Verified Document

Computer Used By The Employee Has Either Essay

¶ … computer used by the employee has either been compromised physically with a password cracking software (EC-Council,2010;Beaver & McClure,2010) or it has bee compromised remotely with the help of a keylogging software.A keylogger is noted by APWG (2006) as a special crimeware code that is designed with the sole intention of collecting information from the end-user terminal. The stolen information includes every strike of the keyboard which it captures.The most sensitive of the captured information are the user's credentials. Keylogger may also be used to refer to the hardware used for this purpose. The employee's password could also have been shoulder-surfed by his immediate neighbor at the workplace. This could be his coworker who manages to peek and see over his shoulder as he types in sensitive authentication information (password) Strategy to address the issue as well as the necessary steps for resolving the issue

The strategy for addressing this threat is the adoption of a physical and software-based security system for the computer network. This is to say that the software must be secured using a very strong and effective anti-virus software. Anti-spyware must also be installed and updated frequently in order to detect any keyloggers. Physically, the computer must be checked for any physical keyloggers that may be attached to any of the USB ports, mouse and keyboard ports as well as under the keyboard. It is worth noting that keyloggers may be hidden in virtually any part of the computer system so long as there is a data bus. The issue can be resolved by instituting an appropriate information Technology policy at the workplace that discourages the installation of unapproved software and hardware (Can be disabled by the use of appropriate policies that govern administrative rights).

Case Project...

These features include;
Data/Information Acquisition.

Acquisition granularity

This feature allows the specification of the total numbers of sectors that have to be zeroed upon when an error is found. The acquisition bloc functionality defines the size of block to be acquired. The files are acquired with evidence of files, folders via boot disk and RAM evidence.

Automation tools that helps in the speeding up of the process of investigation. The automation process performs filters with conditions, hardware analysis, partition recovery as well as recovery of deleted files.

Analysis feature

This feature employs Windows even log parser, Link file parser (for finding space which is unallocated), performs an analysis of the file system, hash analysis as well as file finder function for finding files in the space which is unallocated.

Viewers

This feature has a native viewer function which can handle more than four hundred file formats, has a built-in Registry viewer, integrated viewer for pictures. External file viewer as well as a timeline calendar viewer.

A feature for searching Unicode index

Reporting feature which is automated

This feature reports on all the files found in a case, log report, registry, incidence report as well as a data exportation feature into HTML or RTF formats.

The other features are internet and e-mail investigation feature as well as support by most operating systems.

Access Data FTK

Access Data's Forensic Toolkit (FTK) is effective in computer forensics worldwide…

Sources used in this document:
References

Anti-Phising Working Group (2006). Phishing Activity Trends Report

http://www.antiphishing.org/reports/apwg_report_feb_06.pdf

Bem, D and Huebner, E (2007).Computer Forensic Analysis in a Virtual Environment. International Journal of Digital Evidence .Fall 2007, Volume 6 (2)

http://www.utica.edu/academic/institutes/ecii/publications/articles/1C349F35-C73B-DB8A-926F9F46623A1842.pdf
http://www.dataexpert.nl/files/downloads/EnCase%20Forensic%20Features.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Problems With the the Computer Fraud and Abuse Act
Words: 1222 Length: 4 Document Type: Term Paper

Computer Fraud and Abuse Act A failed and flawed law Technology has changed faster than the laws that exist to protect the public. Protecting information, particularly sensitive government information, was thought to be challenging and to pose additional dilemmas in terms of its regulation. With this in mind, Congress passed the Computer Fraud and Abuse Act in 1984. The CFAA "outlaws conduct that victimizes computer systems. It is a cyber-security law. It

Employee Privacy Torts
Words: 7119 Length: 25 Document Type: Research Paper

Employee Privacy Torts Issues relating to employee privacy have been at the forefront of businesses for many years. This has been fuelled by the dynamic workplace which changes constantly and also by employees and employers being more litigation-conscious. Technology has also spurred on employee privacy issues with e-mail and the internet being related to heightened concerns about vulnerability of employers to litigation. Many employers have thus exacerbated their concerns relating to

Computer Security: Corporate Security Documentation Suitable for
Words: 5280 Length: 19 Document Type: Essay

Computer Security: Corporate Security Documentation Suitable for a Large Corporation Item (I) in-Depth Defense Measures (II) Firewall Design (III) Intrusion Detection System (IV) Operating System Security (V) Database Security (VI) Corporate Contingency of Operation (VII) Corporate Disaster Recovery Plan (VIII) Team Members and Roles of Each (IX) Timeline with Goal Description (X) Data Schema (XI) Graphical Interface Design (XII) Testing Plan (XIII) Support Plan (XIV) Schematics Computer Security: Corporate Security Documentation Suitable for a Large Corporation (I) In-Depth Defense Measures Information Technology (IT) Acceptable Use Policy The intentions of

Employee Privacy Torts
Words: 8246 Length: 25 Document Type: Research Paper

Employee Privacy Torts History of Employee Privacy Changing Trends of Employee Privacy Impact of Innovative Technology on Employee Privacy Role of Social Media towards Employee Privacy Impact of Changing Community/Society on Employee Privacy Adaptation to the new Environment pertaining to Employee Privacy Employee Monitoring and Surveillance Laws and Employer Policies for Text Messaging and Social Media Electronic Communication Privacy Act Monitoring of Employee Conversations over Telephone & Email Recommendations for creating Effective Policies Future Implications of Employee Privacy As years have passed and

Employee Relations Develop a Strategy Specific to
Words: 1831 Length: 5 Document Type: Essay

Employee Relations Develop a strategy specific to your organization for integrating job performance and training. Job performance is an integral aspect within the health care services industry's overall. For one, it holds both associates and management accountable for their respective actions. This accountable provides a means of deterring any subpar performance on the part of employees who might otherwise be a detriment to the overall operations of the firm. By linking job

Computer Network for Bistro Bookstore Computer Network
Words: 1357 Length: 5 Document Type: Essay

Computer Network for Bistro Bookstore Computer Network Planning for Bistro Bookstore Launching a new bistro and bookstore is going to require three specific tasks be completed to ensure the stability, security and continued reliability of the network which over time will become the backbone of the information system and infrastructure of the store. These three tasks include the development of the new network, defining and implementing best practices and procedures for ensuring

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now