Hire writer
Paper Types
Disciplines

Digital Forensics, Essay Example

Pages: 1

Words: 306

Essay

Introduction

This often takes the form of a distributed network attack (DNA) and may be described  as that of a decryption attack across a large computer network system. Such attacks are aimed at disruption and  gaining  illegal penetration of a computer network.  Such attacks are often  designed  to obtain important information from which the person carrying out the theft hopes to make a monetary gain. . It may be conducted as a revenge motive or even pure sabotage.  Whatever the motive it is a criminal offence and organizations need to try and protect themselves from such occurrences. When a real act of sabotage has occurred the forensics team will need to create an events portfolio for subsequent evidence in court. (Bachrach, 2004)

Forensics Portfolio

The following sample evidence would need to be collected:

  • A Network intrusion report would be required in order to show information concerning the intruder to the system i.e. the IP Address, access details etc. In addition security information  provided  by the  Network  Security software that might include such items as access times and the type of data accessed.  ..
  • It would be useful to obtain a physical sector image report , essentially a duplicate of the existing system that can be used for forensic examination purposes. (SANS Corporation, 2011).
  • The  portfolio should include the results of a Network Security Audit , primarily a verification exercise that examines vulnerabilities and weak access points in the system.  In addition examination of the security elements of the systems that include such items as firewalls, virus protection, encryptions and details on any hardware vulnerabilities. (Hayes, 2011)

References

Bachrach, A. (2004). Distributed Inference to Detect a Network Attack. Berkeley CA: University of California.

Hayes, B. (2011, 11 28). Conducting a Security Audit: An Introductory Overview. Retrieved from Symantec Corporation: http://www.symantec.com/connect/articles/conducting-security-audit-introductory-overview

Sans Corporatioin. (2011, 11 28). Overview of disk imaging tool in computer forensics. Retrieved from SANS Corporatioin: http://docs.google.com/viewer?a=v&q=cache:KuvjPVe3NRgJ:www.sans.org/reading_room/whitepapers/incident/overview-disk-imaging-tool-computer forensics_643+disc+imaging+process&hl=en&gl=ca&pid=bl&srcid=ADGEESjeQV2d5upashfBmgvSJ2LQHZPf_Z1emDefoFi6V3gnGCxJOlxJK

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

The New Heritage Financial Decision Analysis, Essay Example

Reasonable Points of Difference The new doll film project has the highest NPV and yet maintains the shortest payback period of 1.05 years Unreasonable Points [...]

Pages: 1

Words: 555

Essay

The Online Marketing Technology, Essay Example

Visitors Needs of Web Visitors Web Sites that Meets Customer’s Needs Rating of the Web Site Headlines. The website should capture the attention of the [...]

Pages: 1

Words: 321

Essay

Revenue Models and Building a Web Presence, Essay Example

Meeting Visitors’ Needs Aspect www.guardian.co.uk http://wikinvest.com/ http://www.wechoosethemoon.org/ Visitor-focused navigation ****/***** ****/***** ***/***** Quick access to information ****/***** ****/***** ***//***** Clear marketing messages ***/***** ****/***** ***/***** [...]

Pages: 1

Words: 282

Essay

Peer Review Feedback Form, Essay Example

Peer reviews should provide feedback to a peer on the criteria expected in the paper. Follow these instructions: Receive a classmate’s paper from your professor [...]

Pages: 1

Words: 642

Essay

William Shakespeare, the Tempest (1611), Essay Example

Introduction William Shakespeare’s play The Tempest focuses on the relationship between colonialism and language and how informal educational practices were deeply embedded in colonialism practices. [...]

Pages: 1

Words: 828

Essay

The Risks of the Game of Football, Essay Example

Equipment A player wearing a worn out or outdated helmet resulting to head concussion upon contact with another helmet; with a head to head collisions, [...]

Pages: 1

Words: 1304

Essay

The New Heritage Financial Decision Analysis, Essay Example

Reasonable Points of Difference The new doll film project has the highest NPV and yet maintains the shortest payback period of 1.05 years Unreasonable Points [...]

Pages: 1

Words: 555

Essay

The Online Marketing Technology, Essay Example

Visitors Needs of Web Visitors Web Sites that Meets Customer’s Needs Rating of the Web Site Headlines. The website should capture the attention of the [...]

Pages: 1

Words: 321

Essay

Revenue Models and Building a Web Presence, Essay Example

Meeting Visitors’ Needs Aspect www.guardian.co.uk http://wikinvest.com/ http://www.wechoosethemoon.org/ Visitor-focused navigation ****/***** ****/***** ***/***** Quick access to information ****/***** ****/***** ***//***** Clear marketing messages ***/***** ****/***** ***/***** [...]

Pages: 1

Words: 282

Essay

Peer Review Feedback Form, Essay Example

Peer reviews should provide feedback to a peer on the criteria expected in the paper. Follow these instructions: Receive a classmate’s paper from your professor [...]

Pages: 1

Words: 642

Essay

William Shakespeare, the Tempest (1611), Essay Example

Introduction William Shakespeare’s play The Tempest focuses on the relationship between colonialism and language and how informal educational practices were deeply embedded in colonialism practices. [...]

Pages: 1

Words: 828

Essay

The Risks of the Game of Football, Essay Example

Equipment A player wearing a worn out or outdated helmet resulting to head concussion upon contact with another helmet; with a head to head collisions, [...]

Pages: 1

Words: 1304

Essay