Monday, January 7, 2013

Self Reflection #2



The 307 course had helped me become more aware of my weaknesses and also gave me the recommended tools to strengthen them. It also helped me understand how I could become a more effective in writing resume and cover letters. I always expect a higher quality of my work, since this course was a lot of work, but it was totally worth it.

What I like about this course is that it teaches me a skill and then let me puts it into practice. It is very useful for students transitioning from college to the working field.  Moreover, I mostly enjoyed the resume and interview sections. I am now more effective in writing as a result of my work in this course, and I am now aware of the importance of considering the audience I am targeting. I am also aware of the ways to properly structure documents. In addition, students can learn a lot if they are willing to take criticism that it is not personal but as a way to help them. I also realized in this course by writing in professional manner and in my resume that I have made many mistakes, and this course helped me change that. Finally, the group project also helped me realize my own strengths and weaknesses regarding my writing skills and teamwork skills by working in a group environment. I am more aware of knowing what my message is when writing and the group projects had shown us our communication skills with each other as a group.

In conclusion, this course has been a great help in starting my pathway to a successful career. The part of the course about cover letters and resumes could be really useful for my future career.

Digital Forensics Processes (Report)



There are three categories of data in digital forensics that we are associated with; active, archival, & latent data

 

Active Data is the information that we can really see. This contains applications, and files that are used by the operating system (OS). This is by far the easiest sort of data to gain. Archival Data is data that has been stored and backed up. Such as; floppy disks, CDs, DVDs, tapes, or even entire hard disk drives (HDD). Latent Data is the information that a person normally needs specified tools to access. For instance information that has been erased or overwritten is considered latent data.

A digital investigation could include considering all of these categories, depending on the conditions. Gaining latent data is time consuming and very expensive. Digital forensics is all about gaining the evidence of a crime or breech of policy. It centers on gaining evidence of an illegal misuse of computers in an approach that could lead to the trial of the criminal. However, if there is a problem, it is best to act fast since digital evidence is unstable and can be eagerly damaged. It is also better to know for sure than to threat potential concerns. If a potential problem is uncovered, it may be wise to search for private guidance from a Qualified Forensic investigator before choosing a solution. Managing this condition alone is a dangerous approach which may have extensive effects. If in-house staff is a must, start with the basics of evidential integrity and do not be drawn to the usage of shortcuts.

When performed properly, the forensic examination of computer systems involved in misuse can offer valuable evidence which could otherwise have been misplaced or ignored. Carried out incorrectly, and your evidence might give wrong parties the chance to get a case discharged.


Phases in the Forensic Investigation Process

Digital forensic investigations should always be led by a Qualified Digital Forensic Investigator. They will use licensed tools to avoid spoiling of the evidence and guarantee its legitimacy in court. The six phases involved for a computing examination are:

Phase 1
Establish a chain of custody. The Investigator is aware all the time where any item linked to the investigation are placed. Use a looker or safe frequently to secure objects.

Phase 2
Classify all related information, including active, archival, and latent data. Recover information that has been erased to any extent possible. Identify password-protected information and encoded information, along with whatever that point toward attempts to hide or complicate data. Keep the integrity of the original media to the highest point possible, which means that the original basis of information should not be changed. Make an exact copy of a HDD image is and authenticate that image alongside the original to make sure that it is indeed the same.

Phase 3
Gain additional bases of information as the conditions dictate. This contains firewall, Kerberos & proxy server logs.

Phase 4
Examine and understand the information to decide potential evidence. Search for both inculpatory (did it) and exculpatory (did it not) evidence. If proper, crack password protected files and encoded files.

Phase 5
Submit a written report to the client with the investigator’s outcomes and notes. This is considered the most important phase and it contains the work of the investigator in the four previous phases

Phase 6
If required, the investigator should deliver professional witness testimony at a trail, hearing, or any other legal proceeding.


The information delivered in this report covers the fundamentals, and does not necessarily do complete justice to all aspects of digital forensics. Nevertheless, this should provide a better understanding of what phases are engaged in the process.

Thursday, November 15, 2012

Self Reflection


The meeting was on the 2012/11/4 at ADMC. It began at 3:40 PM and ended at 4:10 PM.The leader of the group was Ahmad Taleb, the minute's taker is Hussain. Jasem, salem and Khalid were the members. Our group subject was about increase sense of belonging at ADMC.

The leader started the meeting, we first observed the agenda and we considered the causes of why many students don’t attend there classes most of the time. Jasem has appointed the fact that a lot of students find their classes a bit boring. Khalid discussed that students have creative thoughts but they usually don’t want to show them, because they got bored of the day-to-day routine. We got some solutions for these problems. Khalid decided to make an open day for the students. For example, we could create an open day in weekends or every month. The other idea was to go in few tours each semester.

In conclusion, if the administration can apply these recommendations, most students will be pleased and will enjoy going to their classes rather than be cranky all the time.

Meeting minutes




Date of meeting: 4th Nov 2012
Time of meeting: Start at: 3:40; Finish at: 4:10
Venue: W104


Memebers:    
 Ahmad Taleb (Chair);
                      Hussain Omar (Minutes taker);
                      Khalid Al Hammadi;  Jasem Al Hammadi
                      Salem Mohammed


    Our Meeting was about increasing sense of belonging at ADMC.


The first point we discussed was about establishing clubs and trips
-          Jasem  suggested to make an open day for students
-          Khalid proposed that the open day should differ from week to week
-          They also suggested to make events and tournaments between other colleges


The next points were about building facilities and creating a social website

       -    Jasem proposed that the facilities should be also be open for family members
       -     Khalid suggested that when building a social website it should also include communications b           between students and ADMC staff


Action Points:
-          The chairman gave tasks for Jasem and Khalid
-           Jasem was assigned to choose the most suitable way for us to collecting carnation
-          Khalid was assigned to collect information after Jasem choose the appropriate may
-          Hussain was tasked to send those information to the chairman


Wednesday, November 14, 2012

Meeting Agenda



Date of meeting: 4th Nov 2012
 
Time of meeting: Start at: 3:40; Finish at: 4:10
Venue: ADMC – W104
Group member’s Roles:
Chair:
Ahmed
Minutes taker:
Hussain
Participants:
Jasem – Salem – Khalid
Venue preparation: Drinks – Desk – Chairs – Papers – Pens


Agenda:  Future campus expansion for ADMC

  1. New future facilities
  2. Internal campus expansions for ADMC:
  • Special rooms for majors
  • Libraries for specific subjects
  • New auditorium building better Wi-Fi
  • better secured emvironment


Objective(s):

+Action Points

This meeting is to discuss how we can build a better and bigger campus for ADMC.

[Product] = Organize research committees to do research on the external or internal expansions