...Assessment Worksheet Documenting a Workstation Configuration Using Common Forensic Tools Course Name and Number: _____________________________________________________ Student Name: ________________________________________________________________ Instructor Name: ______________________________________________________________ Lab Due Date: ________________________________________________________________ Overview In this lab, you performed a forensic analysis of a Windows 2012 machine using three commonly available tools: WinAudit, DevManView, and Frhed. You reviewed the forensic capabilities of each tool, using the sample files provided, to determine any clandestine threats or vulnerabilities such as viruses and malicious software. You also recovered a file that was altered to hide its native file format. You documented your findings in a forensics report. Lab Assessment Questions & Answers 1. What is the main purpose of a software tool like WinAudit in computer forensics? 2. Which item(s) generated by WinAudit would be of critical importance in a computer forensic investigation? 3. Could you run WinAudit from a flash drive or any other external media? If so, why is this important during a computer forensic investigation? 4. Why would you use a tool like DevManView while performing a computer forensic investigation? Copyright © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual ...
Words: 295 - Pages: 2
...Commonwealth Bank Open Advice Review program Fourth Report Prepared by Promontory 2 February 2016 Promontory Financial Group Australasia Level 32, 1 Market St | Sydney, NSW, 2000 +61 2 9275 8833 | promontory.com Commonwealth Bank Open Advice Review program Fourth Report 2 February 2016 Promontory Financial Group Australasia (Promontory) has been engaged by the Commonwealth Bank Group (Bank) as an Independent Expert to oversee the Bank’s Open Advice Review program (Program). Promontory is responsible for monitoring, reviewing and reporting on the Program and its progress. This Report provides an update on the Program for the period between 1 September 2015 and 31 December 2015. A legal representative of the Bank reviewed a draft of this Report to identify any information subject to a claim for legal professional privilege. There were no such instances identified. Promontory also provided a draft of the Report to the Bank for the purposes of identifying any errors. Promontory retained final judgement on all views and information in this Report. Promontory’s role in the Program is limited and may not incorporate all matters that might be pertinent or necessary to a third party’s evaluation of the Program or any information contained in this Report. No third party beneficiary rights are granted or intended. Promontory is neither a law firm nor an accounting firm. No part of the services performed constitutes legal advice, the rendering of legal services...
Words: 20832 - Pages: 84
...Forensics includes the analysis of proof for criminal examinations and experts in this field are essential in piecing together the intricate details of a crime which can be later used in court during testimony. From the crime scene, materials are collected that can potentially solve the case. Bodily fluids such as blood, saliva, and urine must be studied to gain information about what had occurred. Forensic assessments must be conducted in a beneficial way for the evidence to make sure it will not be damaged in any way. The traditional methods for doing this are usually harmful and unsuccessful due to the workers needing very particular skills for the process to work correctly. In addition, chemicals can possibly be hazardous which makes...
Words: 424 - Pages: 2
...Digital Forensics is an important aspect to computer systems security. I mean we are talking about Identifying, Collecting, Preserving, Analyzing, and Presenting evidence digitally. Therefore, preserving electronic evidence is important. Investigating Data Theft is a malice act towards a company/ organization (Kruse, 2001). Such theft is made by an employee that is either terminated or resigning. Motives for data theft include setting up a competing business, using the information at a new job, sense of ownership of what was created, and revenge against the employer, among other things. Common Theft include, customer information, financial records, software code, email lists, strategic plans, process documents, secret formulas, databases, research and development materials, and employee records. Now, with such theft around, we often wonder how is such theft achieved. Knowing how technology is always advancing each year, the millennium era grows with fascinating knowledge on the know how to working a computer, hard drives, etc. Tools like flash drive, which can hold thousands of documents that can be copied to the flash drive, and taken anywhere. Then you have Dropbox, remote desktop connections, personal email accounts, smart phones, CD’s/DVD’s, and FTP ( File Transfer Protocol ) (Kruse, 2001) There is always this saying, that personnel who steal data often leave a trail of digital evidence that proves invaluable when investigating data theft. We as the forensic specialists...
Words: 1774 - Pages: 8
...difference, and that's what I would like to spend the rest of my life doing. The field of psychology is divided into subfields each of which deal with a different area, and since working with and helping people is a good feeling for me, community and social services is an excellent job group. When going into the field of psychology, one is able to explore many different careers. I’m also interested in forensics. The field of forensic psychology has grown in the 21st century because courtrooms recognize the value of psychologist’s testimonies to help juries reach a clearer verdict. Like all fields in psychology, forensics has many perspectives, they can focus on law enforcement psychology, the psychology of litigation, correctional psychology, and forensic psychology (Nietzel, Bernstein, & Milich, 1998). The field of psychology is becoming more scientific, advances are being made to increase reliability. Just the thought of having a career in psychology is fascinating to me, I know sooner or later I am going to have to make the decision on which way Im going to go about it. Forensic psychologists handle legal matters, including mental state examinations of criminal defendants and...
Words: 1127 - Pages: 5
...Subspecialties of forensic psychologySubspecialties of forensic psychologySubspecialties of forensic psychology Forensic psychology is defined as the application of psychological knowledge to the legal system (Bartol & Bartol, 2012: 6). The concept of forensic psychology can be misunderstood, because the definition does not explain much. The easiest way to explain forensic psychology is to break it down into its subspecialties and describe where psychological knowledge can be applied. There are five subspecialties of forensic psychology, namely police psychology, psychology of crime and delinquency, victimology and victim services, legal psychology and correctional psychology. I will discuss legal psychology and correctional psychology. · Legal psychology Legal psychology is the study of human behavior relevant to the law. This subspecialty of forensic psychology consists of those theories that describe, explain and predict human behavior by reference to the law. Bartol & Bartol (2012) described that early in a case when attorneys are preparing for a trial and gathering information psychologist can be called in to testify. Main roles of a forensic psychologist in the USA includes, acting as a consultant to law enforcement, acting as trial consultants (jury selection, case preparation and pre-trial publicity), presenting psychology to appeal courts, doing forensic assessment and acting as an expert witness (insanity defense, competence to stand trial, sentencing, eyewitness...
Words: 1988 - Pages: 8
...Assessment Criteria (Marks Breakdown) Please note that during the preparation of your assignment documentation, you must include the following marking table. Ensure you fill in the details of your full name and student ID. Name/ Student ID: Preperation of the executive summary and legal warrants (10) Documentation (10) Conclusions/recommendations (10) Referencing (10) Evidence identification and preservation (15) Critical analysis and evaluation of the case (15) Q&A session during presentation (30) Total (100) The marking table must be placed on a single page, located as either the second or third page of your final assignment documentation. Contents EXECUTIVE SUMMARY 2 AUTHORIZATION 3 IDENTIFICATION 4 COLLECTION AND PRESERVATION 5 Mr. Mike’s Work-Station 5 TTBANK Server 5 CHAIN OF CUSTODY FORM 7 EXAMINATION AND ANALYSIS 8 EVIDENCES RECOVERED 8 RECONSTRUCTION 11 RELATIONAL ANALYSIS 12 CONCLUSION & RECOMMENDATION 13 EXECUTIVE SUMMARY This is the case involving the staff of TTBANK that was suspected of misuse of company property due to that staff bragging about gaining access to privileged information to his colleagues that he should have otherwise not have gotten access to. The issue first came to the attention of Mr. Ali, the Enterprise Systems Administrator of TT Bank who had investigated silently to discover the identity of the staff and that the person was a member of the Loans Department and his name was Mr. Mike...
Words: 1635 - Pages: 7
...U.S. Department of Justice Office of Justice Programs National Institute of Justice APR. 04 Special REPORT Forensic Examination of Digital Evidence: A Guide for Law Enforcement U.S. Department of Justice Office of Justice Programs 810 Seventh Street N.W. Washington, DC 20531 John Ashcroft Attorney General Deborah J. Daniels Assistant Attorney General Sarah V. Hart Director, National Institute of Justice This and other publications and products of the U.S. Department of Justice, Office of Justice Programs, National Institute of Justice can be found on the World Wide Web at the following site: Office of Justice Programs National Institute of Justice http://www.ojp.usdoj.gov/nij APR. 04 Forensic Examination of Digital Evidence: A Guide for Law Enforcement NCJ 199408 Sarah V. Hart Director This document is not intended to create, does not create, and may not be relied upon to create any rights, substantive or procedural, enforceable at law by any party in any matter civil or criminal. Opinions or points of view expressed in this document represent a consensus of the authors and do not represent the official position or policies of the U.S. Department of Justice. The products, manufacturers, and organizations discussed in this document are presented for informational purposes only and do not constitute product approval or endorsement by the U.S. Department of Justice. This document was prepared under Interagency Agreement #1999–IJ–R–094 between...
Words: 22743 - Pages: 91
...Forensic Accounting Practice Bradford Clark Professor Dr. Hanners Lithonia Campus BUS 508 – Contemporary Business March 1, 2012 Strayer University Determine the most important five (5) skills that a forensic accountant needs to possess and evaluate the need for each skill. Be sure to include discussion regarding the relationship between the skill and its application to business operations. A forensic accountant is a specialist in accounting and financial systems that is trained to detect white collar fraud. Forensic Accounting is a fast growing field in the in the field of accounting. Although it has been around for a long time, it has become increasingly popular in the past few years as there have been a number of corporate scandals, stricter reporting, and internal control regulations involving public awareness and importance in the business world. With the state of the world’s economy forensic accountants are in high demand. Forensic accountants should at least possess a Bachelor degree in accounting. They should also be a Certified Public Accountant (CPA) and may possess other certifications such as Certified Forensic Accountant (CrFA) and Certified Forensic Accounting Professional (CFAP). The skills needed to become a forensic accountant include strategic critical thinking, problem solving/decision making, leadership, interpersonal and communication skills, and professional and ethical behavior. Strategic critical thinking is the ability to link data, knowledge...
Words: 1634 - Pages: 7
...Welcome to Homicide Forensic Science is a fundamental component of the justice system. Forensic scientists use scientific techniques and knowledge to assist law enforcement in investigations and solving crimes. They collect and analyze numerous types of evidence, including blood, body fluids; DNA; and human tissue. Forensic scientists assist the decision makers by showing the prosecutor if the issue has merit before it reaches the courtroom thereby reducing the number of cases having to be heard. Their decisions are based on scientific investigations and not circumstantial evidence or unreliable witnesses. Forensic scientists can restore faith in the judicial system with the use of science and technology for facts in criminal and civil investigations. The legal system is established on the belief that the legal process results in justice for all. History of forensic science The history of Forensic science or the applying of scientific principles to legal questions has a lengthy and interesting history. The first recorded autopsy was reported in 44 B.C was on Julius Caesar, where the Roman physician, Antistius proclaimed that he had 23 wounds on his body but only one was fatal. In 1248, a Chinese book entitled “His Duan Yu” (meaning The Washing Away of Wrongs) explaining how to tell apart a drowning from a strangulation. This was also the first recorded use of medicine to assist in solving crimes. In 1590, the first microscope was developed. In 1775, Karl...
Words: 2382 - Pages: 10
...Expert Witness Helped Convict Wrong Man A panel of six independent forensic scientists stated, in a report filed in a Houston State court, that crime laboratory supervisor James Bolding helped convict an innocent man of rape in 1987. Because Bolding either lacked basic knowledge of blood typing or gave false testimony, George Rodriguez spent 17 years in prison for a rape that he did not commit. Bolding’s testimony in the case was challenged amid a scandal that led to retesting of evidence in 360 cases; And with the report filed, that number could increase by the thousands, involving 25 years of cases. “The panel concluded that crime laboratory officials might have offered ''similarly false and scientifically unsound'' reports and testimony in other cases, and it called for a comprehensive audit spanning decades to re-examine the results of a broad array of rudimentary tests on blood, semen and other bodily fluids” (Liptak and Blumenthal, 2004). There have been many cases where forensic science and law enforcement experts have provided sworn testimony, documents, or reports intended for the court that contain unreliable or misleading information, findings, opinions, or conclusions. Some are found to have been intentionally offered by the expert in order to secure an unfair or unlawful conviction, via ‘fitting the evidence to the crime’. A state audit of the Houston police department (HPD) crime lab, completed in December 2002, found that HPDs DNA technicians there...
Words: 538 - Pages: 3
...The Criminal Investigation Process is a very important aspect of the criminal justice system in today’s society. The smallest mistake in any investigation can allow a dangerous criminal to walk free. The process sets guidelines for law enforcement officers and forensic investigators to follow when processing a scene, collecting evidence, and reporting their findings. The essential steps for any investigations team to follow are: Determine team composition, control contamination, document the scene, prioritize evidence collection, and collect, preserve, inventory, package, and transport and submit evidence. After all of that is accomplished the team has to get together to debrief about the crime scene, perform the final survey of the scene and document it. From there the evidence is processed, lab tests are performed, and all the information is submitted to the district attorney’s office so that charges can be filed. Following the process carefully and correctly is very important to the investigation; any missed steps can result in overlooked evidence and can bring the investigation to a standstill. The investigation process is vital to an investigation’s success and to the conviction of the criminals involved. The first step in the criminal investigation process is to determine the team composition. This step requires the lead investigator to assess the scene quickly and determine what resources and how many personnel will be necessary to process the scene efficiently. The...
Words: 1575 - Pages: 7
...Angela Mueller 4.22.15 CJ Capstone Project Part 4: Forensic Lab Introduction Forensic laboratories need to follow specific guidelines in order to be accredited by certain organizations. One such organization is the American Society of Crime Laboratory Directors, which has over thirty years of experience in certifying labs...
Words: 1438 - Pages: 6
...What is Computer Forensics? System forensics is the process of systematically examining computer media as well as network components, software, and memory for evidence. System forensics involves collecting, preserving, analyzing, and documenting evidence to reconstruct user activities. Appropriately collected evidence is often presented in court to solve criminal cases and prosecute criminals. 2. How has technology improved the way criminal investigators perform their job? Technology improved the way criminal investigators perform their jobs by making it easier to track things, there is different types of software out there today to help them with these issues, and make the jobs easier, when you have different technology to help. 3. Why would a company report or not report a compromise case? The reason a company may or may not report a compromise because if it’s not in their favor and they may report it if it’s in their favor and vice versa. They wouldn’t want to look incompetent. 4. Who is in charge of labeling and securing sensitive information? The one in charge of labeling and securing sensitive information is the forensic specialist. 5. What is the Daubert standard? The Daubert Standard provides a rule of evidence regarding the admissibility of expert witnesses' testimony during United States federal legal proceedings. 6. Why would someone use a hex editor in a forensic investigation? The reason someone would use a hex editor in a forensic investigation is...
Words: 898 - Pages: 4
...Ec-council.Braindumps.312-49.v2014-03-11.by.ANGELA.180q Number: 312-49 v8 Passing Score: 700 Time Limit: 240 min File Version: 16.5 http://www.gratisexam.com/ Exam Code: 312-49 Exam Name: Computer Hacking Forensic Investigator Practice Testw CHFI-1-105 QUESTION 1 When a file or folder Is deleted, the complete path, including the original file name, Is stored In a special hidden file called "INF02" In the Recycled folder. If the INF02flle Is deleted, It Is re-created when you _______ A. B. C. D. Restarting Windows Kill the running processes In Windows task manager Run the antivirus tool on the system Run the anti-spy ware tool on the system Correct Answer: A Section: (none) Explanation Explanation/Reference: A QUESTION 2 Graphics Interchange Format (GIF) is a ___________RGB bitmap Image format for Images with up to 256 distinct colors per frame. A. B. C. D. 8-bit 16-bit 24-bit 32-bit Correct Answer: A Section: (none) Explanation Explanation/Reference: QUESTION 3 The IIS log file format is a fixed (cannot be customized) ASCII text-based format. The IIS format includes basic items, such as client IP address, user name, date and time,service and instance, server name and IP address, request type, target of operation, etc. Identify theservice status code from the following IIS log. 192.168.100.150, -, 03/6/11, 8:45:30, W3SVC2,SERVER, 172.15.10.30, 4210, 125, 3524, 100, 0, GET, / dollerlogo.gif, A. B. C. D. W3SVC2 4210 3524 100 Correct Answer: D Section: (none) Explanation...
Words: 11383 - Pages: 46