7 — Client Support

+1(304) 900-6229

see attachedProject 3 includes two labs, Lab 5, and Lab 6. Lab 5 Assignment: Conducting Forensic Investigations on Windows Systems. Locate and

see attached

Project 3 includes two labs, Lab 5, and Lab 6.

Lab 5 Assignment: Conducting Forensic Investigations on Windows Systems.

Locate and complete Lab 5: Conducting Forensic Investigations on Windows Systems. Upon completion of Section 2 of the lab, you are required to provide the deliverables listed below.

Note: You do not have to complete Section 3 of the lab.

1. Include the Lab Report file with the following screen captures:

· properties window for the process you selected,

· Listening Ports list,

· information about the C: drive,

· information about the vWorkstation’s usn journal,

· file path for the yourname.txt file,

· vWorkstation Windows installation timestamp in a human-friendly format,

· key values for the vWorkstation’s default network interface,

· Winlogon key values,

· ShellBags key value,

· RecentDocs key values,

· the Sorted Files,

· contents of the 777.jpg file in the Document View,

· 777.lnk file contents including the path to the file in the system,

· installation files for suspicious apps in the Downloads category,

· VPN application (Speedify) in the Uninstall folder,

· users list,

· contents of the Beverly Gates / Run folder,

· at least one suspicious browsing record found in the History sub-node, and

· at least one suspicious search found in the Keywords sub-node.

When you have completed the lab, click the “Download Lab Report as PDF” icon, located in the top right corner of the lab (as shown below):

(as shown below):

2. Save the following file downloaded from the virtual environment:

· yourname_lab5_ windows_forensics.pdf

3. Upload the PDF Lab Worksheet in the Blackboard course.

Lab 6 assignment: Conducting Forensic Investigations on Linux Systems

Locate and complete Lab 6: Conducting Forensic Investigations on Linux Systems. Upon completion of Section 2 of the lab, you are required to provide the deliverables listed below.

Note: You do not have to complete Section 3 of the lab.

1. Include the Lab Report file with the following screen captures:

· contents of the /bin directory,

· contents of the /etc directory,

· contents of the /var directory,

· contents of the /proc directory,

· results of the dmesg command,

· results of the fsck command,

· results of the history command,

· running processes,

· results of the file command,

· records in the kern.log file, and

· records in the auth.log file.

When you have completed the lab, click the “Download Lab Report as PDF” icon, located in the top right corner of the lab (as shown below):

2. Save the following file downloaded from the virtual environment:

· yourname_lab6_ linux_forensics.pdf

3. Upload the PDF Lab Worksheet in the Blackboard course.

4. Then, write one page that discusses the elements listed below.

· Identify terms associated with incident response.

· Describe procedures for information systems control governance and policy enforcement.

· Describe system security related incidents.

Remember to include an introduction for the written portion of the paper. APA formatting is required, and citations and references for any paraphrased material should be present. A minimum of one reference is required for your assignment (it can be the textbook).

TEXTBOOK

Easttom, C. (2022). Digital forensics, investigation, and response (4th ed.). Jones & Bartlett Learning.

image1.png

image2.png

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

see attachment for detailsAs you have read Lesson 8: Identifying and Mitigating Accountability Risk in uCertify Certified Ethical Emerging

see attachment for details As you have read Lesson 8: Identifying and Mitigating Accountability Risk in uCertify Certified Ethical Emerging Technologist, consider an industry with ambiguous data privacy regulations. Responsibility Assignment Matrices (RACI) can build accountability and help safeguard data. Pick one of the following hypothetical scenarios where a company

Health Information Exchange HIT 101: Foundations of HIT, Week 5: HIE Paper

Health Information Exchange HIT 101: Foundations of HIT, Week 5: HIE Paper AHIMA 2018 Competency · III.7 Summarize standards for the exchange of health information Instructions: For this week 5 homework the focus was on Health Information Exchange (HIE). Summarize the standards for the exchange of HIE by writing one-page

Creating a plan Competencies7035.1.1  :  Health Information Systems and Business Process The graduate explains

Creating a plan  Competencies 7035.1.1  :  Health Information Systems and Business Process The graduate explains how information systems affect business processes within the healthcare industry. 7035.1.2 :  Systems Development The graduate analyzes the different methods of system development for the purpose of recommending an appropriate method for a project. 7035.1.3 :  Health Information

The topic is Katherine JohnsonKatherine Johnson, an American mathematician, played a crucial role in NASA’s space missions. She excelled at orbital

The topic is Katherine Johnson Katherine Johnson, an American mathematician, played a crucial role in NASA’s space missions. She excelled at orbital mechanics calculations and pioneered the use of computers. During her 33-year tenure at NASA, Johnson calculated trajectories, launch windows, and emergency return courses for the Project Mercury, Apollo