1. What is the Whois tool and how would you use it in digital forensics? What is a major caveat when using Whois?
1. What is the Whois tool and how would you use it in digital forensics? What is a major caveat when using Whois?
2. Explain how you might be able to use network forensics to catch an insider. Make sure you clearly identify what data you need and what tool(s) you might use.
3. Define Steganalysis as it relates to computer forensics. Briefly explain how you can use entropy to find hidden data in an image and which tool can help you.
4. Someone is trying to hide information in an image file. Name two ways they might to do it and for each method describe how you would detect it.
Step by step
Solved in 2 steps
Explain how you might be able to use network forensics to catch an insider. Make sure you clearly identify what data you need and what tool(s) you might use.