Chapter 11

Web Forensics

1

Purpose of Investigation

Theft of intellectual property

Misuse of company resources

Stalking

Possession or distribution of contraband

Internet Addressing

Uniform Resource Locator (URL) points to a specific object with Internet availability

Scheme identifies protocol used to access the resource (http, https, ftp, etc.)

Domain name points to the specific network

Suffix (.com, .edu, etc.) points to top level domain

All together, they make the fully qualified domain name

Browsers

Uses markup language to open web pages

Hyperlinks redirect user to specific resources

Content can be either web pages or files that are the targets of hyperlinks

Function of Browsers

An address bar (manual mapping to URL)

Forward and Back buttons

Bookmarking capabilities

Intrapage search capabilities

Configuration utilities

Artifacts of Browsing

Internet history

Cookies

Temporary Internet files

Registry entries

Deleting Temporary Files

Browser settings can be adjusted to automatically delete files upon closing the browser

Temporary files can be recovered the same as any other deleted file

Cookies may or may not be included, depending on the browser and its configuration

Internet history files and cache files are not the same

Browser History

A database of recently visited sites

Cache files are stored separately

Each operating system/browser combination has a different default location for history and cache files

Some utilities that analyze Internet usage can automatically detect browser settings

Analyzing User Activity

Cookies generally identify the website from whence they came

History records are a database file that shows user activity (may be deleted periodically)

Temporary Internet files can be recovered by file recovery utilities even if automatically deleted

History Files

URL

File Name: as it exists on the local system

Record Type: browsed or redirected

Access Time: time the file was last accessed

Modified Time: time the file was last changed

Directory Name: local directory in which the file is stored

HTTP Headers: as originally received

Finding “Stuff” is Not Enough

The defendant has knowledge of possession of contraband

The defendant took specific actions to obtain the contraband

The defendant had control over the contraband

If deleted, the defendant took active measures to destroy the actual materials

There was sufficient quantity of contraband to justify prosecution

Knowledge of Possession

“Present Possession” concept: The user must know that it is there

Redirected sites will store temporary files and images without notifying the user

Any attempt to manipulate or manually delete the file suggests knowledge of possession

But what user was logged on when these actions took place?

Establishing User Actions

Repeated searches suggest intent

Innocent searches can bring up unexpected content

Popups are not under the control of the user

Meta-refresh will automatically redirect the user against their will

The TypedURL registry entry proves that a website was accessed intentionally

Establishing Control of Material

The Trojan Horse defense (the Devil made me do it)

A malware analysis can prove or disprove this claim

But rootkits can foil the malware analysis

Accessing a file a significant time after the original create date suggests control

Manually deleting or editing a file suggests control

Determining Active Measure

Intentional deletion

Modify dates after the create date

Moving a file from one location to another

Renaming a file

Determining Sufficient Quantity

That’s not your job – leave it to the legal team

Your job is only to ascertain the quantity

Tools for Browser Analysis

Virtually all commercial forensic suites

Pasco

Web Historian

Galleta

NetAnalyst

Investigating Web Servers

Server log files

Access logs

Error logs

Proxy Servers

Logistics Management

Assignment 1

Deadline: 9/10/2019

Assignment Details

· Avoid plagiarism, the work should be in your own words, copying from

students or other resources without proper referencing will result in ZERO marks.

· The Answer should be 3- 4 pages in length including the cover and appendices, with 1" margins on all sides, double-spacing, and 12 point font. Use your simple words.

· All answered must be typed using Times New Roman (size 12, double-spaced) font.

Instructions – PLEASE READ THEM CAREFULLY

Learning Outcome:

1. Demonstrate a deep understanding of the logistic function concepts and theories as well as supply chain management strategies.

2. Demonstrate the ability to understand complex issues pertaining to supply chain integration and strategic supply chain partnership.

Assignment Workload:

This assignment is an individual assignment.

Critical Thinking

The purpose of this assignment is to identify and apply Logistics and Supply Chain Management concepts/tools to suggest logistics performance priorities. To this purpose, you should review about these companies through secondary available information. Think about how you can apply the concepts/tools that you learned in this course.

Suggest logistics performance priorities for any ONE of the following, explaining why you have come to your conclusions:

1) FLYNAS (A low fare Airline)

2) DOMINOS (A fast food chain)

The Answer should be 3- 4 pages in length including the cover and appendices, with 1" margins on all sides, double-spacing, and 12 point font. The cover of the report should include title, course code and name, your full name, and your University id number.

The Answer must follow the outline points below:

1. Executive summary (no more than one page)

- Summarize what is logistics performance priorities, what Logistics and Supply Chain Management concepts/tools have been applied to achieve the company’s objective.

2. Background information

- Briefly introduce the company background (e.g., name, products, business size, location, internal/external interesting facts, etc).

3. Problem Description

- Describe the objectives clearly and specifically.

- The objective may involve either logistics decision-making or process improvement.

4. Application of logistics and Supply Chain Management concepts/tools that can be applied

- Describe what specific logistics and Supply Chain Management concepts/tools can be applied to achieve the objective. This section should make it clear that you understand the concepts/tools you are about to use.

5. Analysis of expected results

- Analyze the expected results of the proposed solution.

6. References

Logistic

s

M

anagement

Assignment 1

Deadline:

9

/10/2019

Assignment Details

·

Avoid plagiarism

, the work should be in

your own words

, copying from

s

tudents

or other resources

without

proper

referencing

will result in

ZERO

marks.

·

The Answer

should be 3

-

4 pages

in length including the cover and

appendices,

with 1" margins on all sides

,

double

-

spacing

, and

12 point

font

.

Use

your

simple words

.

·

All answered must be typed using

Times New Roman (size 12, double

-

spaced)

font.

Instructions

PLEASE READ THEM CAREFULLY

Learning Outcome

:

1. Demonstrate a deep understanding of

the logistic function concepts and theories as well as

supply chain management strategies.

2. Demonstrate the ability to understand complex issues pertaining to supply chain

integration and strategic supply chain partnership.

Assignment Workload:

This assi

gnment is an individual assignment.

Critical Thinking

The purpose of this assignment is to identify and apply Logistics and Supply Chain

Management concepts/tools to suggest logistics performance priorities. To this purpose, you

should review about these

companies through secondary available information. Think about

how you can apply the concepts/tools that you learned in this course.

Suggest

logistics performance priorities

for any

ONE

of the following, explaining why you

have come to your conclusions:

Logistics Management

Assignment 1

Deadline: 9/10/2019

Assignment Details

 Avoid plagiarism, the work should be in your own words, copying from

students or other resources without proper referencing will result in

ZERO marks.

 The Answer should be 3- 4 pages in length including the cover and

appendices, with 1" margins on all sides, double-spacing, and 12 point

font. Use your simple words.

 All answered must be typed using Times New Roman (size 12, double-

spaced) font.

Instructions – PLEASE READ THEM CAREFULLY

Learning Outcome:

1. Demonstrate a deep understanding of the logistic function concepts and theories as well as

supply chain management strategies.

2. Demonstrate the ability to understand complex issues pertaining to supply chain

integration and strategic supply chain partnership.

Assignment Workload:

This assignment is an individual assignment.

Critical Thinking

The purpose of this assignment is to identify and apply Logistics and Supply Chain

Management concepts/tools to suggest logistics performance priorities. To this purpose, you

should review about these companies through secondary available information. Think about

how you can apply the concepts/tools that you learned in this course.

Suggest logistics performance priorities for any ONE of the following, explaining why you

have come to your conclusions:

Get help from top-rated tutors in any subject.

Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com