computer employed by the employee provides either

Category: Technology,
Words: 652 | Published: 12.26.19 | Views: 555 | Download now

Computer system Viruses

Computer system Network, Computer Science, Home windows 7, Computer programs

Excerpt coming from Essay:

computer used by the employee provides either been compromised physically with a password cracking software (EC-Council, 2010; Beaver McClure, 2010) or it has bee compromised slightly with the help of a keylogging software. A keylogger is known by APWG (2006) as a special crimeware code that is meant with the single intention of collecting information from the end-user terminal. The stolen details includes every single strike in the keyboard which usually it catches. The most delicate of the captured information would be the user’s qualifications. Keylogger may also be used to refer for the hardware used for this purpose. The employee’s password can also have been shoulder-surfed by his immediate neighbor at the office. This could be his coworker who have manages to peek and see over his shoulder when he types in sensitive authentication information (password)

Strategy to talk about the issue plus the necessary actions for fixing the issue

The strategy for responding to this menace is the usage of a physical and software-based security system intended for the computer network. This is to state that the software program must be anchored using a quite strong and effective anti-virus software. Anti-spyware must be set up and up-to-date frequently to be able to detect virtually any keyloggers. Actually, the computer should be checked for almost any physical keyloggers that may be mounted on any of the UNIVERSAL SERIAL BUS ports, mouse button and key pad ports as well as under the keyboard. It is worth noting that keyloggers can be hidden in almost any part of the computer so long as there is a data shuttle bus. The issue could be resolved by simply instituting the right information Technology insurance plan at the place of work that discourages the installation of unapproved software and hardware (Can be handicapped by the use of appropriate policies that govern administrative rights).

Case Project 7-2:

The features of Guidance Software EnCase

According to Advice Software (2008), the digital forensics computer software Guidance Software program EnCase has several features. These features include;

Data/Information Acquisition.

Purchase granularity

This kind of feature enables the specs of the total numbers of industries that have to be zeroed after when an mistake is found. The acquisition masse functionality identifies the size of obstruct to be obtained. The files are bought with proof of files, directories via shoe disk and RAM facts.

Automation tools that helps inside the speeding up in the process of investigation. The software process performs filters with conditions, equipment analysis, canton recovery along with recovery of deleted documents.

Analysis characteristic

This characteristic employs Windows even record parser, Link file parser (for obtaining space which is unallocated), functions an analysis of the file system, hash research as well as file finder function for finding data in the space which is unallocated.


This kind of feature includes a native viewers function which can handle a lot more than four hundred file formats, provides a built-in Computer registry viewer, bundled viewer intended for pictures. External file audience as well as a schedule calendar viewers.

A feature pertaining to searching Unicode index

Confirming feature which can be automated

This feature information on every file found in a case, log statement, registry, prevalence report as well as a data exportation feature in to HTML or perhaps RTF formats.

The other features will be internet and e-mail research feature as well as

< Prev post Next post >