SlideShare a Scribd company logo
Scenario
Two weeks ago, D&B Investigations was hired to conduct an
incident response for a major oil company in North Dakota. The
company’s senior management had reason to suspect that one or
more company employees were looking to commit corporate
espionage. The incident response team went on-site, began
monitoring the network, and isolated several suspects. They
captured forensic images from the machines the suspects used.
Now, your team leader has asked you to examine a forensic
image captured from a suspect’s computer, which runs the Mac
OS X operating system. The suspect’s name is John Smith, and
he is one of the company’s research engineers.
Tasks
• Review the information on the Mac OS X file structure
provided in the chapter titled “Macintosh Forensics” in the
course textbook.
• Using Paraben P2 Commander, create a case file and add the
image the incident response team captured (filename: Mac OS
JSmith.img).
• Sort and review the various directories within the Mac OS X
image. Look for evidence or indicators that John Smith was or
was not committing corporate espionage. This may include
direct evidence that John Smith took corporate property, as well
as indirect evidence or indicators about who the suspect is and
what his activities were during work hours. You can use the
software features to help you keep track of the evidence you
identify, for instance, by bookmarking sections of interest and
exporting files.
• Write a report in which you:
o Document your investigation methods.
o Document your findings. Explain what you found that may be
relevant to the case, and provide your rationale for each item
you have identified as an indicator or evidence that John Smith
was or was not committing corporate espionage.
o Analyze the potential implications of these findings for the
company and for a legal case.
Required Resources
▪ Course textbook
▪ Mac OS JSmith.img
▪ Internet access

More Related Content

Similar to ScenarioTwo weeks ago, D&B Investigations was hired to conduct a.docx

The Breach at Limetree Updated November 18, 2017 Bac.docx
The Breach at Limetree Updated November 18, 2017   Bac.docxThe Breach at Limetree Updated November 18, 2017   Bac.docx
The Breach at Limetree Updated November 18, 2017 Bac.docx
mehek4
 
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
Lab-4 Reconnaissance and Information Gathering         A hacker.docxLab-4 Reconnaissance and Information Gathering         A hacker.docx
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
LaticiaGrissomzz
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docx
rhetttrevannion
 
Case Project 1-1 Defining and Designing a NetworkThe overview.docx
Case Project 1-1 Defining and Designing a NetworkThe overview.docxCase Project 1-1 Defining and Designing a NetworkThe overview.docx
Case Project 1-1 Defining and Designing a NetworkThe overview.docx
tidwellveronique
 
Grc w22
Grc w22Grc w22
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docxAPA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
justine1simpson78276
 
BMIS 664 Final Project.docx
BMIS 664 Final Project.docxBMIS 664 Final Project.docx
BMIS 664 Final Project.docx
write31
 
Case Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docx
Case Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docxCase Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docx
Case Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docx
dewhirstichabod
 
Throughout this course, you will be keeping an investigative jou
Throughout this course, you will be keeping an investigative jouThroughout this course, you will be keeping an investigative jou
Throughout this course, you will be keeping an investigative jou
marilynnhoare
 
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docxAssignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
MerrileeDelvalle969
 
Cyber forensics lab 4
Cyber forensics lab 4Cyber forensics lab 4
Cyber forensics lab 4
MUSAAB HASAN
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
Shreya Singireddy
 
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxAssignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
annrodgerson
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
London School of Cyber Security
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
Case IQ
 
Hacking_SharePoint_FINAL
Hacking_SharePoint_FINALHacking_SharePoint_FINAL
Hacking_SharePoint_FINAL
Ian Naumenko, CISSP, CRISC
 
Threat Intelligence Field of Dreams
Threat Intelligence Field of DreamsThreat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
Greg Foss
 
Advanced LI PDF.001Advanced LI PDF.002Advanced LI PDF.00.docx
Advanced LI PDF.001Advanced LI PDF.002Advanced LI PDF.00.docxAdvanced LI PDF.001Advanced LI PDF.002Advanced LI PDF.00.docx
Advanced LI PDF.001Advanced LI PDF.002Advanced LI PDF.00.docx
nettletondevon
 
Case Study Of Insider Sabotage0104
Case Study Of Insider Sabotage0104Case Study Of Insider Sabotage0104
Case Study Of Insider Sabotage0104
phanleson
 
Insider threat-what-us-do d-want
Insider threat-what-us-do d-wantInsider threat-what-us-do d-want
Insider threat-what-us-do d-want
Security Bootcamp
 

Similar to ScenarioTwo weeks ago, D&B Investigations was hired to conduct a.docx (20)

The Breach at Limetree Updated November 18, 2017 Bac.docx
The Breach at Limetree Updated November 18, 2017   Bac.docxThe Breach at Limetree Updated November 18, 2017   Bac.docx
The Breach at Limetree Updated November 18, 2017 Bac.docx
 
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
Lab-4 Reconnaissance and Information Gathering         A hacker.docxLab-4 Reconnaissance and Information Gathering         A hacker.docx
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docx
 
Case Project 1-1 Defining and Designing a NetworkThe overview.docx
Case Project 1-1 Defining and Designing a NetworkThe overview.docxCase Project 1-1 Defining and Designing a NetworkThe overview.docx
Case Project 1-1 Defining and Designing a NetworkThe overview.docx
 
Grc w22
Grc w22Grc w22
Grc w22
 
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docxAPA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
 
BMIS 664 Final Project.docx
BMIS 664 Final Project.docxBMIS 664 Final Project.docx
BMIS 664 Final Project.docx
 
Case Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docx
Case Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docxCase Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docx
Case Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docx
 
Throughout this course, you will be keeping an investigative jou
Throughout this course, you will be keeping an investigative jouThroughout this course, you will be keeping an investigative jou
Throughout this course, you will be keeping an investigative jou
 
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docxAssignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
 
Cyber forensics lab 4
Cyber forensics lab 4Cyber forensics lab 4
Cyber forensics lab 4
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxAssignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
 
Hacking_SharePoint_FINAL
Hacking_SharePoint_FINALHacking_SharePoint_FINAL
Hacking_SharePoint_FINAL
 
Threat Intelligence Field of Dreams
Threat Intelligence Field of DreamsThreat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
 
Advanced LI PDF.001Advanced LI PDF.002Advanced LI PDF.00.docx
Advanced LI PDF.001Advanced LI PDF.002Advanced LI PDF.00.docxAdvanced LI PDF.001Advanced LI PDF.002Advanced LI PDF.00.docx
Advanced LI PDF.001Advanced LI PDF.002Advanced LI PDF.00.docx
 
Case Study Of Insider Sabotage0104
Case Study Of Insider Sabotage0104Case Study Of Insider Sabotage0104
Case Study Of Insider Sabotage0104
 
Insider threat-what-us-do d-want
Insider threat-what-us-do d-wantInsider threat-what-us-do d-want
Insider threat-what-us-do d-want
 

More from todd491

ScenarioYou and your learning team members are lead HR Recr.docx
ScenarioYou and your learning team members are lead HR Recr.docxScenarioYou and your learning team members are lead HR Recr.docx
ScenarioYou and your learning team members are lead HR Recr.docx
todd491
 
ScenarioWynn Regional Medical Center (WRMC) is the premier h.docx
ScenarioWynn Regional Medical Center (WRMC) is the premier h.docxScenarioWynn Regional Medical Center (WRMC) is the premier h.docx
ScenarioWynn Regional Medical Center (WRMC) is the premier h.docx
todd491
 
ScenarioWesley Enterprises is a long-term care facility. The org.docx
ScenarioWesley Enterprises is a long-term care facility. The org.docxScenarioWesley Enterprises is a long-term care facility. The org.docx
ScenarioWesley Enterprises is a long-term care facility. The org.docx
todd491
 
ScenarioThe scarcity of health resources continues to negati.docx
ScenarioThe scarcity of health resources continues to negati.docxScenarioThe scarcity of health resources continues to negati.docx
ScenarioThe scarcity of health resources continues to negati.docx
todd491
 
ScenarioThe water utility’s Information Technology (IT) person .docx
ScenarioThe water utility’s Information Technology (IT) person .docxScenarioThe water utility’s Information Technology (IT) person .docx
ScenarioThe water utility’s Information Technology (IT) person .docx
todd491
 
ScenarioThe Corporation Techs’ current network consists of 1.docx
ScenarioThe Corporation Techs’ current network consists of 1.docxScenarioThe Corporation Techs’ current network consists of 1.docx
ScenarioThe Corporation Techs’ current network consists of 1.docx
todd491
 
SCENARIOSamson Media is a publisher of several upmarket fash.docx
SCENARIOSamson Media is a publisher of several upmarket fash.docxSCENARIOSamson Media is a publisher of several upmarket fash.docx
SCENARIOSamson Media is a publisher of several upmarket fash.docx
todd491
 
ScenarioMary and Stacey are seniors at Silver State High School.docx
ScenarioMary and Stacey are seniors at Silver State High School.docxScenarioMary and Stacey are seniors at Silver State High School.docx
ScenarioMary and Stacey are seniors at Silver State High School.docx
todd491
 
ScenarioSam Trudeau managed a busy veterinary hospital. Two.docx
ScenarioSam Trudeau managed a busy veterinary hospital. Two.docxScenarioSam Trudeau managed a busy veterinary hospital. Two.docx
ScenarioSam Trudeau managed a busy veterinary hospital. Two.docx
todd491
 
ScenarioRecently, Executive Leadership at All About Analytics .docx
ScenarioRecently, Executive Leadership at All About Analytics .docxScenarioRecently, Executive Leadership at All About Analytics .docx
ScenarioRecently, Executive Leadership at All About Analytics .docx
todd491
 
ScenarioIntegrated Distributors Incorporated (IDI), a public.docx
ScenarioIntegrated Distributors Incorporated (IDI), a public.docxScenarioIntegrated Distributors Incorporated (IDI), a public.docx
ScenarioIntegrated Distributors Incorporated (IDI), a public.docx
todd491
 
ScenarioIn your quest to encourage innovation and entrepren.docx
ScenarioIn your quest to encourage innovation and entrepren.docxScenarioIn your quest to encourage innovation and entrepren.docx
ScenarioIn your quest to encourage innovation and entrepren.docx
todd491
 
ScenarioImagine you work for a US-based firm and are partnering w.docx
ScenarioImagine you work for a US-based firm and are partnering w.docxScenarioImagine you work for a US-based firm and are partnering w.docx
ScenarioImagine you work for a US-based firm and are partnering w.docx
todd491
 
ScenarioHealthy Dynamics have been around for 25 years and h.docx
ScenarioHealthy Dynamics have been around for 25 years and h.docxScenarioHealthy Dynamics have been around for 25 years and h.docx
ScenarioHealthy Dynamics have been around for 25 years and h.docx
todd491
 
ScenarioDue to the Always Fresh expansion, management wants .docx
ScenarioDue to the Always Fresh expansion, management wants .docxScenarioDue to the Always Fresh expansion, management wants .docx
ScenarioDue to the Always Fresh expansion, management wants .docx
todd491
 
ScenarioGinny, a young girl with autism, was recently enrolled .docx
ScenarioGinny, a young girl with autism, was recently enrolled .docxScenarioGinny, a young girl with autism, was recently enrolled .docx
ScenarioGinny, a young girl with autism, was recently enrolled .docx
todd491
 
ScenarioDanny is a 22-year-old college student, who has been br.docx
ScenarioDanny is a 22-year-old college student, who has been br.docxScenarioDanny is a 22-year-old college student, who has been br.docx
ScenarioDanny is a 22-year-old college student, who has been br.docx
todd491
 
ScenarioDue to the Always Fresh expansion, management wants addi.docx
ScenarioDue to the Always Fresh expansion, management wants addi.docxScenarioDue to the Always Fresh expansion, management wants addi.docx
ScenarioDue to the Always Fresh expansion, management wants addi.docx
todd491
 
ScenarioColonel Pat Bacon is the newly-appointed director of the.docx
ScenarioColonel Pat Bacon is the newly-appointed director of the.docxScenarioColonel Pat Bacon is the newly-appointed director of the.docx
ScenarioColonel Pat Bacon is the newly-appointed director of the.docx
todd491
 
ScenarioChanging access controls can have some undesirable e.docx
ScenarioChanging access controls can have some undesirable e.docxScenarioChanging access controls can have some undesirable e.docx
ScenarioChanging access controls can have some undesirable e.docx
todd491
 

More from todd491 (20)

ScenarioYou and your learning team members are lead HR Recr.docx
ScenarioYou and your learning team members are lead HR Recr.docxScenarioYou and your learning team members are lead HR Recr.docx
ScenarioYou and your learning team members are lead HR Recr.docx
 
ScenarioWynn Regional Medical Center (WRMC) is the premier h.docx
ScenarioWynn Regional Medical Center (WRMC) is the premier h.docxScenarioWynn Regional Medical Center (WRMC) is the premier h.docx
ScenarioWynn Regional Medical Center (WRMC) is the premier h.docx
 
ScenarioWesley Enterprises is a long-term care facility. The org.docx
ScenarioWesley Enterprises is a long-term care facility. The org.docxScenarioWesley Enterprises is a long-term care facility. The org.docx
ScenarioWesley Enterprises is a long-term care facility. The org.docx
 
ScenarioThe scarcity of health resources continues to negati.docx
ScenarioThe scarcity of health resources continues to negati.docxScenarioThe scarcity of health resources continues to negati.docx
ScenarioThe scarcity of health resources continues to negati.docx
 
ScenarioThe water utility’s Information Technology (IT) person .docx
ScenarioThe water utility’s Information Technology (IT) person .docxScenarioThe water utility’s Information Technology (IT) person .docx
ScenarioThe water utility’s Information Technology (IT) person .docx
 
ScenarioThe Corporation Techs’ current network consists of 1.docx
ScenarioThe Corporation Techs’ current network consists of 1.docxScenarioThe Corporation Techs’ current network consists of 1.docx
ScenarioThe Corporation Techs’ current network consists of 1.docx
 
SCENARIOSamson Media is a publisher of several upmarket fash.docx
SCENARIOSamson Media is a publisher of several upmarket fash.docxSCENARIOSamson Media is a publisher of several upmarket fash.docx
SCENARIOSamson Media is a publisher of several upmarket fash.docx
 
ScenarioMary and Stacey are seniors at Silver State High School.docx
ScenarioMary and Stacey are seniors at Silver State High School.docxScenarioMary and Stacey are seniors at Silver State High School.docx
ScenarioMary and Stacey are seniors at Silver State High School.docx
 
ScenarioSam Trudeau managed a busy veterinary hospital. Two.docx
ScenarioSam Trudeau managed a busy veterinary hospital. Two.docxScenarioSam Trudeau managed a busy veterinary hospital. Two.docx
ScenarioSam Trudeau managed a busy veterinary hospital. Two.docx
 
ScenarioRecently, Executive Leadership at All About Analytics .docx
ScenarioRecently, Executive Leadership at All About Analytics .docxScenarioRecently, Executive Leadership at All About Analytics .docx
ScenarioRecently, Executive Leadership at All About Analytics .docx
 
ScenarioIntegrated Distributors Incorporated (IDI), a public.docx
ScenarioIntegrated Distributors Incorporated (IDI), a public.docxScenarioIntegrated Distributors Incorporated (IDI), a public.docx
ScenarioIntegrated Distributors Incorporated (IDI), a public.docx
 
ScenarioIn your quest to encourage innovation and entrepren.docx
ScenarioIn your quest to encourage innovation and entrepren.docxScenarioIn your quest to encourage innovation and entrepren.docx
ScenarioIn your quest to encourage innovation and entrepren.docx
 
ScenarioImagine you work for a US-based firm and are partnering w.docx
ScenarioImagine you work for a US-based firm and are partnering w.docxScenarioImagine you work for a US-based firm and are partnering w.docx
ScenarioImagine you work for a US-based firm and are partnering w.docx
 
ScenarioHealthy Dynamics have been around for 25 years and h.docx
ScenarioHealthy Dynamics have been around for 25 years and h.docxScenarioHealthy Dynamics have been around for 25 years and h.docx
ScenarioHealthy Dynamics have been around for 25 years and h.docx
 
ScenarioDue to the Always Fresh expansion, management wants .docx
ScenarioDue to the Always Fresh expansion, management wants .docxScenarioDue to the Always Fresh expansion, management wants .docx
ScenarioDue to the Always Fresh expansion, management wants .docx
 
ScenarioGinny, a young girl with autism, was recently enrolled .docx
ScenarioGinny, a young girl with autism, was recently enrolled .docxScenarioGinny, a young girl with autism, was recently enrolled .docx
ScenarioGinny, a young girl with autism, was recently enrolled .docx
 
ScenarioDanny is a 22-year-old college student, who has been br.docx
ScenarioDanny is a 22-year-old college student, who has been br.docxScenarioDanny is a 22-year-old college student, who has been br.docx
ScenarioDanny is a 22-year-old college student, who has been br.docx
 
ScenarioDue to the Always Fresh expansion, management wants addi.docx
ScenarioDue to the Always Fresh expansion, management wants addi.docxScenarioDue to the Always Fresh expansion, management wants addi.docx
ScenarioDue to the Always Fresh expansion, management wants addi.docx
 
ScenarioColonel Pat Bacon is the newly-appointed director of the.docx
ScenarioColonel Pat Bacon is the newly-appointed director of the.docxScenarioColonel Pat Bacon is the newly-appointed director of the.docx
ScenarioColonel Pat Bacon is the newly-appointed director of the.docx
 
ScenarioChanging access controls can have some undesirable e.docx
ScenarioChanging access controls can have some undesirable e.docxScenarioChanging access controls can have some undesirable e.docx
ScenarioChanging access controls can have some undesirable e.docx
 

Recently uploaded

Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
Kavitha Krishnan
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 

Recently uploaded (20)

Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Assessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptxAssessment and Planning in Educational technology.pptx
Assessment and Planning in Educational technology.pptx
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 

ScenarioTwo weeks ago, D&B Investigations was hired to conduct a.docx

  • 1. Scenario Two weeks ago, D&B Investigations was hired to conduct an incident response for a major oil company in North Dakota. The company’s senior management had reason to suspect that one or more company employees were looking to commit corporate espionage. The incident response team went on-site, began monitoring the network, and isolated several suspects. They captured forensic images from the machines the suspects used. Now, your team leader has asked you to examine a forensic image captured from a suspect’s computer, which runs the Mac OS X operating system. The suspect’s name is John Smith, and he is one of the company’s research engineers. Tasks • Review the information on the Mac OS X file structure provided in the chapter titled “Macintosh Forensics” in the course textbook. • Using Paraben P2 Commander, create a case file and add the image the incident response team captured (filename: Mac OS JSmith.img). • Sort and review the various directories within the Mac OS X image. Look for evidence or indicators that John Smith was or was not committing corporate espionage. This may include direct evidence that John Smith took corporate property, as well as indirect evidence or indicators about who the suspect is and what his activities were during work hours. You can use the software features to help you keep track of the evidence you identify, for instance, by bookmarking sections of interest and exporting files. • Write a report in which you:
  • 2. o Document your investigation methods. o Document your findings. Explain what you found that may be relevant to the case, and provide your rationale for each item you have identified as an indicator or evidence that John Smith was or was not committing corporate espionage. o Analyze the potential implications of these findings for the company and for a legal case. Required Resources ▪ Course textbook ▪ Mac OS JSmith.img ▪ Internet access