NETWORK SECURITYa
NETWORK SECURITYa
1
b) As a computing investigator, you receive a call from your boss asking you to fulfill the
discovery demands from Company B’s lawyers to locate and determine whether the e-mail
messageon Mr. Jones’s computer is real or fake. Because it’s an e-mail investigation, not a major
crime involving computers, you’re dispatched to Company A. When you get there, you find
Mr. Jones’s computer powered on and running Microsoft Outlook. The discovery order
authorizes you to recover only Mr. Jones’s Outlook e-mail folder, the .pst file. You aren’t
authorized to do anything else. What steps would you follow in completing this task?
6 Marks
c) (i) What does Mobile Forensics involve? 2 Marks
(ii) What are the Mobile Forensics challenges? 4 Marks
d) Outline any five precautions to be taken before investigating a mobile device.
5 Marks
a) You visited Keith’s desk and removed the hard disk carefully from his Dell Dimension
372 office computer. You placed the hard disk carefully in an anti-static bag and transported it to
the forensics laboratory. What are the first two things you will do in the forensics laboratory?
4 Marks
b) You load the bit-stream image in the FTK toolkit and searched for the Maya 3D graphic
design files. FTK search shows you no results. You search for deleted data, deleted partitions and
slack space. FTK again shows no results. The other files are intact without any corruption except
the missing Maya 3D files. FTK shows that there are 11,200 files present in the hard disk. How
do you proceed from here? 4 Marks
c) In your search you find out that there is a file that is used to permanently wipe data from
the computer. Proceed from here and create evidence that would convict Keith. 12 Marks
2
QUESTION FOUR [20 MARKS]
a) Outline the procedure for documenting the crime scene and preserving evidence.
6 Marks
b) Describe the methods you would use to identify a mobile device. 6 Marks
c) How do you acquire data from an unobstructed mobile device? 3 Marks
d) How do you acquire data from obstructed mobile devices? 5 Marks.