![]() Investigation of the drive to obtain evidenceĢ.0 Comparing the tools for forensic investigationįor investigation we will be using following Using write blocker to preserve the integrity of the data while we search for evidenceĥ. Creating a copy of evidence and preserving original image of the drive at secured facilityĤ. Standard forensic methodology was followed in order to obtain and analyse the evidence, which include following.ģ. Our task is to reconstruct the key events of the bomb threat and those involved. This has been apparently undertaken through Robert Bonner’s email account from his desktop computer located at his residence on. The main objective of the offender seems to be an attempt to use email to send a bomb threat to interfere with National exposition. Company is also keen on trying Windows Registry Analysis tools like FRED and RegRipper. We will be using a case from 2019, which involves three suspects and a bomb threat sent to the employer. Goal is to find the most appropriate forensic tool considering budget restraints set by the requestor. ![]() Main objective of this report is to demonstrate the appropriate and effective use of forensic tools, including ProDiscover and Autopsy.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |