14 Aug REPORT
9-1 Final Project One Submission: Report
To complete this assignment, review the prompt and grading rubric in the Final Project One Guidelines and Rubric document. Also review the information in the Final Project Forensic Notesdocument. When you have finished your work, submit the assignment here for grading and instructor feedback.
ISE 640 Final Project Forensic Notes
Use the information in this document to help you complete your final project.
Drew Patrick, a director-level employee, is stealing intellectual property from a manufacturing company. The company is heavily involved in high-end development of widgets. Drew has access to corporate secrets and files. He is planning on leaving the company, taking the intellectual property with him, and going to work for a competitor. There is suspicion of him doing this, so human resources (HR) notified the information technology (IT) department to monitor Drew’s past history. An internal investigation is launched due to Drew’s abnormal behavior. The IT department confirms that they have found large files and emails. Forensics identified unauthorized access, transmission, and storage of intellectual property by Drew. Evidence found will be used to support legal civil and criminal proceedings.
Scenario ACME Construction Company designs, manufactures, and sells large construction vehicles that can cost upwards of a million dollars. They spent hundreds of thousands of hours redesigning their premier excavator. Every piece that goes into the excavator is individually designed to maximize the longevity of the equipment. Known for attention to detail, high-quality work, and industry innovation, this painstaking work is what sets ACME Construction company apart and is attributed for the excellent reputation they enjoy. This, in turn, allows them to charge a premium on their exceptionally well-built products.
Drew Patrick is a senior manager directly involved with the overall development of ACME’s excavators. His role provides him with access to design documentation, schematics, support documents, and any other technical references maintained in the company’s research and development (R&D) database. The R&D database is maintained by ACME’s information technology (IT) department, which is supported by a security operations center (SOC). The SOC uses Snort as a core component of their security information and event management (SIEM) system to keep tabs on network traffic, authentication requests, file access, and log file analysis.
The SIEM alerted SOC personnel of potential peer-to-peer (P2P) traffic originating from the internet protocol (IP) address associated with Drew’s computer. However, analysis of Active Directory logs indicated that Drew was not logged into his account at the time the files were transferred via the P2P application. ACME enforces two-factor authentication and does not allow for computer sharing. The SOC personnel began an incident report based on the identification of P2P traffic, which violates company policy. As per company policy, the SOC personnel gave human resources (HR) and the legal team the incident report. The legal team asked for further investigation. Upon further inspection of the P2P activity, several file transfers were discovered. The files transferred match the names of files in the R&D database containing intellectual property developed by Drew’s development team. Additionally, the files were transferred to IP addresses that are not owned or controlled by ACME Corporation.
Analysis of the server access logs indicated that Drew had been logging into the R&D database for several weeks prior to the external file transfers taking place. Network logs from the Intrusion Prevention Systems (IPSs) indicated that the files of interest had been transferred to Drew’s desktop computer prior to the external transfer. ACME has a strict policy against maintaining intellectual property anywhere other than the designated servers. File access logs on the R&D servers confirmed that the account belonging to Drew had copied the files in question.
At this point, fearing a loss of intellectual property, in addition to numerous policy violations, ACME called in the digital forensic team to take over the investigation. The forensics team proceeded to capture the log files from relevant computer systems and created a forensically sound copy of the hard disk drive on Drew’s computer. The log files investigated included the corporate mail, domain name server (DNS), and dynamic host configuration protocol (DHCP) servers, as well as physical access logs. Additionally, packet capture logs from the firewalls and intrusion detection system (IDS) were gathered and analyzed. This detailed investigation revealed that file transfers of intellectual property were indeed done from Drew’s computer, however, Drew’s account was not logged in at the time of the transfer. The only account active on the suspect computer was an anonymous account that had been created on 9/17/2016 at 9:57 p.m.
The following notes were provided by the Forensic Team:
Forensic Team Investigation Notes Notes from the investigative team about the forensic findings of the hard drive image obtained from Drew Patrick’s hard drive:
Chain of custody document was begun with the sizing of the Western Digital Hard Drive 500 GB with serial number NB497356F from Drew Patrick’s computer. Hard drive was duplicated using forensic toolkit (FTK) software to preserve the original hard drive image. A hash was created for the original and the copied image to prove both images were the same. The operating system of the image was Windows-based. The operating system used a new technology file system (NTFS) file structure. The hard drive was analyzed using Autopsy and Windows Forensic Toolchest. The sort and index functions were used to isolate the files needed for further analysis. These files include types SQL, Excel, email, chat, and HTML. Slack space was also analyzed.
Files and Findings EMAIL (Microsoft Outlook): Numerous emails were found that contained references to proprietary information. Some emails were to non-ACME Corporation email accounts, and they promised information pertaining to equipment design. Follow-up emails were found that asked for assurance of a promised managerial position.
CHAT (AOL Instant Messenger): Several chat conversations were recovered containing information about possession of proprietary documents.
SQL (Microsoft Database): SQL database files revealed proprietary information and connection logs to a remote SQL server. Two additional SQL database files were encrypted and were not successfully unencrypted.
EXCEL (Microsoft Excel): Numerous Excel files were located on the hard drive. These files contained parts list and parts specifications concerning proprietary construction equipment. These files had csv and xls extensions.
HTML: Recovered internet web browser cache revealed that the dark web was searched for proprietary information brokers. An email address was created to correspond in the dark web for buyer transactions called [email protected] Internet cache also revealed that YouTube was searched for the subjects “selling intellectual property” and “selling on the dark web.” Recovered internet browser history revealed pictures and illustrations on encrypting SQL database files. Internet browser history also revealed searches concerning how to exploit the vulnerabilities of an SQL database.
SLACK SPACE (hidden data and temporary files): Hidden information in the slack space was revealed to contain temporary internet files on searches for “advertising stolen data” and “hacking sql servers.” These files, once revealed, were in plain text and read using Notepad.
ISE 640 Final Project One Guidelines and Rubric
Overview As a cybersecurity practitioner, understanding the practice and application of digital forensics principles are necessary skills in all aspects of incident response. You will need these skills to effectively manage and resolve incidents that involve aspects of cybercrime, regulatory compliance, and legal concerns that arise in your organization. Additionally, you will often need to act as a domain expert communicating to a non-expert (as in a lawyer, executive, etc.)
In this course, you will perform basic forensic tasks in order to “walk a mile in the shoes” of a forensic practitioner. You will use the knowledge you gain in the practice activities to address a scenario. Your tasks will be to develop a technical investigative report and a non-technical memorandum (Final Project Part 2) that will assist your executive stakeholders and organizational attorneys in managing and addressing the aftermath of a particular incident.
You will complete a milestone for Final Project One in Module Seven, which is a draft of the Final Project One: Report. Ensure you review the feedback received on this milestone when your instructor returns it to you. Final Project One will be submitted in Module Nine.
In this assignment, you will demonstrate your mastery of the following course outcomes:
ISE-640-01: Apply chain of custody processes and procedures used by practitioners for maintaining evidentiary integrity [MS.CSE.CORE.04] ISE-640-02: Employ digital forensic tools and investigative practices to augment and enhance organizational incident response capabilities [MS.CSE.CORE.04]
Prompt Write a clear analysis report of a specific security incident based on a provided scenario and template and exemplar based on experiences in lab(s).
Scenario: A management, director-level employee appears to have stolen intellectual property from a manufacturing company. The company is heavily involved in high-end development of widgets. This employee has access to corporate secrets and files. The employee is planning on leaving the company, taking the intellectual property with them, and going to work for a competitor. Due to some suspicions on the part of several managers, human resources (HR) notified the information technology (IT) department to monitor the employee’s past history. An internal investigation is launched due to the employee’s abnormal behavior. The IT department confirms that they have found large files and emails. Forensics identified unauthorized access, transmission, and storage of intellectual property by the employee. Evidence found will be used to support legal civil and criminal proceedings. Read the Final Project Forensic Notes document for all the necessary details.
Specifically, you must address the critical elements listed below. Most of the critical elements align with a particular course outcome (shown in brackets).
I. Executive Summary: Set the stage for your report, providing a brief overview of the situation and the stakeholders who are involved.
II. Legal Concerns: Describe the problem(s) and objectives you are working with the company’s attorneys to solve. [ISE-640-01]
III. Relevant Procedures: In this section, you will outline the steps that (hypothetically) you will have to take prior to or as you investigate in order to maintain evidentiary integrity. Use your experiences from other situations you engaging in within the lab environment to inform your responses. A. Processes and Procedures: Describe processes or procedures necessary for handing a criminal situation by internal employee. [ISE-640-01] B. Chain of Custody: Explain how to maintain the chain of custody as you investigate the various aspects of the incident. Support your response with specific examples. [ISE-640-01]
IV. Details of Investigation: Based on your experiences in the labs, there will be specific resources, methods, and tools necessary to support the investigation in the scenario. A. Resources Needs: Explain what resources (team knowledge, skills, and abilities) are necessary for gathering the evidence for this forensic investigation. Provide examples based on your experiences from the labs. [ISE-640-02] B. Methods: Describe the specific forensic method or approach you used to effectively leverage your available resources. [ISE-640-02] C. Findings: Describe the specific findings and the forensic tactics and technologies you employed to reach them. [ISE-640-02]
Milestones
Milestone One: Report Draft In Module Seven, you will submit a complete draft of this report. This milestone will be graded with the Milestone One Rubric.
Final Project One Rubric Guidelines for Submission: Your investigative forensic report must be 4–5 pages in length (excluding cover page and references) and must be written in APA format. Use double-spacing, 12-point Times New Roman font, and one-inch margins. Include at least 3 references cited in APA format.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Wridemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Place Order” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.