Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Information and Communication Technology, Essay Example
Hire a Writer for Custom Essay
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Incident Response Plan
This is an information age that is driven by technology. Likewise, organizations are reliant on information that is converted into 0s and 1s and is stored and maintained on information systems. As information is residing everywhere in the organization, there is a requirement to evaluate vulnerabilities that are used by threats to compromise systems and networks. Likewise, risk environment for the business is constantly changing, there is a requirement of conducting risk analysis on periodic basis and if there is a major business change. However, incident response plan is essential for any organization, in order to combat threats or incidents. The incident response plan provides incident response phases and documentation associated with information channels for incident that occur within the organization. Channels, roles and responsibilities that will identify the reporting procedure to authorized personnel along with assessment of an incident, damage and eradication strategy and protecting information that may be an evidence for forensic cases (Incident response plan, n.d ).
Acquisition and Examination (Wireless)
Information and communication technology (ICT) is revolutionizing to provide enhanced communication services to the customers. Personal data assistants are the prime example. Businesses can now benefit from these devices regardless of location of employees. As risk environment is always changing by the leverage of new technologies, there is a requirement of re assessing and re-evaluating procedures that were in the current practices of organizations. In the context of investigating data that is dealing with wireless communication interfaces, authentication and acquisition is essential due to their role in forensic methods and procedures. In case of a PDA, there are two areas that require significant importance i.e. data acquisition and data authentication. Likewise, the rationale for considering them is because they are dependent on transitional storage, which is embedded in every PDA (Computer forensics. n.d). The transitional storage contains both volatile and non-volatile memories i.e. Random Access Memory (RAM) and Read Only Memory (ROM) and the data associated with acquisition and analysis for processing purposes. Moreover, the operating system and data processing of the PDA do not stop functioning even the PDA is switched off (Computer forensics. n.d). The reason for this is the fact that battery is still connected with the PDA that facilitates PDA to perform these data processing functions. Hence, collecting data for evidence from a wireless device is comparatively difficult to acquire because data contents are continuously changing that may over write data files that may lead to a discovery.
Recommended Practices
As mentioned earlier, PDA do not stops data processing, even it is turned off, it can be called as a ‘push message’ device. The source of getting data is from the antenna that interacts with the base station. Likewise, after getting updates from the station, it over-writes the currently available data with the new one. For example, investigators require emails for any possible clues, they are modified with the new ones and consequently, making life difficult (Computer forensics. n.d). However, there are practices available to counter these issues. Steps are mentioned below:
- The first step will be to turn of the radio from the PDA
- When the acquisition of data starts, PDA should be moved in an isolated location to perform some steps. Investigators will turn on the PDA and in parallel turn the radio off.
- Cross checks on battery should be made for it to be completely charged.
- Via SDK tool, logs will be acquired for possible evidence searching.
- Investigators will than make a replication of the OS image from the PDA
- Acquired data is than examined by the investigation team
- Last step is to dump all the data to the SDK simulator.
Acquisition and Examination (Wired)
For attaining acquisition and examination of data on wired network, recommended practices are mentioned below:
Recommended Practices
For detection and root cause analysis, investigators will execute two processes:
- For targeting the server and client, ‘pcap’ trace analysis
- And for monitoring data, ‘netflow’
HTTP server will be used to perform vulnerability testing, as the web server will execute a separate threat for all queries related to ‘POST’ request on port ‘12345’. Moreover, the web server will process the shell code identical to the original shell code. ‘Wireshark’ will examine and monitor the traffic on the LAN interface. Furthermore, two more tools will be added to the simulation i.e. ‘tftp server’ and ‘tftp client’ (Cert Exercises Handbook – Scribd, n.d.). As the web server is configured on Apache, compatible tools known as ‘exploit’ will also be used (Cert Exercises Handbook – Scribd, n.d.). After incorporating these tools, the steps are mentioned below:
- Stop Apache services
- Initialize web server on Apache
- Initialize modified Scripts
- ‘Pcap’ will generate log files containing IP addresses
Wired and Wireless device Procedures (Conclusion)
Wired and wireless devices do not vary significantly, as the investigation techniques and methods are dependent on technology and they must be trained periodically to cope up with new technologies in the future. The complexity cannot be differentiated between these two different carriers. However, tools make the job easy.
References
Cert Exercises Handbook – Scribd. n.d. Retrieved from http://www.scribd.com/doc/35011748/Cert-Exercises-Handbook
Wireshark Network Analysis. n.d. Retrieved from http://wiresharkbook.com/articlewireshark101.html
Incident response plan, n.d Retrieved 10/8/2011, 2011, from http://www.comptechdoc.org/independent/security/policies/incident-response-plan.html
Computer forensics, n.d Retrieved 10/8/2011, 2011, from http://www.mandarino70.it/
Stuck with your Essay?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee