Professional Documents
Culture Documents
MICROPROJECT REPORT
On
Prescribed by
Submitted by:
SANDIP MANDAL
Guided by:
Prof. D. Roy
(Lecturer)
CERTIFICATE
SUBMITTED BY:
SANDIP MANDL
ABSTRACT
Case study
A new start-up SME (small-medium enterprise) based in Luton with an E-
government model has recently begun to notice anomalies in its
accounting and product records. It has undertaken an initial check of
system log files, and there are a number of suspicious entries and IP
addresses with a large amount of data being sent outside the company
firewall. They have also recently received a number of customer
complaints saying that there is often a strange message displayed during
order processing, and they are often re-directed to a payment page that
does not look legitimate.
The company uses Windows Server NT for its servers. Patches are applied
by the IT support team on a monthly basis, but the team has noticed that a
number of machines do not seem to have been patched.
3 Famous Cases Solved Through Digital Forensics
Here are a few famous cases where digital forensics played a crucial
role:
You can’t talk about criminal cases and digital forensics without
mentioning the infamous BTK killer case. What remained to be a mystery
for more than 30 years was finally solved via digital forensics in the early
2000s.
The “BTK Killer,” aka Dennis Rader, tortured and killed at least ten
people while he was still at loose and undiscovered. He’d taunt the police
forces by sending them cryptic messages during his killing sprees,
baffling them even more.
However, it was this very habit that finally led to his arrest. In 2005,
Rader sent the police a Microsoft Word document on a floppy disk.
Digital forensics experts were able to trace the metadata contained
within the disk, helping unveil the BTK Killer’s true identity. Rader was
finally arrested and imprisoned shortly after this.
2. The Craigslist Killer
When you think of Craigslist, you typically think of buying and selling
products online. Over a decade ago, however, the website name was
associated with a murder case that was eventually solved through digital
forensics.
In April 2009, Boston was shaken by the murder of a young woman in her
hotel room. There was also a reported case of assault on another woman
who was robbed at gunpoint. What did the two victims have in common?
They had both advertised their services on Craigslist and had an
appointment with a man named “Andy” on the night of the crime scene.
When investigators traced the emails exchanged between the victims and
“The Craigslist Killer,” the IP addresses led them to an unlikely suspect:
23-year old Philip Markoff, a medical student. This was a massive victory
for digital forensics, and it showcased how the technology can be used in
crime cases.
3. Larry J. Thomas Vs State of Indiana
In 2016, Larry J. Thomas was found guilty of an attempted robbery that resulted
in the murder of Rito Llamas-Juarez. While the case had eyewitnesses who
confirmed Thomas’s presence at the crime scene, digital forensics helped
strengthen the case even further.
During the investigation, the authorities took the content posted on the
culprit’s Facebook account under consideration. They found that he had
been using a handle named “Slaughtaboi Larro” and had posted photos of
himself carrying an assault rifle. The ammunition used in the murder case
matched that of the weapon shown in Thomas’s online images. The photos
were also used to match a bracelet found at the crime scene. Thomas had
been wearing a similar bracelet in the pictures posted online. Consequently,
Thomas was arrested and imprisoned.
Computer investigation model
According to Kruse II, W.G., and Heiser, J.G. (2010), a computer
investigation is to identify the evidences, preserve those evidences, extract
them, document each and every process, and validate those evidences and to
analyse them to find the root cause and by which to provide the
recommendations or solutions.
Conclusions
-------------------------------THANK YOU------------------------------------