CramX Logo
Digital Forensics Investigation: Analyzing Data Breach and Evidence Acquisition in a Microsoft Windows Environment - Document preview page 1

Digital Forensics Investigation: Analyzing Data Breach and Evidence Acquisition in a Microsoft Windows Environment - Page 1

Document preview content for Digital Forensics Investigation: Analyzing Data Breach and Evidence Acquisition in a Microsoft Windows Environment

Digital Forensics Investigation: Analyzing Data Breach and Evidence Acquisition in a Microsoft Windows Environment

This assignment discusses digital forensics techniques for investigating data breaches in a Windows environment.

Benjamin Fisher
Contributor
4.7
0
12 months ago
Preview (4 of 13 Pages)
100%
Log in to unlock
Page 1 of 4
Digital Forensics Investigation: Analyzing Data Breach and Evidence Acquisition in a Microsoft Windows Environment - Page 1 preview imageASSIGNMENTJUNE 30, 2015STUDENT NAME
Page 2 of 4
Digital Forensics Investigation: Analyzing Data Breach and Evidence Acquisition in a Microsoft Windows Environment - Page 2 preview image
Page 3 of 4
Digital Forensics Investigation: Analyzing Data Breach and Evidence Acquisition in a Microsoft Windows Environment - Page 3 preview imageDigital Forensics Investigation: Analyzing Data Breach and EvidenceAcquisition in a Microsoft Windows EnvironmentConduct a detailed digital forensics investigation into a data breachscenario involving aMicrosoft Windows environment. Your analysis should include the following:Identification and examination of potential evidence.Description of the tools and techniques used for evidence acquisition.Discussion onmaintaining the integrity and chain of custody of digital evidence.Recommendations for preventing future data breaches.Your answer should be well-structured, supported by relevant examples, and must be between1500 to 2000 words.
Page 4 of 4
Digital Forensics Investigation: Analyzing Data Breach and Evidence Acquisition in a Microsoft Windows Environment - Page 4 preview imagePart A)Computer technology is the significant basic piece of ordinary human life, and it is becomingquickly, as are PC unlawful acts, for example, financial extortion, unauthorized interruption,data fraud and intellectual theft. To counteract those PCrelated law violations, ComputerForensics assumes an essential part. "PCLegal sciences includes getting and dissectingcomputerized data for utilization as proof in common, criminal orauthoritative cases".Digital evidence can be any data put away or transmitted in digital structure. Our group of XYZInc.willrecognizeandfollowingthePCframeworksofHumanResourceManager'sComputer,works on a Microsoft Windows XP workstation. Additionally our group has beenbreaking down the HCC system, database server, and any workstations we think to figure outwhether there was a rupture and any potential patient information spillage.The database server is a Microsoft Windows 2003 Server running Microsoft SQL Server2008.Our group has been tasked with breaking down the HCC system, database server, andany workstations we suspect to figure out whether there was a rupture and any potential patientinformation spillage. The database server is a Microsoft Windows 2003 Server runningMicrosoft SQL Server 2008.The group can gather the data from the picture of hard plate of allthe framework, Human ResourceSupervisor's Computer,database server, workstations weassociate to determine.This picture with plates helps us to figure out what information they were gotten to on whichdate and at what time. For the most part, PC records are viewed as permissible on the off chancethat they qualify as a business record. Computerrecords are normally isolated into PC created
Preview Mode

This document has 13 pages. Sign in to access the full document!