SlideShare a Scribd company logo
1 of 2
Scenario
Two weeks ago, D&B Investigations was hired to conduct an
incident response for a major oil company in North Dakota. The
company’s senior management had reason to suspect that one or
more company employees were looking to commit corporate
espionage. The incident response team went on-site, began
monitoring the network, and isolated several suspects. They
captured forensic images from the machines the suspects used.
Now, your team leader has asked you to examine a forensic
image captured from a suspect’s computer, which runs the Mac
OS X operating system. The suspect’s name is John Smith, and
he is one of the company’s research engineers.
Tasks
• Review the information on the Mac OS X file structure
provided in the chapter titled “Macintosh Forensics” in the
course textbook.
• Using Paraben P2 Commander, create a case file and add the
image the incident response team captured (filename: Mac OS
JSmith.img).
• Sort and review the various directories within the Mac OS X
image. Look for evidence or indicators that John Smith was or
was not committing corporate espionage. This may include
direct evidence that John Smith took corporate property, as well
as indirect evidence or indicators about who the suspect is and
what his activities were during work hours. You can use the
software features to help you keep track of the evidence you
identify, for instance, by bookmarking sections of interest and
exporting files.
• Write a report in which you:
o Document your investigation methods.
o Document your findings. Explain what you found that may be
relevant to the case, and provide your rationale for each item
you have identified as an indicator or evidence that John Smith
was or was not committing corporate espionage.
o Analyze the potential implications of these findings for the
company and for a legal case.
Required Resources
▪ Course textbook
▪ Mac OS JSmith.img
▪ Internet access

More Related Content

Similar to ScenarioTwo weeks ago, D&B Investigations was hired to conduct a.docx

The Breach at Limetree Updated November 18, 2017 Bac.docx
The Breach at Limetree Updated November 18, 2017   Bac.docxThe Breach at Limetree Updated November 18, 2017   Bac.docx
The Breach at Limetree Updated November 18, 2017 Bac.docxmehek4
 
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
Lab-4 Reconnaissance and Information Gathering         A hacker.docxLab-4 Reconnaissance and Information Gathering         A hacker.docx
Lab-4 Reconnaissance and Information Gathering  A hacker.docxLaticiaGrissomzz
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxrhetttrevannion
 
Case Project 1-1 Defining and Designing a NetworkThe overview.docx
Case Project 1-1 Defining and Designing a NetworkThe overview.docxCase Project 1-1 Defining and Designing a NetworkThe overview.docx
Case Project 1-1 Defining and Designing a NetworkThe overview.docxtidwellveronique
 
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docxAPA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docxjustine1simpson78276
 
BMIS 664 Final Project.docx
BMIS 664 Final Project.docxBMIS 664 Final Project.docx
BMIS 664 Final Project.docxwrite31
 
Case Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docx
Case Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docxCase Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docx
Case Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docxdewhirstichabod
 
Throughout this course, you will be keeping an investigative jou
Throughout this course, you will be keeping an investigative jouThroughout this course, you will be keeping an investigative jou
Throughout this course, you will be keeping an investigative joumarilynnhoare
 
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docxAssignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docxMerrileeDelvalle969
 
Cyber forensics lab 4
Cyber forensics lab 4Cyber forensics lab 4
Cyber forensics lab 4MUSAAB HASAN
 
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxAssignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxannrodgerson
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftCase IQ
 
Threat Intelligence Field of Dreams
Threat Intelligence Field of DreamsThreat Intelligence Field of Dreams
Threat Intelligence Field of DreamsGreg Foss
 
Advanced LI PDF.001Advanced LI PDF.002Advanced LI PDF.00.docx
Advanced LI PDF.001Advanced LI PDF.002Advanced LI PDF.00.docxAdvanced LI PDF.001Advanced LI PDF.002Advanced LI PDF.00.docx
Advanced LI PDF.001Advanced LI PDF.002Advanced LI PDF.00.docxnettletondevon
 
Case Study Of Insider Sabotage0104
Case Study Of Insider Sabotage0104Case Study Of Insider Sabotage0104
Case Study Of Insider Sabotage0104phanleson
 
Insider threat-what-us-do d-want
Insider threat-what-us-do d-wantInsider threat-what-us-do d-want
Insider threat-what-us-do d-wantSecurity Bootcamp
 

Similar to ScenarioTwo weeks ago, D&B Investigations was hired to conduct a.docx (20)

The Breach at Limetree Updated November 18, 2017 Bac.docx
The Breach at Limetree Updated November 18, 2017   Bac.docxThe Breach at Limetree Updated November 18, 2017   Bac.docx
The Breach at Limetree Updated November 18, 2017 Bac.docx
 
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
Lab-4 Reconnaissance and Information Gathering         A hacker.docxLab-4 Reconnaissance and Information Gathering         A hacker.docx
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
 
Exercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docxExercise 3You work as a forensic investigator. A recent inquiry .docx
Exercise 3You work as a forensic investigator. A recent inquiry .docx
 
Case Project 1-1 Defining and Designing a NetworkThe overview.docx
Case Project 1-1 Defining and Designing a NetworkThe overview.docxCase Project 1-1 Defining and Designing a NetworkThe overview.docx
Case Project 1-1 Defining and Designing a NetworkThe overview.docx
 
Grc w22
Grc w22Grc w22
Grc w22
 
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docxAPA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
APA Writing Sample Extortion on the JobValorie J. King, PhDApril .docx
 
BMIS 664 Final Project.docx
BMIS 664 Final Project.docxBMIS 664 Final Project.docx
BMIS 664 Final Project.docx
 
Case Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docx
Case Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docxCase Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docx
Case Project 8-2 Detecting Unauthorized ApplicationsIn conducti.docx
 
Throughout this course, you will be keeping an investigative jou
Throughout this course, you will be keeping an investigative jouThroughout this course, you will be keeping an investigative jou
Throughout this course, you will be keeping an investigative jou
 
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docxAssignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
Assignment 2 LASA 2 Dropbox AssignmentThis assignment comp.docx
 
Cyber forensics lab 4
Cyber forensics lab 4Cyber forensics lab 4
Cyber forensics lab 4
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docxAssignment 2 LASA 2 Submissions AssignmentThis assignment .docx
Assignment 2 LASA 2 Submissions AssignmentThis assignment .docx
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
The Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data TheftThe Inside Job: Detecting, Preventing and Investigating Data Theft
The Inside Job: Detecting, Preventing and Investigating Data Theft
 
Hacking_SharePoint_FINAL
Hacking_SharePoint_FINALHacking_SharePoint_FINAL
Hacking_SharePoint_FINAL
 
Threat Intelligence Field of Dreams
Threat Intelligence Field of DreamsThreat Intelligence Field of Dreams
Threat Intelligence Field of Dreams
 
Advanced LI PDF.001Advanced LI PDF.002Advanced LI PDF.00.docx
Advanced LI PDF.001Advanced LI PDF.002Advanced LI PDF.00.docxAdvanced LI PDF.001Advanced LI PDF.002Advanced LI PDF.00.docx
Advanced LI PDF.001Advanced LI PDF.002Advanced LI PDF.00.docx
 
Case Study Of Insider Sabotage0104
Case Study Of Insider Sabotage0104Case Study Of Insider Sabotage0104
Case Study Of Insider Sabotage0104
 
Insider threat-what-us-do d-want
Insider threat-what-us-do d-wantInsider threat-what-us-do d-want
Insider threat-what-us-do d-want
 

More from todd491

ScenarioYou and your learning team members are lead HR Recr.docx
ScenarioYou and your learning team members are lead HR Recr.docxScenarioYou and your learning team members are lead HR Recr.docx
ScenarioYou and your learning team members are lead HR Recr.docxtodd491
 
ScenarioWynn Regional Medical Center (WRMC) is the premier h.docx
ScenarioWynn Regional Medical Center (WRMC) is the premier h.docxScenarioWynn Regional Medical Center (WRMC) is the premier h.docx
ScenarioWynn Regional Medical Center (WRMC) is the premier h.docxtodd491
 
ScenarioWesley Enterprises is a long-term care facility. The org.docx
ScenarioWesley Enterprises is a long-term care facility. The org.docxScenarioWesley Enterprises is a long-term care facility. The org.docx
ScenarioWesley Enterprises is a long-term care facility. The org.docxtodd491
 
ScenarioThe scarcity of health resources continues to negati.docx
ScenarioThe scarcity of health resources continues to negati.docxScenarioThe scarcity of health resources continues to negati.docx
ScenarioThe scarcity of health resources continues to negati.docxtodd491
 
ScenarioThe water utility’s Information Technology (IT) person .docx
ScenarioThe water utility’s Information Technology (IT) person .docxScenarioThe water utility’s Information Technology (IT) person .docx
ScenarioThe water utility’s Information Technology (IT) person .docxtodd491
 
ScenarioThe Corporation Techs’ current network consists of 1.docx
ScenarioThe Corporation Techs’ current network consists of 1.docxScenarioThe Corporation Techs’ current network consists of 1.docx
ScenarioThe Corporation Techs’ current network consists of 1.docxtodd491
 
SCENARIOSamson Media is a publisher of several upmarket fash.docx
SCENARIOSamson Media is a publisher of several upmarket fash.docxSCENARIOSamson Media is a publisher of several upmarket fash.docx
SCENARIOSamson Media is a publisher of several upmarket fash.docxtodd491
 
ScenarioMary and Stacey are seniors at Silver State High School.docx
ScenarioMary and Stacey are seniors at Silver State High School.docxScenarioMary and Stacey are seniors at Silver State High School.docx
ScenarioMary and Stacey are seniors at Silver State High School.docxtodd491
 
ScenarioSam Trudeau managed a busy veterinary hospital. Two.docx
ScenarioSam Trudeau managed a busy veterinary hospital. Two.docxScenarioSam Trudeau managed a busy veterinary hospital. Two.docx
ScenarioSam Trudeau managed a busy veterinary hospital. Two.docxtodd491
 
ScenarioRecently, Executive Leadership at All About Analytics .docx
ScenarioRecently, Executive Leadership at All About Analytics .docxScenarioRecently, Executive Leadership at All About Analytics .docx
ScenarioRecently, Executive Leadership at All About Analytics .docxtodd491
 
ScenarioIntegrated Distributors Incorporated (IDI), a public.docx
ScenarioIntegrated Distributors Incorporated (IDI), a public.docxScenarioIntegrated Distributors Incorporated (IDI), a public.docx
ScenarioIntegrated Distributors Incorporated (IDI), a public.docxtodd491
 
ScenarioIn your quest to encourage innovation and entrepren.docx
ScenarioIn your quest to encourage innovation and entrepren.docxScenarioIn your quest to encourage innovation and entrepren.docx
ScenarioIn your quest to encourage innovation and entrepren.docxtodd491
 
ScenarioImagine you work for a US-based firm and are partnering w.docx
ScenarioImagine you work for a US-based firm and are partnering w.docxScenarioImagine you work for a US-based firm and are partnering w.docx
ScenarioImagine you work for a US-based firm and are partnering w.docxtodd491
 
ScenarioHealthy Dynamics have been around for 25 years and h.docx
ScenarioHealthy Dynamics have been around for 25 years and h.docxScenarioHealthy Dynamics have been around for 25 years and h.docx
ScenarioHealthy Dynamics have been around for 25 years and h.docxtodd491
 
ScenarioDue to the Always Fresh expansion, management wants .docx
ScenarioDue to the Always Fresh expansion, management wants .docxScenarioDue to the Always Fresh expansion, management wants .docx
ScenarioDue to the Always Fresh expansion, management wants .docxtodd491
 
ScenarioGinny, a young girl with autism, was recently enrolled .docx
ScenarioGinny, a young girl with autism, was recently enrolled .docxScenarioGinny, a young girl with autism, was recently enrolled .docx
ScenarioGinny, a young girl with autism, was recently enrolled .docxtodd491
 
ScenarioDanny is a 22-year-old college student, who has been br.docx
ScenarioDanny is a 22-year-old college student, who has been br.docxScenarioDanny is a 22-year-old college student, who has been br.docx
ScenarioDanny is a 22-year-old college student, who has been br.docxtodd491
 
ScenarioDue to the Always Fresh expansion, management wants addi.docx
ScenarioDue to the Always Fresh expansion, management wants addi.docxScenarioDue to the Always Fresh expansion, management wants addi.docx
ScenarioDue to the Always Fresh expansion, management wants addi.docxtodd491
 
ScenarioColonel Pat Bacon is the newly-appointed director of the.docx
ScenarioColonel Pat Bacon is the newly-appointed director of the.docxScenarioColonel Pat Bacon is the newly-appointed director of the.docx
ScenarioColonel Pat Bacon is the newly-appointed director of the.docxtodd491
 
ScenarioChanging access controls can have some undesirable e.docx
ScenarioChanging access controls can have some undesirable e.docxScenarioChanging access controls can have some undesirable e.docx
ScenarioChanging access controls can have some undesirable e.docxtodd491
 

More from todd491 (20)

ScenarioYou and your learning team members are lead HR Recr.docx
ScenarioYou and your learning team members are lead HR Recr.docxScenarioYou and your learning team members are lead HR Recr.docx
ScenarioYou and your learning team members are lead HR Recr.docx
 
ScenarioWynn Regional Medical Center (WRMC) is the premier h.docx
ScenarioWynn Regional Medical Center (WRMC) is the premier h.docxScenarioWynn Regional Medical Center (WRMC) is the premier h.docx
ScenarioWynn Regional Medical Center (WRMC) is the premier h.docx
 
ScenarioWesley Enterprises is a long-term care facility. The org.docx
ScenarioWesley Enterprises is a long-term care facility. The org.docxScenarioWesley Enterprises is a long-term care facility. The org.docx
ScenarioWesley Enterprises is a long-term care facility. The org.docx
 
ScenarioThe scarcity of health resources continues to negati.docx
ScenarioThe scarcity of health resources continues to negati.docxScenarioThe scarcity of health resources continues to negati.docx
ScenarioThe scarcity of health resources continues to negati.docx
 
ScenarioThe water utility’s Information Technology (IT) person .docx
ScenarioThe water utility’s Information Technology (IT) person .docxScenarioThe water utility’s Information Technology (IT) person .docx
ScenarioThe water utility’s Information Technology (IT) person .docx
 
ScenarioThe Corporation Techs’ current network consists of 1.docx
ScenarioThe Corporation Techs’ current network consists of 1.docxScenarioThe Corporation Techs’ current network consists of 1.docx
ScenarioThe Corporation Techs’ current network consists of 1.docx
 
SCENARIOSamson Media is a publisher of several upmarket fash.docx
SCENARIOSamson Media is a publisher of several upmarket fash.docxSCENARIOSamson Media is a publisher of several upmarket fash.docx
SCENARIOSamson Media is a publisher of several upmarket fash.docx
 
ScenarioMary and Stacey are seniors at Silver State High School.docx
ScenarioMary and Stacey are seniors at Silver State High School.docxScenarioMary and Stacey are seniors at Silver State High School.docx
ScenarioMary and Stacey are seniors at Silver State High School.docx
 
ScenarioSam Trudeau managed a busy veterinary hospital. Two.docx
ScenarioSam Trudeau managed a busy veterinary hospital. Two.docxScenarioSam Trudeau managed a busy veterinary hospital. Two.docx
ScenarioSam Trudeau managed a busy veterinary hospital. Two.docx
 
ScenarioRecently, Executive Leadership at All About Analytics .docx
ScenarioRecently, Executive Leadership at All About Analytics .docxScenarioRecently, Executive Leadership at All About Analytics .docx
ScenarioRecently, Executive Leadership at All About Analytics .docx
 
ScenarioIntegrated Distributors Incorporated (IDI), a public.docx
ScenarioIntegrated Distributors Incorporated (IDI), a public.docxScenarioIntegrated Distributors Incorporated (IDI), a public.docx
ScenarioIntegrated Distributors Incorporated (IDI), a public.docx
 
ScenarioIn your quest to encourage innovation and entrepren.docx
ScenarioIn your quest to encourage innovation and entrepren.docxScenarioIn your quest to encourage innovation and entrepren.docx
ScenarioIn your quest to encourage innovation and entrepren.docx
 
ScenarioImagine you work for a US-based firm and are partnering w.docx
ScenarioImagine you work for a US-based firm and are partnering w.docxScenarioImagine you work for a US-based firm and are partnering w.docx
ScenarioImagine you work for a US-based firm and are partnering w.docx
 
ScenarioHealthy Dynamics have been around for 25 years and h.docx
ScenarioHealthy Dynamics have been around for 25 years and h.docxScenarioHealthy Dynamics have been around for 25 years and h.docx
ScenarioHealthy Dynamics have been around for 25 years and h.docx
 
ScenarioDue to the Always Fresh expansion, management wants .docx
ScenarioDue to the Always Fresh expansion, management wants .docxScenarioDue to the Always Fresh expansion, management wants .docx
ScenarioDue to the Always Fresh expansion, management wants .docx
 
ScenarioGinny, a young girl with autism, was recently enrolled .docx
ScenarioGinny, a young girl with autism, was recently enrolled .docxScenarioGinny, a young girl with autism, was recently enrolled .docx
ScenarioGinny, a young girl with autism, was recently enrolled .docx
 
ScenarioDanny is a 22-year-old college student, who has been br.docx
ScenarioDanny is a 22-year-old college student, who has been br.docxScenarioDanny is a 22-year-old college student, who has been br.docx
ScenarioDanny is a 22-year-old college student, who has been br.docx
 
ScenarioDue to the Always Fresh expansion, management wants addi.docx
ScenarioDue to the Always Fresh expansion, management wants addi.docxScenarioDue to the Always Fresh expansion, management wants addi.docx
ScenarioDue to the Always Fresh expansion, management wants addi.docx
 
ScenarioColonel Pat Bacon is the newly-appointed director of the.docx
ScenarioColonel Pat Bacon is the newly-appointed director of the.docxScenarioColonel Pat Bacon is the newly-appointed director of the.docx
ScenarioColonel Pat Bacon is the newly-appointed director of the.docx
 
ScenarioChanging access controls can have some undesirable e.docx
ScenarioChanging access controls can have some undesirable e.docxScenarioChanging access controls can have some undesirable e.docx
ScenarioChanging access controls can have some undesirable e.docx
 

Recently uploaded

Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

ScenarioTwo weeks ago, D&B Investigations was hired to conduct a.docx

  • 1. Scenario Two weeks ago, D&B Investigations was hired to conduct an incident response for a major oil company in North Dakota. The company’s senior management had reason to suspect that one or more company employees were looking to commit corporate espionage. The incident response team went on-site, began monitoring the network, and isolated several suspects. They captured forensic images from the machines the suspects used. Now, your team leader has asked you to examine a forensic image captured from a suspect’s computer, which runs the Mac OS X operating system. The suspect’s name is John Smith, and he is one of the company’s research engineers. Tasks • Review the information on the Mac OS X file structure provided in the chapter titled “Macintosh Forensics” in the course textbook. • Using Paraben P2 Commander, create a case file and add the image the incident response team captured (filename: Mac OS JSmith.img). • Sort and review the various directories within the Mac OS X image. Look for evidence or indicators that John Smith was or was not committing corporate espionage. This may include direct evidence that John Smith took corporate property, as well as indirect evidence or indicators about who the suspect is and what his activities were during work hours. You can use the software features to help you keep track of the evidence you identify, for instance, by bookmarking sections of interest and exporting files. • Write a report in which you:
  • 2. o Document your investigation methods. o Document your findings. Explain what you found that may be relevant to the case, and provide your rationale for each item you have identified as an indicator or evidence that John Smith was or was not committing corporate espionage. o Analyze the potential implications of these findings for the company and for a legal case. Required Resources ▪ Course textbook ▪ Mac OS JSmith.img ▪ Internet access