Expert answer:Forensic Challenge

Solved by verified expert:I have two separate Forensics challenge attached. Please separate the answers. If you have any questions let me know ASAP please
part_1.docx

Unformatted Attachment Preview

Part 1
Forensic Challenge – Who done it?
Recently, there has been a merger between Bob’s Widgets and Sam’s Widgets resulting in a new
company being formed named New Widgets. During the transition process, several large database
applications have been retired and are no longer in use. Since this merger, the Network Operations
Center has noticed that between midnight and 6am every night there is higher than normal traffic level
on the Sam’s Widgets servers located offshore in Ireland data centers since the merger.
The Network Administrator, Steve Wolcomb, has been with Bob’s Widgets since its inception and has
always provided great service to his internal customers. He rarely takes a vacation and is always
available to help out, especially when there is been suspected data breaches in the past.
Steve, is a good employee, but sometimes head strong and unyielding when it comes to the services and
applications that he supports and users sometimes frustrate him with their requests.
Steve has never been onboard with the merger with Bob’s Widgets, as the were the main competition
from day one and lately he seems disconnected from his work and appears to be using headphones and
hiding his screen should anyone pass his cubicle.
As a forensic investigator, you have been called in by the finance manager to determine what is going on
with the late night network spikes as the only one that manages the network is Steve. The sharp
increase in bandwidth costs has brought this concern to the finance manager’s attention.
1. What approach should you take to investigate?
2. List any tools that you would use.
3. Understanding the structure of the stretched IT admin team, what considerations and/or
precautions should you be aware of?
4. Layout a plan that allow you to investigate without Steve’s knowledge and who else would you
require to support you in this process.
5. Which, if any international laws would apply to accessing these servers?
6. What do you think is going on here?
Part 2
Forensic Challenge
Mr. Smith thinks his wife is having an affair. He thinks she may be communicating with someone else by
email via a secret account. Mr. Smith called you to see if there’s anything you can do on his PC to see if
you can find any evidence of an affair. You scan the PC using OSForensics and find the attached file
called Personal Folders(1).pst.
Using the Email Viewer in OSForensics, provide the following to determine if Mr. Smith’s assessment is
accurate:

Email accounts used in the conversation

Names of both parties

Date and Time of meeting

Details of attachments if any
Personal Folders_1_.pst

Purchase answer to see full
attachment

How it works

  1. Paste your instructions in the instructions box. You can also attach an instructions file
  2. Select the writer category, deadline, education level and review the instructions 
  3. Make a payment for the order to be assignment to a writer
  4.  Download the paper after the writer uploads it 

Will the writer plagiarize my essay?

You will get a plagiarism-free paper and you can get an originality report upon request.

Is this service safe?

All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 20% with the discount code ESSAYHELP