write a report

  • Status Closed
  • Budget $250 - $750 USD
  • Total Bids 4

Project Description

Outline Requirements

A company (MyComp) has reported that there has been some malicious activity within their company. They have managed to get a virtual image of the computer, which contains traces of evidence that could be used for the investigation (this includes both host activity on the system and network traces). It is thus your objective to investigate the virtual image, and produce a fair and unbiased report on the findings.

The analysis should involve analysing the network trace for the connections from the hosts which connected to the host‐under‐suspicion (HUS). Along with this you should analyse and cross‐correlate the activity within the logs on the HUS, and the trace of files left on the system. Evidence should also be gained from the applications which were used within the time window of interest. Please note that all other activity outside this window‐of‐interest should be ignored.

Get free quotes for a project like this
Awarded to:

Looking to make some money?

  • Set your budget and the timeframe
  • Outline your proposal
  • Get paid for your work

Hire Freelancers who also bid on this project

    • Forbes
    • The New York Times
    • Time
    • Wall Street Journal
    • Times Online