Wednesday, August 28, 2019
Forensic Evidence Analysis Research Paper Example | Topics and Well Written Essays - 750 words
Forensic Evidence Analysis - Research Paper Example The primary goal is to distribute the dissimilar and criteria based key search process to every workstation on the network. Likewise, users will not complain for any issue related to operating system performance, as DNA client only consumes the unused processor time (Decryption & password cracking software, n.d). Likewise, if more than one or many processors are used at the same time, result will come fast. Moreover, if a processor has two or more cores, performance increases accordingly. DNA has two modes i.e. dedicated or non-dedicated and these modes are applied on the workstations. The dedicated mode requires a workstation that will exclusively utilize DNA network with no other tasks incorporated except the DNA password recovery that is a primary job. On the other hand, non-dedicated mode requires a workstation that will be used for other tasks as well. For instance, after working hours, workstations are available for use. These workstations can be assigned to DNA for contributin g valuable computational efforts that are required for password recovery. If many workstations contribute to a password recovery process, a single workstation has the capability of analyzing 1000000 passwords per hours, and 24000000 passwords in 24 hours respectively. Letââ¬â¢s suppose, DNA is using only 10 workstations on a non-dedicated mode for just 14 hours per day, the results will be 140,000,000 passwords for the same 24 hours with the increase of approximately six times than the previous one. Moreover, if more machines are added, a result for password recovery improves. However, workstation must be on the network and will be able to resolve the IP address so that the DNA server can establish connectivity to the DNA client. Workstations connect to the DNA server via DNA client and form a cluster for testing more passwords in less time. Products related to DNA provide statistical information in the form of graphs and has the capability to add user dictionaries and customize them according to the requirements. Moreover, customization is also available for password attacks in explicit languages. Furthermore, DNA products also possess the feature of stealth client installation functions and automatic updates on DNA client from the DNS server. File formats that are supported includes spread sheet formats, PDF, data compression formats etc. Network security audit Vulnerabilities or weaknesses that is probable to disrupt network services can be categorized in to interception, availability and access points. The interception category focuses on the data that is transmitted by utilizing a carrier or equipment over the network (Approach to auditing network security , n.d). The transmission conducted by these carriers and equipment can be interrupted and produce a risk of adverse discovery that can be related to breach in integrity of data. Secondly, availability is concerned with the expansion of networks and more remote sessions are created to the internal app lications, any disruption in availability of network services will impact business operations. Thirdly, access point is related to weak access point will allow a threat to penetrate within the network and disrupt or destroy confidential information available on mission critical systems (Approach to auditing network security , n.d). Focusing on the 3 categories, auditors will examine aspects of physical security
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.