Question

In: Computer Science

Computer System Forensics course a long and comprehensive explanation by typing please 1.What are some notable...

Computer System Forensics course

a long and comprehensive explanation by typing please

1.What are some notable differences between Windows forensics and Linux forensics?

2.Name some popular shell commands that can be considered very useful for forensic investigations.

intrusion detection course

3.Discuss 3 issues threatening web applications

Solutions

Expert Solution

1. Differences between Windows and linux forensics:

(a) Linux gives complete access to the source code for the users whereas never gives access to the code until you are a member of its specific group.

(b) With a Linux GPL-licensed operating system, you are free to modify that software and use and even republish or sell it . But with windows operating system, you cannot do any of this because you have to purchase the licenses.

(c) If you wanted to install Linux on a machine you had to make sure you hand-picked each piece of hardware or your installation would not work 100 percent. But with windows, you know that most every piece of hardware will work with the operating system.

2. Shell commands useful for forensic investigations:

(a) Isattr command - this can be used to find immutable objects that can't be deleted.

(b) ls command - this can be used to list information about Linux files and directories created on the system.

(c) find command - this can be used to find hidden directories, determine ownerless files and directories, locate recently modified files.

3. Issues threatening web applications:

(a) The presence of malware is one of the most common threats that companies mostly have to guard against. These types of attacks come in a variety of different injection types and are primed to attack the data in web applications since web applications require data to function.

(b) Injection attacks are another common threat to be on the lookout for. These types of attacks come in a variety of different injection types and are primed to attack the data in web applications since web applications require data to function.

(c) Phishing scam attacks are usually involved and interfere directly with email marketing efforts. These types of threats are designed to look like emails that are from legitimate sources, with the goal of aquiring sensitive information like login credentials, bank account numbers, credit card numbers etc.


Related Solutions

Firewalls & Network Security course FIREWALL BASICS a long and comprehensive explanation by typing please 1.WHAT...
Firewalls & Network Security course FIREWALL BASICS a long and comprehensive explanation by typing please 1.WHAT ARE FIREWALL ENHANCEMENTS? 2.WHAT CONSTITUTES GOOD FIREWALL RULES? Enumeration ENUMERATE WINDOWS OS TARGETS AND SERVICES?
intrusion Detection course a long and comprehensive explanation by typing please Why is wireless security important?...
intrusion Detection course a long and comprehensive explanation by typing please Why is wireless security important? Explain the significance of wireless security. Name 3 attacks relevant to wireless security and how to protect against them.
Desktop and Server OS Vulnerabilities a long and comprehensive explanation by typing please 1.IDENTIFY SPECIFIC VULNERABILITIES...
Desktop and Server OS Vulnerabilities a long and comprehensive explanation by typing please 1.IDENTIFY SPECIFIC VULNERABILITIES AND EXPLAIN WAYS TO FIX THEM 2.EXPLAIN WHAT RED HAT IS OS. TO LINUX WHAT DOES RED HAT DO?
please i need a computer typing answer with details as possible 1-What is a substrate (futile)...
please i need a computer typing answer with details as possible 1-What is a substrate (futile) cycle? Describe an example of a pathology that develops from a substrate cycle.
For the computer forensics case, identify what evidence the forensics experts were able to gather. What...
For the computer forensics case, identify what evidence the forensics experts were able to gather. What important questions should the security incident response form answer. Why is it important to include a time/date stamp in the security incident response form?
What are the causes of long-term economic growth? (I want the answer computer typing NOT handwriting)
What are the causes of long-term economic growth? (I want the answer computer typing NOT handwriting)
word typing, please. make it long and with examples. Q1. What is the Concept of One-Way...
word typing, please. make it long and with examples. Q1. What is the Concept of One-Way ANOVA; assumptions, when to use it, and its applications? Q2. what is the concept of Parametric vs NonParametric
please i want computer typing answer for A and B The following techniques will be used...
please i want computer typing answer for A and B The following techniques will be used for purification of an enzyme from cultured cells; salt fractionation, affinity chromatography, ion-exchange chromatography, homogenization and gel filtration chromatography. The protocol states that the techniques should be used in the order listed above. a) What is wrong with the order of techniques as they are listed? b) How does each technique contribute to the process of obtaining a pure enzyme?
What are some trends or recent advancements in bioterrorism/microbial forensics?
What are some trends or recent advancements in bioterrorism/microbial forensics?
please I need a computer typing answer Glycosylation increases the structural diversity of the glycome and...
please I need a computer typing answer Glycosylation increases the structural diversity of the glycome and proteome. Discuss the structural differences between proteoglycans and mucins. What is the functional significance of each glycoprotein in cartilage formation and the mucosal environment of the body, respectively?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT