AICT006-4-1-AFM Advanced Forensics Methods Assignment, APU, Malaysia
University | Asia Pacific University (APU) |
Subject | AICT006-4-1-AFM - Advanced Forensics Methods |
Malware Infection Scenario:
In this assignment, you are required to conduct a root cause analysis based on the Malware infection scenario and prepare a research work for different steps under cyber forensic investigation subject for data collection, analysis, and documentation of findings. You are strongly encouraged to design the standard procedure for data acquisition and analysis along with the use of proper tool for the given assumptions.
Are You Searching Answer of this Question? Request Malaysian Writers to Write a plagiarism Free Copy for You.
Deliverables for Task 1:
You work as incident handler under the incident response team in Exabytes Sdn.Bhd. Recently you have been receiving tons of reports on network components such as host machines malfunctioning. The report highlighted a number of apprehensive characteristics and behaviours such as auto-run tasks, restarting frequently, unknown files found on computers, issues for running multiple processes simultaneously and etc. They send a request to the incident response team to investigate and find the root of the problem. A while later your team decided to conduct a root caused analysis to find what is the origin of the issue and generate a report on the discussed matter. A very initial step is to identify evidence for malware infection and analyse gathered evidence to report on the findings of the incident.
Get Solution of this Assessment. Hire Experts to solve this assignment for you Before Deadline.
Given that, you require to discuss the following questions:
- first responder, discuss in detail the procedures and steps taken when handling the incident. Your discussion should also include the different groups of first responders and the first response rule should a first responder observe. Your answer should relate to the case study.
- Discuss in detail the plan or strategy to conduct data acquisition based on the incident reported by Exabytes Sdn. Bhd. and provide examples of any relevant tools or techniques or applications that can be used.
- Assume that you have acquired the HDD image file and memory dump of the infected machine. Discuss what are the tools that can be used to analyse these files and explain the available commands use to:
- Extract the list of processes that are running on the victim machine.
- Identify any hidden or infected processes if any.
- Identify the list of handles that belong to suspicious processes.
Extract any command that an attacker might have typed/entered or executed in the system.
One of the suspicious processes is identified as “secret.paint”. Explain in detail how to extract this file and how to open the file (give example of application that can be used to view the file).
Hint: Explain what tool to create the report (e.g. FTKImager, Encase and etc.), and methods/tools (e.g. Forensic Image file creation tool under Data collection and etc.).
Please include screenshots of commands suggested in each question. You can use any RAM image file or HDD image file (from lab session).
Stuck in Completing this Assignment and feeling stressed ? Take our Private Writing Services.
Get Help By Expert
Are you finding it tough to complete your AICT006-4-1-AFM Advanced Forensics Methods assignment? Look no further! Our assignment helper Malaysia service is designed to assist you. If you wish to pay someone to do my assignments, our skilled professionals are eager to help. Plus, we provide a solid homework writing helper online to guide you through your coursework. Get in touch with us today for the assistance you deserve!
Recent Solved Questions
- PGBM150: Innovation Entrepreneurship & Technology Transfer Assignment, UOS, Malaysia Students are required to submit their assignments through JIRA and Only assessments submitted through JIRA will be marked .
- CT108-3-1 Python Programming (PYP) Assignment, APU, Malaysia Groceries Management System (GMS) Due to busy schedule, most of us prefer online shopping even to buy groceries and household items
- Banking Assignment, APU, Malaysia As a member of the AML, CDD checks need to be performed for the potential client, GMT due to the nature of the business
- Corporate Finance Assignment, UM, Malaysia Choose ONE non-financial company listed in the Bursa Malaysia. Find the latest financial statement for the company
- Marketing Analysis Case Study, TU, Malaysia At its founding in 1906, Planters Peanut Company sold one nut type. Historically, peanuts were viewed as food
- TME303: Figure 1(a) and (b) shows a robotic arm used in automotive industry for painting and welding application: Automation And Robotics Assignment, WOU, Malaysia
- HMEF5103 Qualitative Research Methodology Assignment, OUM, Malaysia It is undisputed that quality teachers play an important role in student achievement. Many high-performing school
- BBCE1023: Principles Of Macroeconomics Assignment, (TAR UMT), Malaysia
- Service Marketing Assignment, SU, Malaysia To become more aware of critical aspects of the service encounter from a customer’s perspective
- DPB20043: Management Information System Case Study, PM, Malaysia Choose a company that protects its products using any one of the types of intellectual property as the above diagram