ISSC451_Week7_discussion

.docx

School

American Military University *

*We aren’t endorsed by this school

Course

451

Subject

Information Systems

Date

Jan 9, 2024

Type

docx

Pages

2

Uploaded by fighters18jfighters18j

Report
Hello everyone, Explain the process used to preserve the verifiable integrity of digital evidence. How does this ensure that data is preserved unmodified? How can an analyst show that the original evidence is modified? There are two types of digital data. It could be static, in the sense that it is held on physical memory devices such as hard drives, CDs, and other memory storage devices. It could be dynamic, meaning that the information is flowing over a channel, such as the internet (Awuson, et al, 2021). If a file has been shared among groups and other active members, it will be moving from one network or device to another. If it is a part of an inquiry in any situation, it is critical to maintain its integrity. In an age when so much data is stored in the cloud, maintaining the integrity of data for investigation purposes has become more difficult and requires active participation from the organizations that provide these services. The first step in maintaining data integrity is to establish an effective chain of custody. A good chain of custody ensures that data is handled properly during the collection and processing stages (Chopade, et al, 2019). Personnel gathering digital evidence must preserve proper documentation that demonstrates the health of the information at various levels of processing. Information is also copied byte for byte. This aids in the recovery of all information if some or all of it is lost or corrupted. Investigators can also employ specialized software to maintain information integrity (Chopade, et al, 2019). Experts operate this type of software, which is designed to manage digital forensic evidence. This software would maintain track of how data was obtained and evaluated to get information for legal procedures. What is a firewall? Identify and explain some of the functions of a firewall. What are its limitations? A firewall is a software or firmware that prevents unauthorized access to a network by inspecting incoming and outgoing traffic (Liang & Kim, 2022). Firewalls do this by following a set of rules to identify and block threats. It may be used in both personal and corporate environments. Firewalls may block certain packet types and even close out various ports that are known to provide easy access for intruders. However positive firewalls present to any computer network, there are some limitations that need to be considered. Firstly, firewalls require a great deal of management. Unlike most security measures in our day to day lives, firewalls operate on a dynamic nature that makes them susceptible to new threats intruders may present. Additionally, intruders may utilize legitimate services within the firewall in improper ways. For example, an individual may utilize a legitimate open port to send malicious packets into the network without the firewall suspecting any issues. John Caldwell References: Awuson-David, K., Al-Hadhrami, T., Alazab, M., Shah, N., & Shalaginov, A. (2021). BCFL logging: An approach to acquire and preserve admissible digital forensics evidence in cloud ecosystem. Future Generation Computer Systems, 122, 1-13. Chopade, M., Khan, S., Shaikh, U., & Pawar, R. (2019, December). Digital forensics: Maintaining chain of custody using blockchain. In 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC) (pp. 744-747). IEEE.
Liang, J., & Kim, Y. (2022, January). Evolution of firewalls: Toward securer network using next generation firewall. In 2022 IEEE 12th Annual Computing and Communication Workshop and Conference (CCWC) (pp. 0752-0759). IEEE.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help