Locating prohibited digital content related cats
|
Computer Forensics |
---|
Introduction
November 2017.
● Forensic investigator is a part time university student and is currently enrolled in 4 subjects, dealing with weekly tests and assignments.
● Acquiring the product and Installing the forensic tools and getting used to the working and treatment of programming will take 10-15 days of time.
10386891 |
---|
A junior police officer attended the company’s premises and evaluated the network traffic logs, confirming that there is high probability that prohibited content was accessed by Clark’s system. Investigators obtained warrant and declared Clark as a potential suspect, acquiring his laptop and other equipment’s which may have been involved in crime for further investigation.
1. Locating prohibited digital content related to cats.
2. Proving that Clarks computer was used to access illegal content related to cats. 3. Determining that Clark accessed the illegal cats related digital content with intention.
2. Proving that Clark's computer was used to access illegal content related to cats:
● Analyzing Computer Activity Timeline record (CAT) to review activity on suspects computer using software known as CAT DETECT.
● | 10386891 | |
---|---|---|
This study source was downloaded by 100000851383315 from CourseHero.com on 08-30-2022 00:38:39 GMT -05:00 Faz Saleem |
intention:
● Reviewing the time and date stamps contained in the file system metadata and
mail, and news group activity.
Resources:
● Forensic Software Tools such as forensic tool kit, FTK imager, LINUX DD or
X ways ETC.
● Backup storages
● Computer system with 1TB hard drive , Leadtek NVIDIA Quadro P6000
Performance indicators:
Performance indicators determine if investigators are going on the right track in analyzing the
-------------------------------------------------------------------------------------------------------