Tool Kit For Kericu Case Analysis

 Tool Kit For Kericu Case Analysis

Toolkit for receiving and analyzing the Kericu Evidence

The investigation process begins with evidence extraction. This is done through imaging of the CEO’s laptop hard disk and from the USB. Extracted evidence is then interpreted to figure out what happened, when, how and what happened. Evidence interpretation includes the identification of concerns of violations and the proof protected. The evidence will then be documented, and the investigator provides expert witness testimony at deposition (Global digital forensic, 2012).


 

Serial number Name of tool Purpose

 

Assuria Auditor Assuria Auditor This tool provides deep configuration and scanning for vulnerability, inventory reporting, assessment for compliance and change detection through extensible and flexible architecture.

$1·     Tool protects and information assurance for critical business server. With Assuria Auditor, wide-ranging integrated Knowledge Base of known safety susceptibilities, security management arrangement, equipped patch checks and security best practice information enables organizations to bring their IT infrastructures to high security standards.

$1·     Used on Windows, Unix and Mac platforms

TC console TC console $1·   A web based user interface that improves a user’s visibility of malicious activity on organizational network.

$1·   Tool provides historical summary of malicious activity. In the case of Kericu, this tool is relevant since the CEO’s hard drive lacks evidence for earning excel. The quantitative summary of data traffic on a network is also provided, and this will trace the basis of the earnings excels in sent to other employees.

Encase Encase This is a commercial tool for evidence gathering and analysis. In the case of Kericu, Encase would provide an indispensable tool for information gathering from the hard disk and the USB. This tool would perform all evidence collection and analysis steps from imaging to investigation and final report preparation. This tool is mostly used on Windows platforms.

 


Reference

Global digital forensic, (2012). The computer forensic examination process. Retrieved from http://www.newyorkcomputerforensics.com/learn/forensics_process.php





Is this your assignment or some part of it?

We can do it for you! Click to Order!



Order Now


Translate »

You cannot copy content of this page