Dr. Bill Pugh IS 3513 Information Assurance & Security Lab Assignment Instruction Set Image retrieved from: medium.com Lab created by

Dr. Bill Pugh
IS 3513 Information Assurance & Security
Lab Assignment Instruction Set
Image retrieved from: medium.com
Lab created by Naveen Bommu, Graduate Student, UTSA MSIT

OVERVIEW

This lab exercise will introduce you to digital forensics and how it helped solve the infamous

“BTK Case.” There are many digital forensics tools, but in this exercise, you will be using

Autopsy to investigate a “floppy image file” collected from the perpetrator known as “BTK.”

American serial killer Dennis Rader, known as the BTK killer, murdered 10 people, including two

children, over a 17-year period. The BTK killer was active from 1974 to 2005. In 2005, BTK

provided the police a floppy disk with a “test” note, and from there the police later discovered

hidden metadata revealing the eventual identity of the “BTK” killer. This lab is a walkthrough of

the steps law enforcement used to capture this notorious serial killer.

More info:

OBJECTIVE

Given the following instructions, complete the deliverables and submit your results for credit.

RESOURCES

• Computer, or laptop computer meeting College of Business, Information Systems & Cyber

Security Majors specifications:

• Autopsy Software (Available for Windows, OS X)

• Internet access for uploading assignment to Blackboard

EVALUATION

Your grade will be based on meeting the following criteria within the scheduled deadline:

• Downloading and installing the Autopsy software with screenshots (10%)

• Answering ALL the questions contained in the “Instructions” AND provide screenshots

showing your work (30%)

• Provide feedback on the lab exercise with a minimum of a 500-word, single spaced, 12 pt.

font report on your experience, highlights, and suggested improvements for the lab (60%)

INSTRUCTIONS

• Download the latest Autopsy Software version (Available for Windows, OS X) from the

website: download/

• Download the image file named “btkcase.ima”.

• Once you have downloaded the files, follow the instructions below:

download/

Autopsy download page.

Click “Download” (Current version is now 4.20.0)

Select “Next”

Select “Next” then select “Install.”

Select “Finish.”

Now open the autopsy software and select “New Case.”

Provide the case name of your choice and the directory you want. Click “Next.”

You can ignore the below information and select “Finish.”

Select “Next” here.

Select “Disk Image or VM File” to input the image file, then select “Next.”

Select “Browse,” then in the “Files of type:” field, select “All Files” then click “Next.”

Keep the selected “ingest modules” and select “Next,” then “Finish.”

At the home page of Autopsy, you can see the image file is successfully loaded. Now, expand

the “Deleted Files” section, then click on “File System,” then click on the “Agenda Church

Council Meeting.docx” file.

Then below, select “Data Artifacts.”

QUESTION 1: Whose name appears next to “Owner?”

Next, expand “Data Sources,” then “btkcase.ima_1 Host,” then btkcase.ima,” then

“$CarvedFiles,” then click on “f0000000.docx.” Click on the right-side frame, click on

“image1.png.”

QUESTION 2: What does the image show?

Next, as you are discovering important clues from this floppy disk, you quickly go to the

internet and search for the organization shown in the picture . . .

But . . . it isn’t 2005 so you now must go “back in time” to the web page as it was in February of

2005 here:

QUESTION 3: Do you see anyone on the page with the first name found above in “Data

Artifacts” and “Owner?” What is his name?

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Assignment Deliverables As the new Chief Information Security Officer for

Assignment Deliverables As the new Chief Information Security Officer for CB Drifter Technologies, you have been asked by the CEO and CTO to start a discussion with the senior staff on the following: 1) What are the 5 new elements of the Information Security Governance framework. Describe each in 2-3

Using the gender critical reading strategy, We will be able to see how

Using the gender critical reading strategy, We will be able to see how in Flannery O’Connor’s “Good Country People” and Susan Minot’s “lust”, both stories show that women try to find something in men to fulfill something in themselves. Using the gender critical reading strategy, We will be able to

31, Food Safety Management, Summative Assessment

Considering the practical activity that you organised and implemented last year for the Food and Beverage Operations Management unit, create the following documentation: 1. Individual reflective report in which to evaluate the importance of personal hygiene in the control of food contamination (AC 3.3) 2. Risk assessment related to food

WU Parkinsons Disease Case study Nursing Assignment Help

Scenario:  A 67-year-old man presents to the HCP with chief complaint of tremors in his arms. He also has noticed some tremors in his leg as well. The patient is accompanied by his son, who says that his father has become “stiff” and it takes him much longer to perform

CASE STUDY: Caregiver Role Strain: Ms. Sandra A. Nursing Assignment Help

Expert Solution Preview Introduction: As a medical professor responsible for creating assignments and providing feedback to college students, I have the expertise and experience to address the content provided. My role involves designing lectures, evaluating student performance through examinations and assignments, and providing constructive feedback to enhance their learning experience.

IIT Health Bureaucracy Questions Nursing Assignment Help

For this assignment, you will prepare an infographic that describes the components of “Health Bureaucracy.” You will be able to choose whichever tool you choose to build your infographic.  Please follow the instructions below and be sure to follow APA formatting guidelines.  Instructions: In Module 1, we learned the definition

For this discussion, you will review your chosen quality improvement

   For this discussion, you will review your chosen quality improvement initiative for the course project. Even though you will not be implementing the initiative, consider how you would measure the effectiveness of it and the process and outcomes you would utilize to do that. By applying the concepts of

-Explore your reactions to use of the repetitive transcranial magnetic

-Explore your reactions to use of the repetitive transcranial magnetic stimulation and deep brain stimulation modalities, discussed in this unit. Are you in favor of or opposed to these modalities? Provide a rationale.  – This modalities have been used to treat some psychiatric diseases with great results, put examples of patients

Write a 3 page research paper describing critical information and

Write a 3 page research paper describing critical information and data security concerns that plague mobile apps.  Describe the problems and a  possible course of action to eliminate or mitigate the security  concerns.  Provide four references. APA format.  Use peer  reviewed and academic sources and properly cite these in your

Please submit an outline of your business report. The outline

  Please submit an outline of your business report. The outline should include a short summary for the following sections: Introduction and Objective, Methodology, Analysis, Conclusion & Recommendations, References (listed in APA format) and Appendix (if applicable).  Introduction and Objective Introduce the opportunity or problem for the company or organization State

Students will submit a written report of their data collection

 Students will submit a written report of their data collection findings and discuss the analysis of data. This should include a synopsis of the results, analysis methods used and a discussion of these findings. This assignment requires that you summarize how you will collect the data you will use for your research

First, read the report completed by the Blue Ribbon Task

First, read the report completed by the Blue Ribbon Task Force of Akron, Ohio: Final Report and Recommendations https://www.akronohio.gov/cms/BlueRibbonReport/brtf___final_report_and_recommendations.pdf Then, in your initial post, address the following: Classify whether each finding is related to a strength, weakness, opportunity and/or threat. Also, offer an explanation as to why you came to

Project Management . Explain why Project Management in healthcare is

Project Management  .   Explain why Project Management in healthcare is so important. .   Provide an example where Project Management would be useful. .   In addition, for the above example, describe the Project Management process, each of the components, as well as each of the roles and responsibilities of all of

SWOT Analysis Determining when to develop a system in-house or

   SWOT Analysis Determining when to develop a system in-house or to purchase a COTS system is not always clear. A SWOT (strengths, weaknesses, opportunities, and threats) analysis brings the strengths and opportunities to a focus point and highlights the threats and weaknesses so an informed decision can be made.

On page 197 in the course text, a scholar made

 On page 197 in the course text, a scholar made note that if he were innocent he would prefer being tried in a civil law court whereas if he were guilty he would prefer common law practices. Would you agree with the scholar’s observations? Why or why not? What basis

nine

Instructions You have been appointed as lead project manager for the implementation of a new EHR system in a large multi- campus hospital system. The CEO and Board of Directors have asked you to provide information regarding the methods by which you will ensure successful adoption of the new information