Topic 1: Timestomp
Using available online resources, research Timestomp. Reflect on how
dependent system administrators might be dependent on accurate time
stamps and how Timestomp might be used maliciously. Would you regard
this as an anti-forensics tool?
In NIST Special Publication 800-83 Revision 1, Guide to Malware Incident Prevention and Handling for Desktops and Laptops read or review the following:
Chapter 2: “Understanding Malware Threats”
Chapter 4, Section 2: “Detection and Analysis”
National Institutes of Standards and Technology (NIST). https://www.nist.gov/