Forensics

The University realises that the web-server described in Case Study 2 contains a large folder with a range of files, some seemingly containing confidential information related to the COVID-19 Vaccine research undertaken at the University, some being random images, some looking like random binary files.
Describe a method to forensically analyse the web-server.
Design and justify a security analysis method in a report (400 words max per report). This report must be written as if you were asked by a client or stakeholder of a specific system to explain which security analysis method you would use for that specific system. Case studies might use systems and concepts not covered in the lecture material, thus mimicking the fact that no security analysist is aware of all systems existing in the wild. It is your responsibility to find information relevant to these systems. In some cases, you might have to make some assumptions on how these systems are organised or used. In this case, it is expected you will justify your assumptions based on your understanding of the context.

Sample Solution