Tuesday, May 14, 2019

Forensic Evidence Analysis Research Paper Example | Topics and Well Written Essays - 750 words

Forensic Evidence Analysis - Research Paper ExampleThe primary mark is to distribute the dissimilar and criteria based key search process to every workstation on the net profit. Likewise, users will non complain for every issue related to operating system performance, as DNA client completely consumes the unused processor time (Decryption & password cracking softw be, n.d). Likewise, if more than one or many processors are used at the same time, result will come fast. Moreover, if a processor has two or more cores, performance increases accordingly. DNA has two modes i.e. consecrate or non-dedicated and these modes are applied on the workstations. The dedicated mode requires a workstation that will exclusively utilize DNA network with no other tasks combine except the DNA password recovery that is a primary job. On the other hand, non-dedicated mode requires a workstation that will be used for other tasks as well. For instance, after working hours, workstations are available fo r use. These workstations shadower be assigned to DNA for contributing valuable computational efforts that are required for password recovery. If many workstations contribute to a password recovery process, a single workstation has the capability of analyzing 1000000 passwords per hours, and 24000000 passwords in 24 hours respectively. Lets suppose, DNA is using only 10 workstations on a non-dedicated mode for salutary 14 hours per day, the results will be 140,000,000 passwords for the same 24 hours with the increase of approximately six times than the earlier one. Moreover, if more machines are added, a result for password recovery improves. However, workstation must be on the network and will be able to resolve the IP address so that the DNA server cigarette establish connectivity to the DNA client. Workstations connect to the DNA server via DNA client and form a bundle up for testing more passwords in less time. Products related to DNA provide statistical information in the form of graphs and has the capability to add user dictionaries and customize them according to the requirements. Moreover, customization is also available for password attacks in explicit languages. Furthermore, DNA products also possess the feature of stealth client installation functions and automatic updates on DNA client from the DNS server. File formats that are supported includes spread sheet formats, PDF, data compression formats etc. Network security audit Vulnerabilities or weaknesses that is probable to disrupt network services can be categorized in to interception, availability and access predicts. The interception category focuses on the data that is transmitted by utilizing a carrier or equipment over the network (Approach to auditing network security , n.d). The transmission conducted by these carriers and equipment can be interrupted and produce a risk of adverse discovery that can be related to recrudesce in integrity of data. Secondly, availability is concerned w ith the expansion of networks and more remote sessions are created to the internal applications, any disruption in availability of network services will impact business operations. Thirdly, access point is related to weak access point will allow a threat to penetrate inside the network and disrupt or destroy confidential information available on mission vituperative systems (Approach to auditing network security , n.d). Focusing on the 3 categories, auditors will examine aspects of physical security

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.