In this section I include an incident response and computer network forensic exercise walk-through. This assignment involved the case of spear-phishing and suspicion of an individual leaking confidential data. Numerous tools were used to investigate a forensic computer image and create this report. The process of computer forensics requires expertise, patience, and the ability to clearly describe technically complex interactions in a methodic and understandable way to non-technical individuals. This is a difficult task for most technically savvy persons, however, practice makes progress, and this was an excellent way to practice forensic analysis and incident response in a realistic scenario.
References
- Infosec Institute. (2016, October 04). Forensics Investigation of Document Exfiltration involving Spear Phishing: The M57 Jean Case. Retrieved December 7, 2018, from https://resources.infosecinstitute.com/forensics-investigation-document-exfiltration-involving-spear-phishing-m57-jean-case/ Courtesy of Dr. Simson Garfinkel
- Mediatemplate.net. (n.d.). Understanding an email header. Retrieved December 10, 2018, from https://mediatemple.net/community/products/dv/204643950/understanding-an-email-header
- Microsoft Support. (n.d.). Find and transfer Outlook data files from one computer to another. Retrieved December 10, 2018, from https://support.office.com/en-us/article/find-and-transfer-outlook-data-files-from-one-computer-to-another-0996ece3-57c6-49bc-977b-0d1892e2aacc
- Repa, B. K. (2012, March 28). Employer Searches and Seizures: What Are Your Rights? Retrieved December 7, 2018, from https://www.nolo.com/legal-encyclopedia/free-books/employee-rights-book/chapter5-5.html