Requirement Elicita...
 
Notifications
Clear all

Requirement Elicitation

3 Posts
2 Users
0 Reactions
825 Views
(@sarah_camp)
Active Member
Joined: 14 years ago
Posts: 6
Topic starter  

I'm currently studying Forensic Computing at UCLan (in my third year). I'm doing a requirement elicitation for my project and wondered if you could help?

My project is "hacking" into a honeypot and altering the log files to pretend I wasn't there.

Could anyone think how this would benefit a forensic investigator?

Thanks!
S


   
Quote
KungFuAction
(@kungfuaction)
Estimable Member
Joined: 13 years ago
Posts: 109
 

First, unless one is authorized by an organization to do penetration testing for their network one was "hacking," it would be illegal and unethical.

The reason it would help a forensic investigator is that the types of modifications made during this process would teach the investigator what to look for.


   
ReplyQuote
(@sarah_camp)
Active Member
Joined: 14 years ago
Posts: 6
Topic starter  

Thank you for your response.

I intend to create the honeypot myself on a virtual network, so it will be ethical.

Thanks


   
ReplyQuote
Share: