One of your clients at your cybersecurity company believes their personal computer may be infected with some software that is slowing it down significantly and may be a security threat. After not finding anything using antivirus software, they have asked if you could examine the computer. You and your client have agreed that you will review log files to see if you can find anything suspicious.
First, complete the following steps to acquire and analyze the log files and document your process (assume there is a chance your work could end up being used as evidence in a court of law):
- Identify a Windows or Mac computer where you have administrative privileges (this computer will serve as your clients computer for this assignment).
- Identify at least 6 different log files you acquired from both the computer and other related networking devices such as routers, switches, firewalls, IDS, and servers.
- Make copies of the log files.
- Decide if you will analyze the original log files or the copies and document the reasons for your choice.
- Identify 2 different free software tools to help manage or acquire log files and download them.
- Utilize the software to acquire at least 6 log files and analyze the log files to ascertain the security posture of the computer and related hardware.
- Document the chain of custody of the log files and if the log files meet the standards of evidence.
- Take notes on any additional conclusions you can draw from your analysis of the log files.
Second, convert all of your documentation into a 1- to 2-page report on the security posture of the computer based on the analysis of the log files that also does the following:
- Discusses the challenges that forensic investigators face when acquiring and analyzing log files (for example, consider ways the log files could become inadmissible in court).
- Examines the software you used, if they were successful and helpful in acquiring and analyzing log files, and if you would recommend them to other forensic investigators.
Cite any references to support your assignment.
Format your assignment according to APA guidelines.
Submit your report.
Requirements: 1-2 pages

Leave a Reply
You must be logged in to post a comment.