LAB3_Digital Forensics Technology and Practices_WORKSHEET2

.docx

School

University of Maryland, University College *

*We aren’t endorsed by this school

Course

640

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

15

Uploaded by joespady4u25

Report
Name: XXXXX Semester: Summer Year: 2023 Section Number: 7621 Lab 3 Worksheet Digital Forensics Technology and Practices Table of Contents Introduction ............................................................................................................................................................... 2 Screenshot 1 – Yourname Displayed in the Server Manager Dashboard ................................................................... 3 Screenshot 2 – Yourname Displayed in the IIS Server Installation .............................................................................. 4 Screenshot 3 –YOURNAME FTP Site in Internet Information Services ....................................................................... 5 Screenshot 4 – YOURNAME echoed into the iisstart.htm file .................................................................................... 6 Screenshot 5 – Yourname Windows Website ............................................................................................................. 7 Screenshot 6 – FTP File within the C:\Inetpub\ftproot Directory ............................................................................... 8 Screenshot 7– Yourname FTPsite ............................................................................................................................... 9 Screenshot 8– Yourname Linux Website .................................................................................................................. 10 Screenshot 9 – Yourname Windows Website using 10.X.X.X IP ............................................................................... 11 Screenshot 10 –Use grep to find Yourname in the auth.log file ............................................................................... 12 Conclusion ............................................................................................................................................................... 13 APA References ........................................................................................................................................................ 14 1
Introduction Students: In the box below, please explain the purpose of using the Logs and Web Logs and explain how they are relevant to Digital Forensics Technology and Practices. Introduction Records of events that happen on a computer system or network are kept in logs and weblogs. They are frequently used for monitoring and troubleshooting, but they are also essential for digital forensics. To find proof of illegal conduct or to assist legal procedures, digital forensics examines digital devices and systems using scientific methodologies (The security advantages of audit logging, n.d.). Logs may be used in forensic investigations to reconstruct the timeline of events on a system. The reason for an occurrence, such as a data breach or illegal access to a system, may be ascertained using this. A log may, for instance, reveal that a person signed into a system at a certain moment, and that a file was removed a short while afterwards. With the use of this information, an incident chronology and prospective suspects may be created. Forensic investigations can make use of web logs, commonly referred to as access logs. These logs keep track of details about requests made to a web server, including the IP address of the client, the date and time of the request, and the resource requested (Konov, 2022). This data may be used to spot patterns of behavior, such as repeatedly trying to access the same site from the same IP address. This can be helpful in narrowing down the scope of an incident or identifying prospective culprits. Logs may be utilized in proactive monitoring systems to find and address possible events in addition to being used in forensic investigations. It's referred to as log management. When specified events occur, such as repeated failed login attempts or access to a critical resource, log management systems can be set up to notify administrators (Bloom, 2017). As a result, administrators can respond to possible events swiftly and lessen their effects. 2
3
Screenshot 1 – Yourname Displayed in the Server Manager Dashboard 1. When you look at the server manager dashboard, the computer name should be Your First Name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Take a screenshot of the Your Name as the Computer Name Displayed in the Server Manager Dashboard Image 1: my Name as the Computer Name Displayed in the Server Manager Dashboard 4
Screenshot 2 – Yourname Displayed in the IIS Server Installation 2. When you look at the server IIS Server Installation, the computer name should be Your First Name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Take a screenshot of the Your Name as the Computer Name Displayed in the IIS Server Installation Image 2: my name as the Computer Name Displayed in the IIS Server Installation 5
Screenshot 3 –YOURNAME FTP Site in Internet Information Services 3. The Name of the FTP Site created in Internet Information Services should match your first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit. Take a screenshot of Yourname FTP Site being created in Internet Information Services Image 3: my name FTP Site being created in Internet Information Services 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help