A company (MyComp) has reported that there has been some malicious activity within their company. They have managed to get a virtual image of the computer, which contains traces of evidence that could be used for the investigation (this includes both host activity on the system and network traces). It is thus your objective to investigate the virtual image, and produce a fair and unbiased report on the findings.
The analysis should involve analysing the network trace for the connections from the hosts which connected to the host‐under‐suspicion (HUS). Along with this you should analyse and cross‐correlate the activity within the logs on the HUS, and the trace of files left on the system. Evidence should also be gained from the applications which were used within the time window of interest. Please note that all other activity outside this window‐of‐interest should be ignored.
4 freelancer bu iş için ortalamada 546$ teklif veriyor
I have checked your attachment and I am ready to write the report.This report will be easy for me because I am good at "internal audit" and I have past experience on this kind of report.Please Check PM