Question Description
I’m working on a computer science writing question and need an explanation to help me learn.
There is a cyber attack against Company X and you are the only digital forensic analyst for the company. You think the attack is coming for the insider. You have a good idea that the employee Kelvin is not happy at the company and launched a cyber attack. Kelvin is in IT department. He uses Linux computer and has an iPhone. The attack is against HR database. Database is an SQL databas. All social security numbers are being deleted. You find that the attacker uses phishing emails to capture a database passwrd. Phishing e-mail has the following body lines. “Your passwrd expired, please check the link to reset your passwrd.”You will get his computer and iPhone to analyze. Please describe steps you will take from his computer and iPhone and doing digital forensics analysis. Describe tools you will use, methodology you will follow.