Monday, January 7, 2013

Self Reflection #2



The 307 course had helped me become more aware of my weaknesses and also gave me the recommended tools to strengthen them. It also helped me understand how I could become a more effective in writing resume and cover letters. I always expect a higher quality of my work, since this course was a lot of work, but it was totally worth it.

What I like about this course is that it teaches me a skill and then let me puts it into practice. It is very useful for students transitioning from college to the working field.  Moreover, I mostly enjoyed the resume and interview sections. I am now more effective in writing as a result of my work in this course, and I am now aware of the importance of considering the audience I am targeting. I am also aware of the ways to properly structure documents. In addition, students can learn a lot if they are willing to take criticism that it is not personal but as a way to help them. I also realized in this course by writing in professional manner and in my resume that I have made many mistakes, and this course helped me change that. Finally, the group project also helped me realize my own strengths and weaknesses regarding my writing skills and teamwork skills by working in a group environment. I am more aware of knowing what my message is when writing and the group projects had shown us our communication skills with each other as a group.

In conclusion, this course has been a great help in starting my pathway to a successful career. The part of the course about cover letters and resumes could be really useful for my future career.

Digital Forensics Processes (Report)



There are three categories of data in digital forensics that we are associated with; active, archival, & latent data

 

Active Data is the information that we can really see. This contains applications, and files that are used by the operating system (OS). This is by far the easiest sort of data to gain. Archival Data is data that has been stored and backed up. Such as; floppy disks, CDs, DVDs, tapes, or even entire hard disk drives (HDD). Latent Data is the information that a person normally needs specified tools to access. For instance information that has been erased or overwritten is considered latent data.

A digital investigation could include considering all of these categories, depending on the conditions. Gaining latent data is time consuming and very expensive. Digital forensics is all about gaining the evidence of a crime or breech of policy. It centers on gaining evidence of an illegal misuse of computers in an approach that could lead to the trial of the criminal. However, if there is a problem, it is best to act fast since digital evidence is unstable and can be eagerly damaged. It is also better to know for sure than to threat potential concerns. If a potential problem is uncovered, it may be wise to search for private guidance from a Qualified Forensic investigator before choosing a solution. Managing this condition alone is a dangerous approach which may have extensive effects. If in-house staff is a must, start with the basics of evidential integrity and do not be drawn to the usage of shortcuts.

When performed properly, the forensic examination of computer systems involved in misuse can offer valuable evidence which could otherwise have been misplaced or ignored. Carried out incorrectly, and your evidence might give wrong parties the chance to get a case discharged.


Phases in the Forensic Investigation Process

Digital forensic investigations should always be led by a Qualified Digital Forensic Investigator. They will use licensed tools to avoid spoiling of the evidence and guarantee its legitimacy in court. The six phases involved for a computing examination are:

Phase 1
Establish a chain of custody. The Investigator is aware all the time where any item linked to the investigation are placed. Use a looker or safe frequently to secure objects.

Phase 2
Classify all related information, including active, archival, and latent data. Recover information that has been erased to any extent possible. Identify password-protected information and encoded information, along with whatever that point toward attempts to hide or complicate data. Keep the integrity of the original media to the highest point possible, which means that the original basis of information should not be changed. Make an exact copy of a HDD image is and authenticate that image alongside the original to make sure that it is indeed the same.

Phase 3
Gain additional bases of information as the conditions dictate. This contains firewall, Kerberos & proxy server logs.

Phase 4
Examine and understand the information to decide potential evidence. Search for both inculpatory (did it) and exculpatory (did it not) evidence. If proper, crack password protected files and encoded files.

Phase 5
Submit a written report to the client with the investigator’s outcomes and notes. This is considered the most important phase and it contains the work of the investigator in the four previous phases

Phase 6
If required, the investigator should deliver professional witness testimony at a trail, hearing, or any other legal proceeding.


The information delivered in this report covers the fundamentals, and does not necessarily do complete justice to all aspects of digital forensics. Nevertheless, this should provide a better understanding of what phases are engaged in the process.