Project
Name
Course Title
Course Code
Submission Date
One
The article is direct to the point regarding the
issue of communication when it comes to incident response team. The task
involves trying to solve a problem after a breach into the network as occurred.
The team should be able to understand each other as it has been specified by
the writer. The writer perfectly addresses the future of computers and goes to
the depth of even giving an example of a movie which tries to give a picture of
how the future will look like. The future of technology with perfect
utilization of huge data available will bring different advantages to us.
Two
According to the writer computer forensic keeps on
changing and growing every single day. It is a fact which I as an individual agree
with. The computer forensic field keeps growing every single day and as a
result an individual needs to keep on researching and reading new materials.
The writer also highlights the issue of certificate and experience which is
required to work in the computer forensic field. The aspect of block chain
technology used by cryptocurrencies such as Bitcoin is a mirror of how our
future will look like. The technology gives additional security to the system
which makes it impossible to get into the system.
Three
According to the writer the incident response team
should be equipped with necessary personal knowledge to handle the challenge
which is brought around with the task. They should posses’ personal technical
skills to handle different types of breaches into the network. They should also
be able to communicate perfectly. This will enable the team members to reduce
the risk of the hack by mitigating the issue quick. The writer also highlights the impact which
computer forensic has brought to the world. The application of the computer
forensic to the general technology world also is a part which is critical in
ensuring security.
Four
The writer highlights the key logger type of attacks
which keeps tracks of all keyboard strokes and sends it to the attacker. They exist
in both software and hardware types, the one which is the most dangerous is the
software type. This is because it is very hard to detect making unless an
antivirus scan Is conducted. The hardware can be detected physically and hence
it can be removed. Black box testing is conducted without prior information
about the network and it is conducted by hackers while white box testing is
conducted by security officers with an aim of testing the network. Port
scanning can be stopped using different security installations has put across
by the writer. Port scanning can be divestating
to a network when done to get
Five
Antivirus and anti-malwares are the first line of
defense but they don’t detect every threat towards a computers system as
implied by the writer. Some threats are physical and are to be detected through
a physical security sweep which is tasked to look for the threats and delete
them. These kind of physical threats exist as mostly key loggers which track
all the key strokes made on a computer system. Black box testing popular among
hackers is done without knowing the logic behind how the system operates the
attacker has no knowledge about how the network work which makes it a black box
testing. A white box testing the attacker knows how the system works and tries
to test if they can withstand a real attack from hackers. Port scan is stopped
by installing a good security system such as intrusion prevention system, intrusion
detection system and a good firewall.
Six