Description
Please look at the following file I have developed and write more ideas and screenshoot to explain it. the subject is: The first part of the assignment is for you to create a forensics challenge for your classmates. Create an original scenario and include as much information as you can, including graphics, header information, DNS information, etc. You must have these accompanying 'artifacts' as clues for the investigators to follow. This is not necessarily an Internet forensics challenge, you may use any of the topics presented in this course. You must provide enough information for your fellow classmates to come up with a solution. Part of the grade for this assignment is that the challenge must be 'do-able'. You can reference the assignment case studies as examples. Send your challenge to your professor prior to posting. Include your solution, that is, what you expect the outcome to be. Once you get approval, post ONLY the challenge to the Challenges forum, do not post the solution. Post your challenge to the Forensics Challenge Forum by the last day of Week 11 (earlier is better) in order to give your fellow classmates plenty of time to figure out a solution!
Unformatted Attachment Preview
Purchase answer to see full attachment

Explanation & Answer

Student’s Name Professor’s Name Course Name Date Computer Forensics Challenge Challenge Part 1 A local company has asked you to conduct a forensic work on a recent computer forensics incident that has just occurred. There is a new employee who works at odd hours when other employees have gone home. Recently, the company servers were hacked and confidential information was retrieved. This information which is specifically significant to the company’s business has caused the company to suffer losses. The computer owned by the employee and is suspected to be used in the hacking is an IBM Lenovo 8808 Pentium D [FAT32] that runs on a windows 8.1 Operating System. As the forensics expert, you have been given the computer with the aid of additional information from the company’s lab. Investigate whether there was any hacking to the servers. Additional Information IP address 192.168.19IBM Lenovo 8808 Pentium D [FAT32]Processor PC 3.4GHz Question Write a report on the findings of your forensics investigation. Part 2 FORENSIC PROCESSING AND RECORDINGS INVESTIGATOR: Idissah (210094) FORENSIC CASE NUMBER: 21/105/44580 Requester: Offense: Ca...
