LAB3_Digital Forensics Technology and Practices_WORKSHEET2
.docx
keyboard_arrow_up
School
University of Maryland, University College *
*We aren’t endorsed by this school
Course
640
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
15
Uploaded by joespady4u25
Name: XXXXX
Semester: Summer
Year: 2023
Section Number: 7621
Lab 3 Worksheet Digital Forensics
Technology and Practices Table of Contents
Introduction
...............................................................................................................................................................
2
Screenshot 1 – Yourname Displayed in the Server Manager Dashboard
...................................................................
3
Screenshot 2 – Yourname Displayed in the IIS Server Installation
..............................................................................
4
Screenshot 3 –YOURNAME FTP Site in Internet Information Services
.......................................................................
5
Screenshot 4 – YOURNAME echoed into the iisstart.htm file
....................................................................................
6
Screenshot 5 – Yourname Windows Website
.............................................................................................................
7
Screenshot 6 – FTP File within the C:\Inetpub\ftproot Directory
...............................................................................
8
Screenshot 7– Yourname FTPsite
...............................................................................................................................
9
Screenshot 8– Yourname Linux Website
..................................................................................................................
10
Screenshot 9 – Yourname Windows Website using 10.X.X.X IP
...............................................................................
11
Screenshot 10 –Use grep to find Yourname in the auth.log file
...............................................................................
12
Conclusion
...............................................................................................................................................................
13
APA References
........................................................................................................................................................
14
1
Introduction
Students: In the box below, please explain the purpose of using the Logs and Web Logs and explain how they are relevant to Digital Forensics Technology and Practices.
Introduction
Records of events that happen on a computer system or network are kept in logs and weblogs. They are frequently used for monitoring and troubleshooting, but they are also essential for digital forensics. To find proof of illegal conduct or to assist legal procedures, digital forensics examines digital devices and systems using scientific methodologies (The security advantages of audit logging, n.d.). Logs may be used in forensic investigations to reconstruct the timeline of events on a system. The reason for an occurrence, such as a data breach or illegal access to a system, may be ascertained using this. A log may, for instance, reveal that a person signed into a system at a certain moment, and that a file was removed a short while afterwards. With the use of this information, an incident chronology and prospective suspects may be created.
Forensic investigations can make use of web logs, commonly referred to as access logs. These logs keep track of details about requests made to a web server, including the IP address of the client, the date and time
of the request, and the resource requested (Konov, 2022). This data may be used to spot patterns of behavior, such as repeatedly trying to access the same site from the same IP address. This can be helpful in narrowing down the scope of an incident or identifying prospective culprits.
Logs may be utilized in proactive monitoring systems to find and address possible events in addition to being used in forensic investigations. It's referred to as log management. When specified events occur, such as repeated failed login attempts or access to a critical resource, log management systems can be set up to notify administrators (Bloom, 2017). As a result, administrators can respond to possible events swiftly and lessen their effects.
2
3
Screenshot 1 – Yourname Displayed in the Server Manager Dashboard 1.
When you look at the server manager dashboard, the computer name should be Your First Name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of the Your Name as the Computer Name Displayed in the Server Manager Dashboard Image 1: my Name as the Computer Name Displayed in the Server Manager Dashboard 4
Screenshot 2 – Yourname Displayed in the IIS Server Installation 2.
When you look at the server IIS Server Installation, the computer name should be Your First Name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of the Your Name as the Computer Name Displayed in the IIS Server Installation Image 2: my name as the Computer Name Displayed in the IIS Server Installation 5
Screenshot 3 –YOURNAME FTP Site in Internet Information Services
3.
The Name of the FTP Site created in Internet Information Services should match your first name. The use of anyone else’s name may result in an academic integrity review by your professor. Please label your screenshot to receive full credit.
Take a screenshot of Yourname FTP Site being created in Internet Information Services
Image 3: my name FTP Site being created in Internet Information Services
6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help