Preview

Unit 10 Discussion 1

Satisfactory Essays
Open Document
Open Document
156 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 10 Discussion 1
How might an anonymous logon affect a computer forensics investigation?
The biggest risk of anonymous accounts is that they allow anyone access to the system. In some cases, the default access granted to these accounts allows them to access data that they should not have access to view.
From a forensic standpoint it can make it almost impossible to trace who actually logged into the system and will be time consuming and hard to prove.

What are the possible implications of shared logons to digital forensics investigations?
The possible implications to digital forensics that would be associated with shared logons is that it would make it easy to plant digital evidence on an unsuspecting user’s account and help cover someone else’s tracks. And if you suspect a user of wrong doing, the user can claim that the account is a shared account and that anyone could have done what they were suspected of doing.

You May Also Find These Documents Helpful

  • Good Essays

    Without certain acts being put into place someone could easily take the information from one person and pretend to be them in a different place, either on the internet or within the work place. Repercussions could mean the user loses their job or money because it would look like they would be doing things they shouldn’t be.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Good Essays

    unit 10 review

    • 1120 Words
    • 5 Pages

    d. the relationship between excitation at the sarcolemma and release of calcium ions from the sarcoplasmic…

    • 1120 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Nt1230 Unit 10 Assignment

    • 409 Words
    • 2 Pages

    The company I choose is a small IT company. The company offers all the big major companies technical support. They have to backup client information, finical records, and employee’s information. The company would use the GFS scheme for backing up their information. The GFS scheme comes with a full month backup which is stored offsite, and a weekly and daily backup that is kept onsite as well as offsite. The weekly and daily backups are kept onsite for 30 days then are reused and recycled daily and weekly at the offsite location. The monthly backup that is secured offsite is kept for 3 years depending on the client. Presently for the…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 9 Assignment SC121

    • 907 Words
    • 9 Pages

    a. Values of maximal depolarization of membrane potential (mV) at different stimulation voltages, by location.…

    • 907 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    unit 5 assignment1

    • 309 Words
    • 2 Pages

    What type of install is the cable going into? Is everything in a fixed position? If you have an install where items are moved around without being disconnected, using highly flexible cable is necessary. Cables in these scenarios need to be flexible to meet those demands of mobility, and also for the life of the wire so that it does not crack, break, fray or short. We had a job at a university where we moved flat panels on a track system to create different screen sizes, and for that we had to make sure the cable would meet the demand.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Pt1420 Unit 3 Assignment

    • 298 Words
    • 2 Pages

    2. Consider the following two vectors: x =  1  and y =  1 .…

    • 298 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 59 Assignment 3

    • 645 Words
    • 3 Pages

    The process of how the subroutine works within an operating environment is as follows. While the main part of the program is running, there will be a call command sent to the CPU to tell it to stop wherever the program is at, store the W, Z and status along with where in the main program the CPU is at in the stack. Then the main program is cleared from memory and the subroutine is loaded for the CPU to start processing the code. Once the subroutine has finished, the subroutine code is deleted from memory and the CPU will load up the main program back on and will retrieve from stack the stored information (W, Z and status) which will allow the CPU know exactly where it needs to start from.…

    • 645 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 9 Assignment 1

    • 113 Words
    • 1 Page

    Baldeo Persaud NT 1330 Unit 9 Assignment 1 During the design phase: Define the scope of application of Group Policy. Determine the policy settings that are applicable to all corporate users. Classify users and computers based on their roles and locations. Plan desktop configurations based on the user and computer requirements.…

    • 113 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Using insecure custom administration interfaces, insecure configuration of files on the server, storing sensitive information in the clear text form, using overprivileged process accounts and service accounts…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    What about cost? We want to educate the reader on how cost plays a role.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ais Project

    • 1021 Words
    • 5 Pages

    Because if I don’t log off the system, someone may enter the system behind me and do something that I don’t want to do in my system.…

    • 1021 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Nut Task2

    • 1026 Words
    • 5 Pages

    Each user having personal log in names and passwords that are unique to them will maintain security. There will also be different user…

    • 1026 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Unit III Inquiry Task

    • 685 Words
    • 3 Pages

    The challenges someone overcomes in their life is what makes them who they are. College is where someone will be on their own for the first time, that is where they will first face true challenges. Michael McCaul is a famous politician who attended, Trinity University; who also faced major challenges throughout college and later on in life.…

    • 685 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    a. Clickable text, graphics, or other Web page elements that point to additional data on the Web…

    • 419 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    student

    • 795 Words
    • 3 Pages

    Remote access Domain: infected people connecting to the network can affect to whole network or someone giving other people connectivity without the right credentials.…

    • 795 Words
    • 3 Pages
    Good Essays