Irijah Williams1

docx

School

Grand Canyon University *

*We aren’t endorsed by this school

Course

375

Subject

Information Systems

Date

Jun 18, 2024

Type

docx

Pages

5

Uploaded by irijah

Report
Irijah Williams ITT 375 06/02/2024 I used the SANS SIFT VM and wireshark and performed a network data(packet) capture that will be shown below I performed the capture on the the highlighted packet that is show above. The next part of the process i will show various screen shots of the different data that is captured
The digital forensics process may change from one scenario to another but it typically g. Collection: The collection phase will usually involve acquiring digital evidence, that is usually by seizing physical assets such as, computers, hard drives, or phones. It is crucial to make sure that the data isn’t lost or damaged during collection phase. Data loss can be prevented by copying storage media files or creaking disk images of the others. Examination: This phase will involve identifying and extracting data. This phase can be split up into many steps which is prepare, extract, and identify. When you are getting ready to extract data you have the decision to work on it while its live or if its a dead system. During the identification step, a detrermination will need to be made on which pieces of data would be relevant to the investigation.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Analysis: The analysis phase deals with using the collected data to either prove or not prove a case built by examiners. The questions that are important for examiners to answer for all relevant data items. Those questions are who created the data?, who edited the data?, How the data was created, and finally when the activities occured. Reporting: This phase will consist of synthesizing the data and analysis into a format that will make sense. The reports are crucial because they will helo convey information so that all stakeholders and consumers will understand. Christian worldview within the context of cybersecurity We are under attack by attackers as you know and others will attempt to steal our online identities and information. Some of the attacks in the news recently included Target, homedepot, Sony, and even the IRS. The largest attack in the world was on the US office and they reported theft of sensitive information from 20 million people if you underwent a background check within the past 15 years. Theres always 2 types of attacks we are under first was the physical attack and cyber attack the second would be spiritual attack. As noted in the bible in 2 Nephi 2:27, Satan and his followers are doing everything they can possible to make us miserable like unto them, Brigham Young said. President Thomas S. Monson stated, “Where once the standards of the church and the standards of society were mostly compatible, now there is a wide chasm between us, and its growing even wilder.” As messed up and threated how it may seem and sound we have been promised spiritual protection from god and jesus. Some ways to improve computer behavior is to trust yourself within spiritually. We must be in tune spiritually to recognize and be obedient to promptings when they come.
Reference: Computer Forensics and Investigation Methodology – 8 steps | Count Upon Security Understanding Digital Forensics: Process, Techniques, and Tools (bluevoyant.com)