Assignment 7 - Security in Networks
Hands-on Activity
(DUE April 11, 2003 by midnight EST)
Computer Forensics
"Cybercrime and the use of information technology to facilitate criminal activity is a never-ending race of evolving threats and responses. Almost all crimes affecting businesses involve a computer system which is used as a virtual filing cabinet or the actual instrument of a crime....the vast majority of documents and other recorded information now exist in digital form....Security professionals and investigators must not only know how to respond to an incident, but also need to have the proper tools to aid them in handling digital evidence in a timely and effective manner." Encase pamphlet from Guidance Software.
"The AccessData Forensic ToolkitTM (FTKTM) offers law enforcement and corporate security professionals the ability to perform complete and thorough computer forensic examinations. The FTK features powerful file filtering and search functionality. FTK's customizable filters allow you to sort through thousands of files to quickly find the evidence you need. FTK is recognized as the leading forensic tool to perform e-mail analysis."

Pre-assignment:

  1. Download and install a copy of the Forensic Toolkit:
    http://www.accessdata.com/Product04_Download.htm?ProductNum=04
  2. Download and install a copy of the Known File Filter (KFF) Library from the same location.
  3. Download the image file
    http://csc.ColumbusState.edu/summers/NOTES/6126/labs/image3.zip
    (15 M compressed; 43M compressed).
  4. Run FTK (Forensic Toolkit) and explore the different options.

Assignment:

Post-assignment: SUBMIT TO DROP-BOX in eCollege.

  1. Submit answers to questions from Part 1 and 3.
  2. Submit reports from Part 2 and 4.
  3. Answer the following questions:

Discussion Questions

  1. (DUE April 9, 2003 by midnight EST) Select one of the following questions to discuss in detail through the threaded discussion.
  2. (DUE April 14, 2003 by midnight EST) Select a discussion from one or more of your classmates and respond to their comments.

Webliography Assignment
(DUE April 14, 2003 by midnight EST) Submit to the class Webliography 5 annotated links related to network security. These will be added to our Information Assurance E-library (http://csc.ColumbusState.edu/summers/e-library/security.html) You will receive 1 point if just a new link; 1 point if annotation for one of my links; or 2 points if a new annotated link.