WGU C840 Digital Forensics in Cybersecurity (1 Completed Essay)

WGU C840 Digital Forensics in Cybersecurity lets you practice with real past exam questions to boost your confidence.

Madison Taylor
Contributor
4.6
81
9 months ago
Preview (4 of 10 Pages)
100%
Purchase to unlock

Page 1

WGU C840 Digital Forensics in Cybersecurity (1 Completed Essay) - Page 1 preview image

Loading page image...

DIGITAL FORENSIC REPORT BY RICKY GALAN1Digital Forensic Investigation into John SmithWGU C840 Digital Forensics in CybersecurityBackgroundJohn Smith, who worked for the oil company as a research engineer, is suspected of possibleillegal data exfiltration of proprietary information. The oil company has hired D&B Investigationto investigate. Lead investigator is Ricky Galan. Forensic evidence was captured on-site from adevice used by John Smith. Analysis is to be conducted at D&B Investigation’s lab, accreditedby The American Society of Crime Laboratory Directors (ASCLD).To perform an effective and competent investigation, Encase Evidence Examiner was used torecover and examine files from the device used in connection with the suspect and case.Evidence GatheringThe oil company furnished the device used by John Smith to be used to conduct theinvestigation. A chain of custody form was filled out by D&B Lead investigator Ricky Galan andthe oil company’s Head of Security, John Doe. Photos of equipment were taken prior to allmovement of said equipment to the lab.AnalysisThe image file JSmith 1 GB was created and loaded into the Encase Evidence Examiner (E3)software (Figure 1).

Page 2

WGU C840 Digital Forensics in Cybersecurity (1 Completed Essay) - Page 2 preview image

Loading page image...

Page 3

WGU C840 Digital Forensics in Cybersecurity (1 Completed Essay) - Page 3 preview image

Loading page image...

DIGITAL FORENSIC REPORT BY RICKY GALAN2Figure 1A SHA-1 hash (531C1F27A5E5E2FB0D75BB5584071FDDF6B06342) was generated using theMicrosoft File Explorer built-in Cyclical Redundancy Checker (CRC) (Figure 2).Figure 2This hash was verified using the software AccessData FTK Imager (Figure 3).

Page 4

WGU C840 Digital Forensics in Cybersecurity (1 Completed Essay) - Page 4 preview image

Loading page image...

DIGITAL FORENSIC REPORT BY RICKY GALAN3Figure 3DocumentsContent analysis was run on the image file and revealed several different types ofdocuments located in the John Smith’s Documents folder. A file including the partial word“propriet” was located among the user’s documents (Figure 4).
Preview Mode

This document has 10 pages. Sign in to access the full document!

Study Now!

XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat

Document Details

Related Documents

View all