Case Study (10%): You are hired by JLA Enterprise to conduct a Forensic Examination after a network intrusion occurs at their corporate office. Your job is to determine the source of the network intrusion and provide as much information regarding the attack as possible. Here are some things to consider when explaining what happened during the network intrusion:
What time did the attack happen?
How did the hacker get into the network?
What computers were compromised?
What computers were accessed?
What data was extracted from the network?
What type of attack was conducted?
How long did the attacker have access to the network?
Is there any persistence on the network for future attacks?
You are asked to conduct a forensics examination of the network and provide a forensic report explaining what happened during the attack and what corporate data was compromised. The report should cover the above information, as well as create a timeline that shows the attack from the initial stages of the attack to when the data was extracted from the network.
Your submission should be about 3 to 5 pages (not including the title page and the references page) long in APA format with proper citations and references if you are using them. It will be subjected to checking against plagiarism. The final product must follow acceptable originality criteria (no more than 15% max total, and 2% per individual source match are allowed).ISSC455-20-000X Forensic Report

JLA Phishing Attack

ISSC455 Digital Forensics:

Investigation Procedures and Response

Documents Properties

Title

ISSC455-20-000X Forensic Report

Version

1.0

Authors

Reviewed By

Approved By

Classification

Confidential: For Educational Purposes Only

Version Control

Version

Date

Authors

Description

1.0

Final Draft

Disclaimer

The information contained in this report, APUS ISSC455 Report JLA Phishing Attack, is intended for training and learning purposes only and is not for the purpose of providing digital forensic investigation recommendations. The scenario leading to this report is provided by Shanken Security Solutions and has been approved for use as Education Purposes Only. If this report is found, please delete, shred (if hardcopy) or report to
[email protected] for further instructions if delete or shred are not available.

APUS AND PROFESSOR JOHNNY JUSTICE DISCLAIM ALL LIABILITY AND RESPONSIBILITY FOR ANY ERRORS OR OMISSIONS IN THE CONTENT CONTAINED IN THIS REPORT.

Contents
Table of Figures 4
1.0 Scope 6
1.1 Purpose 6
1.2 Team Overview 6
1.3 Executive Summary 6
2.0 Narrative 7
3.0 Findings 9
3.1 Quick View 9
3.2 Email 1: Sabre Project – October 15, 2019 – 1938 hours 10
3.3 Email 2: Sabre Project – October 15, 2019 – 1947 hours 12
3.4 JLAENTREPRISE.com Domain Created – October 15, 2019 – 2054 hours 14
3.5 Email 3: Sabre Project – October 15, 2019 – 2258 hours 16
3.6 Email 4: Sabre Project – October 16, 2019 – 0653 hours 19
3.7 Email 5: Sabre Project – October 17, 2019 – 1123 hours 21
3.8 Email 6: JLA Enterprise and Sabre Project – October 17, 2019 – 1209 hours 23
3.9 Email 7: Sabre Project – October 17, 2019 – 1325 hours 25
3.10 Email 8: Sabre Project – October 17, 2019 – 1337 hours 27
3.11 Email 9: JLA Enterprise and Sabre Project – October 17, 2019 – 1431 hours 29
3.12 Email 10: Sabre Project Wiring Instruction – October 17, 2019 – 1443 hours 30
3.13 Email 11: Sabre Project Wire Transfer – October 17, 2019 – 1445 hours 31
3.14 Email 12: Sabre Project Wire Transfer – October 17, 2019 – 1459 hours 32
3.15 Email 13: Sabre Project Wiring Instruction – October 17, 2019 – 1506 hours 35
3.16 Email 14: Sabre Project Wire Transfer – October 17, 2019 – 1542 hours 36
3.17 Email 15: Sabre Project Wiring Instruction – October 19, 2019 – 1202 hours 38
3.18 Phishing Scam Sent to JLA Enterprise Consultant – October 19, 2019 – 2233 hours 41
4.0 Conclusion 42
4.1 Email 1: – June 01, 2019 – 0710 hours 42
4.2 Email 2: – August 02, 2019 – 1808 hours 43
5.0 Recommendations 44
Appendix A: Wiring Instructions (Fraudulent EAST HUN CHIU Account) 45

Table of Figures

Figure 1 – Email 1 – Michael SCOT




Why Choose Us

  • 100% non-plagiarized Papers
  • 24/7 /365 Service Available
  • Affordable Prices
  • Any Paper, Urgency, and Subject
  • Will complete your papers in 6 hours
  • On-time Delivery
  • Money-back and Privacy guarantees
  • Unlimited Amendments upon request
  • Satisfaction guarantee

How it Works

  • Click on the “Place Order” tab at the top menu or “Order Now” icon at the bottom and a new page will appear with an order form to be filled.
  • Fill in your paper’s requirements in the "PAPER DETAILS" section.
  • Fill in your paper’s academic level, deadline, and the required number of pages from the drop-down menus.
  • Click “CREATE ACCOUNT & SIGN IN” to enter your registration details and get an account with us for record-keeping and then, click on “PROCEED TO CHECKOUT” at the bottom of the page.
  • From there, the payment sections will show, follow the guided payment process and your order will be available for our writing team to work on it.