Question

In: Computer Science

Use these textbooks to answer the questions; Chapter 5 in Windows Forensic Analysis DVD Toolkit 2nd...

Use these textbooks to answer the questions;

Chapter 5 in Windows Forensic Analysis DVD Toolkit

2nd Edition Chapter 5 in Mastering Python Forensics.

Note: Use both textbooks above and collected reliable online resources for your answers (you may utilize the tools mentioned in the textbook or other alternative tools on the internet). All external resources must be listed as references at the end of this document.

1. Briefly describe what and how events are logged in the OS you are using.

2. How do you configure auditing policy? Is auditing policy important in forensics? Why?

Solutions

Expert Solution

1. Briefly describe what and how events are logged in the OS you are using.

Answer: Logs are records of events that happen in your computer, either by a person or by a running process. They help you track what happened and troubleshoot problems. The Windows event log contains logs from the operating system and applications such as SQL Server or Internet Information Services (IIS). The logs use a structured data format, making them easy to search and analyze. Some applications also write to log files in text format. For example, IIS Access Logs. Windows Event Viewer displays the Windows event logs. This application to view and navigate the logs, search and filter particular types of logs, export logs for analysis, etc.

2. How do you configure auditing policy? Is auditing policy important in forensics? Why?

Answer: Configuring auditing policy:

  • From the Domain Controller, click Start, point to Administrative Tools, and then Group Policy Management.
  • From the console tree, click the name of your forest > Domains > your domain, then right-click on the relevant Default Domain or Domain Controllers Policy (or create your own policy), and then click Edit.
  • Under Computer Configuration, click Policies > Windows Settings > Security Settings > Advanced Audit Policy Configuration > Audit Policy, then double-click on the relevant policy setting.
  • In the right pane, right-click on the relevant Subcategory, and then click Properties.
  • Select Success, Failure, or both from the audit events checkbox and then click OK.

Auditing policy is important in forensics, A forensic audit is an examination and evaluation of a firm's or individual's financial records to derive evidence that can be used in a legal proceeding. A forensic audit may be conducted to prosecute a party for fraud, embezzlement, or another criminal behavior. A forensic audit/examination is designed to focus on reconstructing past financial transactions for a specific purpose, such as concerns of fraud, whereas an internal audit is typically focused more on compliance and/or the performance of the organization.


Related Solutions

Use these textbooks to answer the questions; Chapter 5 in Windows Forensic Analysis DVD Toolkit. 2nd...
Use these textbooks to answer the questions; Chapter 5 in Windows Forensic Analysis DVD Toolkit. 2nd Edition Chapter 5 in Mastering Python Forensics. Note: Use both textbooks above and collected reliable online resources for your answers (you may utilize the tools mentioned in the textbook or other alternative tools on the internet). All external resources must be listed as references at the end of this document. 1. What is the best way to uncover attempts to compromise an IIS webserver?...
In Chapter 4 in Windows Forensic Analysis DVD Toolkit, 2nd Edition Download the RegRipper suite of...
In Chapter 4 in Windows Forensic Analysis DVD Toolkit, 2nd Edition Download the RegRipper suite of tools at: (50 points) https://github.com/keydet89/RegRipper2.8 Or https://code.google.com/archive/p/regripper/downloads (you may also download the sample hives “samples.zip” for this practice), and download the RegRipper supplemental plugins at: https://storage.googleapis.com/google-code-archivedownloads/v2/code.google.com/regripper/plugins20130429.zip. Find related documents on the installation and user guidance; make the practice by selecting at least eight examples of Registry analysis from page 181 to the end of chapter 4. You may utilize the sample hive files at...
REFLECTION QUESTIONS FOR CHAPTER # 5 --- INTELLECTUAL PROPERTY Read the article below and answer the...
REFLECTION QUESTIONS FOR CHAPTER # 5 --- INTELLECTUAL PROPERTY Read the article below and answer the following three reflection questions. The answers are to be submitted for grading. Reflection Question#1 – What is Christina Aguilera and the other musicians asking the U.S. government to do and explain why? Reflection Question #2 – Describe your opinion on this issue and mention if you agree or disagree with the musicians as to what they are asking? Reflection Question #3 – Give your...
Use the graph in Chapter 24- 3 (page 553 in text) to answer the questions that...
Use the graph in Chapter 24- 3 (page 553 in text) to answer the questions that follow. a. What is the monopolist’s profit-maximizing output? b. At the profit-maximizing output rate, what are average total cost and average revenue? c. At the profit-maximizing output rate, what are the monopolist’s total cost and total revenue? d. What is the maximum profit? e. Suppose that the marginal cost and average total cost curves in the diagram also illustrate the horizontal summation of the...
Use SPSS to conduct the necessary analysis to answer each of the questions based on the...
Use SPSS to conduct the necessary analysis to answer each of the questions based on the following scenario. If a statistical test is used, you should use .05 as the critical level of significance. You are a Nursing instructor at your institution. You teach Intro to Nursing. You want to know how your students’ final averages compare to institutional average for Intro to Nursing, which is 80. The final averages for your students are listed below. 90, 80, 77, 55,...
Use this case study to answer the questions below. CASE CHAPTER 1: INTRODUCTION TO RESEARCH THE...
Use this case study to answer the questions below. CASE CHAPTER 1: INTRODUCTION TO RESEARCH THE LAROCHE CANDY COMPANY In 1864 Henricus Laroche started making high-quality chocolate in his kitchen in Ooigem, Belgium. Henricus learned his trade at a famous chocolate shop in Paris, and he and his wife began to make chocolate in bars, wafers and other shapes soon after Henricus had returned to Belgium to start his own business. The Belgian people loved Laroche’s chocolate and the immediate...
Use these terms to answer these questions (can use more than once) Break-even analysis, Benefi-Cost analysis,...
Use these terms to answer these questions (can use more than once) Break-even analysis, Benefi-Cost analysis, Cost Effectiveness analysis If your boss wants to know how many cases of obesity need to be eliminated in a year to offset the cost of your weight management program, you should use: If you want to show your boss that a program with health coaches is worth the high cost since it will ultimately result in larger positive health outcomes and reduced health...
Scenario (use to answer questions 5-6) You are appointed the Chairperson of the FOMC. Use the...
Scenario (use to answer questions 5-6) You are appointed the Chairperson of the FOMC. Use the link below to run a monetary simulation. You are required to hit the inflation target. In order to receive credit, you have to reappointed by hitting both your inflation and unemployment targets. You can run the simulation as many times as necessary. When you are successful enter in the ending inflation and unemployment rates. http://www.frbsf.org/education/activities/chairman/ What is your ending inflation rate? A. Above 6.0%...
Use critical thinking and apply the information you learned in chapter 16. Answer all the questions...
Use critical thinking and apply the information you learned in chapter 16. Answer all the questions completely. Write a well written paragraph to answer each question. Your instructor is looking for 3-4 key points in your responses that relate to this week’s readings. Reference your information using the APA citation format. You will not be able to see what other learners have posted until you post your initial response. Participation in weekly discussion is worth a significant part of your...
Use the following scenario analysis for stocks X and Y to answer the questions. Bear Normal...
Use the following scenario analysis for stocks X and Y to answer the questions. Bear Normal Bull Market Market Market Probability 20.00% 45.00% 35.00% Stock X -13.00% 11.00% 28.00% Stock Y -26.00% 16.00% 46.00% Assume you have a $200,000 portfolio and you invest $75,000 in stock X and the remainder in stock Y. What is the expected return for this portfolio?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT