Top-Rated Free Essay

Assignment Unit 3: Information Technology Networking

Better Essays
Assignment Unit 3
Part I Hands-On Steps
Part 1: Use WinAudit to inventory the vWorkstation
1. Figure 1 shows screen shot of system overview using WinAudit
a. Figure 1 2. Figure 2 shows screen shot of Windows Firewall findings.
b. Figure 2

3. Figure 3 shows screen shot of user accounts findings.
c. Figure 3

4. Figure 4 shows screen shot of Drive C findings.
d. Figure 4

5. Figure 5 shows screen shot of Physical Disk.
e. Figure 5

Part 2: Use DenManView to identify system devices
1. Figure 1 show screen capture of CDROM and System CMOS/real time clock.
. Figure 1

There are 89 devices identified by DenManView.
Part 3: Use Frhed to perform a byte-level file analysis
1. Figure 1 shows screen shot of Frhed view of target.abc
. Figure 1

2. Figure 2 shows screen shot of target.jpg file.
. Figure 2

3. Figure 3 shows screen shot of entire contents of the file properties dialog box.
. Figure 3

Part II Lab Assessment Questions & Answers
1. What is the main purpose of a software tool like WinAudit in computer forensics?
WinAudit is a GUI based tool that reports on a numerous aspects of running system, inclduign both volatile and non-volatile information, providing computer inventory and system configuration (Aquilina, J., & Casey, E., 2008).
2. Which item(s) generated by WinAudit would be of critical importance in a computer Forensic investigation?
I will say that some of the most important items in a computer for a forensic investigation are: Drivers, running programs, installed programs, operating system, computer name, security setting and configurations, and firewall configurations.
3. Could you run WinAudit from a flash drive or any other external media? If so, why is this important during a computer forensic investigation?
Yes, we can run WinAudit from a flash drive. Its important during a computer forensic investigation because it would prevent alter any important evidence.
4. Why would you use a tool like DevManView while performing a computer forensic investigation?
I would use DevManView because it displays the properties of all devices running in a computer that is using my network.
5. Which item(s) available from DevManView would be of critical importance in a computer forensic investigation?
The item available form DevManView that are important in a computer forensic investigation are mostly hardware, and most likely they are Hardrive and USB devices that its been use within the network.
6. What tool similar to DevManView is already present in Microsoft Windows systems?
Another tool similar to DevManView that is used in Microsoft Windows systems is WinHEX
7. Why would someone use a Hex editor during a forensic investigation?
A forensic investigator need Hex editor for analyzing file structures allowing him to go beyond the application or file, and it will allows for the viewing of all the data contained within a file including remnant of old file or even deleted files (Marcella, A., & Guillossou, F., 2012).
8. What “clue” in the Frhed examination of target.abc led you to the correct extension for that file?
The “clue” that led me to correct the Frhed examination of target.abc was the Target.jpeg.
9. Describe the contents of the target.jpg file, and the application in which it opens.
The content of the target.jpg file is a picture of a fingerprint, which let us to view the hexadecimal file as an image. The application in which it opens was Windows Photo Viewer.
10. Why do you need to keep evidence unaltered?
It’s important that we kept evidence unaltered for admissible purposes. If the evidence it’s altered it could become inadmissible in a court, changing the path and result of a digital forensic case.

Reference
Aquilina, J., & Casey, E. (2008). Malware Incident Response: Volatile Data Collection and Examination on a Live Windows System. In Malware forensics investigating and analyzing malicious code. Burlington, MA: Syngress Pub.
Marcella, A., & Guillossou, F. (2012). The Power of HEX. In Cyber forensics: From data to digital evidence. Hoboken, New Jersey: Wiley.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 3 Assignment 3

    • 288 Words
    • 1 Page

    Unit 3 Assignment 3.3 Data classification policy is important for securing data from risks, which includes unauthorized users, modification, disclosure, access, use, and removal. This is to ensure protection on data assets from unauthorized users. Data must be maintained in a secure, accurate and reliable manner and be available for authorized use. In order to implement security measures, the data must be classified into categories like; confidential, restricted, and public. Confidential and…

    • 288 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Unit 3 Assignment

    • 1517 Words
    • 7 Pages

    Unit 3 Assignment Donna coats HN330: Case Management in Human Services January 18, 2013 The Africa culture is within the continent of Africa. Africa has a racial split that falls between North Africa and Sub-Saharan Africa; this divides the cultures into a significant number of ethnic cultures. African cultures are known to be diverse and varied and like the rest the world internal and external forces have impacted upon the African culture. African culture and the way of living are just…

    • 1517 Words
    • 7 Pages
    Better Essays
  • Better Essays

    Unit 3 Assignment

    • 1222 Words
    • 5 Pages

    Marcos Vazquez Unit 3 chapter 4 and chapter 5 case stud and, ended questions HS450 Professor Jaeckel Case Study 1 Tri-Star Health Insurance Company Discussion Questions 1. What should Fisher have done when he first decided to tackle this project? 2. What protocols should have been in place to avoid the present situation? 3. What positive resolution can be implemented in order to keep these contracted physicians with the plan? Communication is the creation or exchange of thoughts, ideas…

    • 1222 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Unit 3 Assignment

    • 525 Words
    • 3 Pages

    Unit 3 Homework - Template Problem 1: Suppose that the supply schedule of Belgium Cocoa beans is as follows: Price of cocoa beans(per pound) | Quantity of cocoa beans supplied(pounds) | $40 | 700 | $35 | 600 | $30 | 500 | $25 | 400 | $20 | 300 | Suppose that Belgium cocoa beans can be sold only in Europe. The European demand schedule for Belgium cocoa beans is as follows: Price of Belgium cocoa beans(per pound) | Quantity of Belgium cocoa beans demanded(pounds) | $40…

    • 525 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    unit 3 assignment 3

    • 854 Words
    • 3 Pages

    Chapter 3 Review 1. Which of the following is true about a TCP/IP network? A) The network uses only standards defined in TCP/IP RFCs. 2. Which of the following terms is not a common synonym for TCP/IP model? (Choose two answers.) D) TCP/IP mapping and C) Ethernet 3. Think generically about the idea of a networking standard, ignoring any particular standard or standards group. Which of the following is typically true of a standard? (Choose two answers.) B) It exists as a deployed network device…

    • 854 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Assignment

    • 472 Words
    • 2 Pages

    Mandy/Ian, In response to your memo concerning the importance of ASPEN and the tasks associated, you requested to hold individual conversations with employees with documentation concerning the use of ASPEN credits to support availability expectations. However, in completing this task, I noticed discrepant information between the report, ASPEN and EPR. In an attempt to understand why we were seeing differences in reports/systems, we spent time understanding gaps associated with the information…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 3 Assignment

    • 461 Words
    • 2 Pages

    ADOPT A STANDARD INVOICE NUMBERING CONVENTION A major cause of duplicate payments is multiple copies of the same supplier invoice being entered in the computer system, but with slight variations on the invoice number that keep the computer from flagging them as duplicate invoices. This is an especially common problem when suppliers issue invoices with leading zeros, since one data entry clerk may enter the zeros, while another may ignore them. It is also common for employee expense reports and…

    • 461 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Bes3500 Unit 3 Assignment

    • 2657 Words
    • 11 Pages

    Unit Plan Unit Code: BES3500 Unit title: Business Capstone Semester: Year: 2015 Study Mode: International Lecturer Information Name Office Telephone Email Consultation arrangements Table of Contents Lecturer Information 1 Unit Overview 3 Welcome 3 Learning outcomes 3 Graduate attributes 3 English language proficiency 3 Teaching and learning 4 Communication 4 Contacting your lecturer 4 Online discussion 5 Adobe Connect 5 Email protocol 5 Communication expectations 5 Readings 6 Textbook…

    • 2657 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 3

    • 1621 Words
    • 7 Pages

    for your kitchen sink, check out this model. It cost a lot less than other 1 HP units. Read the rest of the Waste King A1SPC review below: Product Mounting This model uses the new Waste King snap and lock mounting system. This universal mounting bracket has one benefit. It can replace any existing disposal that uses…

    • 1621 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Unit 3 Example Assignment

    • 1686 Words
    • 6 Pages

    Assignment: Learner information OCR Level 3 Health and Social Care Unit 3: Health, Safety and Security in Health and Social Care Assessor: CANDIDATE NAME: General Information for Learners Q Do I have to pass this assignment? A Yes. You must pass this assignment to achieve the full qualification. Q What help will I get? A Your tutor will help you when completing the OCR assignment and will make sure that you know what resources/facilities you need and are allowed…

    • 1686 Words
    • 6 Pages
    Powerful Essays