Programming > QUESTIONS & ANSWERS > Asia Pacific University of Technology and Innovation AICT 006 AdmiralClover1085 (All)
Table of Contents 1.0 Introduction.................................................................................................................................4 2.0 Task 1: Vulnerability Scannin... g and Assessment........................................................................5 2.1 Introduction of vulnerability assessment...............................................................................5 2.2 Methodology.............................................................................................................................6 2.3 Tool Selection...........................................................................................................................8 2.4 Vulnerability Identification: MS08-067 | Wong Yao Chang................................................11 2.5 Vulnerability Identification - | Gan Jin Hao........................................................................13 2.6 Vulnerability Identification: MS17-010 | Yap De Lin..........................................................15 3.0 Task 2: Patch Vulnerability.......................................................................................................17 3.1 Discussion of Vulnerability: MS17-010................................................................................17 3.2 Ways to Patch MS17-010.......................................................................................................20 3.3 Countermeasure of MS17-010..............................................................................................23 4.0 Task 3: Digital Forensic Investigation Scenario......................................................................26 4.1 Memory Image | Yap De Lin.................................................................................................26 4.1.1 Evidence gathering strategy and method.....................................................................26 4.1.2 Step by step Data Gathering.........................................................................................27 4.1.3 Discussion on the forensics value of collected data......................................................31 4.1.4 Personal Reflection........................................................................................................32 4.2 Hard disk Image | Gan Jing Hao..........................................................................................33 4.2.1 Evidence gathering strategy and method.....................................................................33 4.2.2 Step by step Data Gathering.........................................................................................34 4.2.3 Discussion on the forensics value of collected data......................................................43 4.2.4 Personal Reflection........................................................................................................44 4.3 System Live Analysis| Wong Yao Chang..............................................................................45 4.3.1 Evidence gathering strategy and method.....................................................................45 4.3.2 Step by step Data Gathering.........................................................................................46 4.3.3 Discussion on the forensics value of collected data......................................................57 4.3.4 Personal Reflection........................................................................................................58 5.0 Conclusion..................................................................................................................................59 6.0 References..................................................................................................................................60 7.0 Appendix....................................................................................................................................64 7.1 Workload Matrix...................................................................................................................64 7.2 Nessus Essential Scanning Report about VMware..............................................................65 7.3 Rapid 7 Insight Scanning Report about VMware...............................................................65 1.0 Introduction [Show More]
Last updated: 2 years ago
Preview 1 out of 64 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Nov 30, 2022
Number of pages
64
Written in
This document has been written for:
Uploaded
Nov 30, 2022
Downloads
0
Views
163
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·