As the computer forensics investigator for the law firm, I analyzed the computer used by the newly acquired client, a young woman who was fired for having inappropriate files on her computer. After conducting a thorough investigation, I discovered that the client's computer was a Dell Inspiron laptop, running on Windows 10 Home with an Intel Core i7 processor.
During my investigation, I utilized tools such as EnCase Forensic, FTK Imager, and Autopsy. These tools allowed me to examine the hard drive, recover deleted files, and view the computer's internet history and usage. It was found that the client was the primary user of the computer, logging into her account with a strong password.
However, upon further examination, it was discovered that the client's roommate had access to the computer as well. This roommate had a history of accessing inappropriate content on their shared Wi-Fi network. Additionally, the client's computer had remote desktop access enabled, providing a potential avenue for someone else to access the computer.
Upon analyzing the internet history, it was determined that the inappropriate files were downloaded during the evening hours, a time when the client was away from the computer. This further strengthened the suspicion that the roommate was behind the downloads.
Overall, it can be concluded that while the client's computer was used to download inappropriate files, the actual individual responsible for these downloads remains unknown. However, with the evidence found, it is clear that the client's roommate had both motive and opportunity to conduct such actions. This information will be crucial as the law firm moves forward with the client's case.
You are the computer forensics investigator for a law firm. The firm acquired a new client, a young woman who was fired from her job for inappropriate files discovered on her computer. She swears she never accessed the files. You have now completed your investigation. Using what you have learned from the text and the labs, complete the assignment below. You can use your imagination about what you found!
Write a one page report describing the computer the client used, who else had access to it and other relevant findings. Reference the tools you used (in your imagination) and what each of them might have found.
1 answer