Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

QUESTION 1

(a) Name five significant activities involved in a digital forensic investigation.

(b) Why is computer forensic possible? Give an instance to support your answer.

(c) How is computer forensic dissimilar from data recovery?

(d) Briefly explain the three types of data that a forensic examiner has to work with. Which one of the three is more tricky to obtain?

(e) Computer crimes pose new challenges for investigators. Give two causes why?

QUESTION 2

(a)Describe the term "computer security incident". Give one instance for each of the subsequent grouping of security incident:

(a) Low level,

(b) Mid Level, and

(c) High Level.

(b)First Response carry out by a forensic staff involves six stages. What are the six stages?

(c)
i. What is the Trojan Defence?

ii. Explain whether this defence is successful or not in court? Clarify your reasoning.

iii. Describe how the Trojan Defence can be used as an anti-forensics technique?

iv. Why is this anti-forensics technique often unbeaten?

QUESTION 3

(a)Data acquisition is often chased by the evidence authentication process.

(i) Briefly illustrate the data acquisition process.

(ii) Why is data acquisition executed?

(iii) What is the purpose of the authentication procedure?

(iv) How is the authentication of evidence frequently done?

(b)Throughout data acquisition, data spoliation can occur.

(i) Put in plain words why data spoliation can occur when using a computer to perform data acquisition of a hard-drive.

(ii) How can this data spoliation be avoided?

(c)(i) What is the "chain of custody"?

(ii) What is the point of the chain of custody?

(iii) When does the chain of custody start?

(d)Data can be covered on a computer system. Data hiding study can be useful in detecting and recovering such data. Discuss three ways of how a suspect can hide data on a computer.

QUESTION 4

(a)Name two sorts of File System.

(b)(i) Where is the metadata concerning files/folders stored in a FAT file system?

(ii) Give four instances of typical metadata stored.

(c)The FAT entry for non-addressable cluster 1 in FAT 16 is used to store the worth for the "dirty status" of file system.

(i) When is the dirty status set?

(ii) What take places when the dirty status is set?

(d)(i) Explain the 8 dot 3 DOS naming convention.

(ii) Write the 8 dot 3 alias for the subsequent file names:

a. SQLOracleHacks.txt

b. SQLOracleAttacks.txt

c. SQLInjection.html

(e)Why does NTFS have better performance with regard to read capability than the FAT file structure?

QUESTION 5

(a)Mull over a company involved in research where all work is strictly confidential. The company's network enforces strong access control and is equipped with a content based filtering firewall which checks all data that leaves the network. In some way, the CEO is concerned that confidential information about their research has been leaked out of the company's network. As a forensic expert, you are asked to investigate. Portray how you will proceed to find evidence, if any, to prove that there may be data leakage.

(b)Judge the following email header: Based on the information in the email header, Based on the information in the email header, depict the path the email takes from source to destination by means of a diagram. Indicate on the diagram the different protocols in use.

1726_Computer & Internet Forensics01.png

(c)Detail three email forensic tools.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9718987

Have any Question?


Related Questions in Computer Network & Security

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

It networking assignment - networking project areamajor lab

IT Networking Assignment - Networking Project Area Major Lab Scenario - Instructions This lab has a time limit of one term The lab must be completed by individual students, and the completed assessment returned to the as ...

Assignment - network implementationbackgroundwidgets and

Assignment - Network Implementation Background Widgets and Gadgets (WaG) have recently acquired a business, We Make Stuff (WMS), in another city. Before work can commence on integrating WMS's network into WaG's, WMS actu ...

Objectives-to learn about more advanced network security

Objectives -To learn about more advanced network security and vulnerability scanning tools Lab Outcome: · To complete the lab procedures & correctly answer the questions in the Blackboard quiz. Lab Deliverables · Answer ...

Question for the remaining questions consider a 4-bit block

Question : For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 ...

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

Sms use short message peer to peer smpp protocolimessage

SMS use Short Message Peer to Peer (SMPP) protocol IMessage based on Apple push notifications (APNS) - binary protocol WhatsApp uses standard Extensible Messaging and Presence Protocol (XMPP) Write a pragraph explaining ...

Question for the remaining questions consider a 4-bit block

Question : For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 ...

Wireless networks and security assignment - design and

Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network Purpose of the assessment - The purpose of this assignment is to design and implement a secure enterprise wirele ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As