Programming > QUESTIONS & ANSWERS > Asia Pacific University of Technology and Innovation DSF AICT006 KidComputerStork16 (All)
Table of Contents Workload Matrix ................................................................................................................................ 3 Introduction ....................... .................................................................................................................... 4 1.0 Task 1: Vulnerability Scanning and Assessment........................................................................ 5 1.1 Introduction..................................................................................................................................... 5 1.2 Design scanning method ................................................................................................................. 5 1.3 Vulnerability assessment................................................................................................................. 6 1.4 Conclusions..................................................................................................................................... 8 2.0 Task 2: Patch Vulnerability ......................................................................................................... 9 2.1 Introduction..................................................................................................................................... 9 2.2 Detailed Research on Selected Vulnerabilities.............................................................................. 10 2.3 Patching ........................................................................................................................................ 13 2.4 Countermeasure ............................................................................................................................ 14 2.5 Conclusions................................................................................................................................... 15 3.0 Task 3: Digital Forensic Investigation Scenario ....................................................................... 16 3.1 Introduction................................................................................................................................... 16 3.2 Memory Image (Ling Hang Ong) .............................................................................................. 16 3.2.1 Strategies to Gather Data ........................................................................................................... 16 3.2.2 Forensic Tools Chosen............................................................................................................... 17 3.2.3 Step-by-Step Data Gathering Processes..................................................................................... 18 3.3 Hard Disk Image (Leong Chee Shen)........................................................................................ 28 3.3.1 Strategies to Gather Data ........................................................................................................... 28 3.3.2 Forensic Tools Chosen............................................................................................................... 29 3.3.3 Step-by-Step Data Gathering Processes..................................................................................... 29 3.4 Live Data Gathering (Theebhan)............................................................................................... 32 3.4.1 Strategies to Gather Data ........................................................................................................... 32 3.4.2 Forensic Tools Chosen............................................................................................................... 33 3.4.3 Step-by-Step Data Gathering Processes..................................................................................... 34 3.6 Main Conclusion ......................................................................................................................... 42 References.......................................................................................................................................... 43 DSF GROUP ASSIGNMENT AICT006-4-1-DSF 3 Workload Matrix Task Workload Matrix 33.33% 33.33% 33.33% Introduction 100% - - Methodology and Tool Selection 100% - - Vulnerability assessment 33.33% 33.33% 33.33% Patching and Countermeasure 33.33% 33.33% 33.33% Detailed Research on Selected Vulnerabilities 33.33% 33.33% 33.33% Evidence Gathering Strategy and Method 33.33% 33.33% 33.33% Memory Image - 100% [Show More]
Last updated: 2 years ago
Preview 1 out of 45 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Nov 30, 2022
Number of pages
45
Written in
This document has been written for:
Uploaded
Nov 30, 2022
Downloads
0
Views
70
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·