Essay Available:
You are here: Home → Coursework → Technology
Pages:
3 pages/≈825 words
Sources:
Level:
APA
Subject:
Technology
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 21.87
Topic:
Analysis/Design Info Systems (Cyber security) (Coursework Sample)
Instructions:
I was supposed discuss cyber security.
source..Content:
Analysis/Design Info Systems (Cyber security)
Name
Professor
Institution
Course
Date
Cyber security has become a more and more significant requirement for businesses both in local and global arena in the perspective of modern society. We live in a data-centric environment, where Information Technology and related data networks as well as services encompass every element of our lives. This makes the safety of digital hardware and processes in cyberspace of significant importance, regardless of whether it is for personal life experience or a successful and sustainable society.
A case in example is JCB Health Company, whose Information Technology system has been compromised. As a result of a suspected system intrusion, JCB Company has sought the services our company ABC Inc. for professional analysis of the company’s Information Technology systems. As a lead forensics investigator, I am tasked with the responsibly of establishing if indeed there was an intrusion and subsequently provide the necessary recommendations (HaÌ€mmerli & Sommer, 2007).
The problem identifiers
I will consider applying the two types of intrusion detection, the host based as well as network based detection .This approach will be guided by the fact that the JCB’s database administrator’s computer has exhibited potential malware infection. Based on the case at hand I will use host based detection to primarily to detect any inside attacks for instance if the database administrator abused her privileges. Additionally I will use network based detection to analyze network packets. This will guide me in establishing and detecting any access attempts and rejection of service trials coming from outside the network. JCB has intrusion detection system (IDS) which has sensors installed across the network, these sensors usually reports network activities to a central command console (Daniel, Daniel & In Spielman, 2012).
Imaging is more correctly the process of making an exact copy of a drive or partition, however other than creating a bootable drive, the duplicate is held in a data representation of the media or partition which can be reinstated from. The image is the data representation and can be stored on another hard drive as well as in a partition. In order to image the lead database administrator’s drive perfectly I will use a special tool called DriveImage XML. This software permits both image and clone creation. This software uses a graphical user interface (GUI) to direct the user through the process and it produces an image that can be analyzed in a unique way(Wiles, 2007). Below (Fig 1) is the welcome screen for DriveImage XML.
Figure 1: Source:
The software’s “Drive to Drive” option produces an ideal clone of a hard drive. The reason I will use DriveImage XML is because its backup feature - the implementation of imaging, generates an image that comes with an XML file. The XML file offers the capability to browse the image and remove files from it by use of the DriveImage XML application (as shown in Fig. 2) or a third-party application with XML reader. The software has the ability to clone as well as image a drive even if it is currently in use.
Figure 2: Source:
In its default settings, DriveImage XML creates an image that is split up into 650 MB segments so that the image can be stretched out and be burned into CDs or DVDs which perfect for XYZ Inc.
Recommendations
Since JCB Company runs a Microsoft SQL Server 2008 database on Microsoft Windows 2003 Server flat form. It is within this server where patient medical records are stored. I will recommend use the DriveImage XML application to image the server’s drives because it supports both workstation and server versions of Microsoft windows. However, because of the huge data stored within various partitions of the hot plug hard drives, imaging the drives will not be as fast as it will be on windows XP workstation. Nevertheless I will recommend following the same procedure but this time from one hard disk to the next until I have imaged all the drives.
Malware are becoming a memory-resident, meaning it has to be executed first, the first execution, an operation executing the executable file, is only the initial step. Malware in most cases uses other tricks ensure that it is initialized as a minimum of once in each system session. It accomplishes this by inserting links to itself in locations at which the system processes or pre-configures Windows Server 2003. These are locations where it is ...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
Other Topics:
- Comparison between Data Encapsulation and DecapsulationDescription: The customer wanted a technical paper highlighting the differences between data encapsulation and decapsulation, with relevant calculations ...2 pages/≈550 words| APA | Technology | Coursework |
- Software Change RequestDescription: Designing an Effective Software/System Enhancement Change Request Form Technology Coursework...1 page/≈275 words| APA | Technology | Coursework |
- System Enhancement Change Request FormDescription: A software/system enhancement change request is a document that contains request for adjustments of a software or system...1 page/≈275 words| APA | Technology | Coursework |