Ashtin_Dorsaint_Forensics_v03_Lab05_AW

pdf

School

Saint Leo University *

*We aren’t endorsed by this school

Course

475

Subject

Communications

Date

Jan 9, 2024

Type

pdf

Pages

3

Uploaded by BarristerIceKudu28

Report
Lab 5 - Assessment Worksheet Analyzing Images to Identify Suspicious or Modified Files Course Name and Number: ________________________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ________________________________________________________________ Lab Due Date: ________________________________________________________________ Lab Assessment Questions 1. Why might it be important to confiscate and identify the websites and kinds of images found on a suspect’s computer? 2. Explain what the E3 Image Analyzer does and what it looks for. 3. How do you decrease the amount of false positives in the wrong categories?
4. Into what categories does E3’s Sorted Files feature categorize all of the identified files? 5. How many files did the Sorted Files feature identify on the evidence drive? 6. Where would you look to identify a rogue application, malicious spyware application, or keyboard logger application on the target evidence drive? 7. Where would you look to identify ZIP files and compressed files that may actually contain embedded malicious software?
8. Where must you also look to examine possible image files on the evidence drive under investigation? 9. Why is it also important to look under the Graphics folder directly under the Sorted tree as well as the Image Analyzer Results category?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help