Background

  1. Cyber Diligence, Inc. has been retained by XYZ Corporation to provide digital forensics and cyber investigative services in relation to an incident in which a workstation on the XYZ corporation's network attempted to make a connection to an IP address in China.
  2. This report has been prepared by Cyber Diligence, and is based on Cyber Diligence's forensic analysis of an HP Elitebook (serial # CCC0000XXX) used by Mr. John Doe.
  3. The forensic analysis was conducted by investigators at Cyber Diligence under the direct supervision of Mr. Yalkin Demirkaya. His curriculum vitae is attached as Exhibit 1.

 

  1. Our investigative approach involved determining if there was any forensic evidence to suggest that the laptop computer:
    • Had been compromised by the perpetrator(s)
    •  If found to be compromised, how, when, and by whom it was compromised
    • What malicious program was used in the compromise?
    • If the perpetrators used the workstation to launch attacks to other computers on the network, and
    • Whether there was any forensic evidence to suggest the compromise led to data exfiltration
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.15.214.155