logo

IT Security Management: Digital Forensics and Network Design

   

Added on  2023-06-10

20 Pages5768 Words442 Views
 | 
 | 
 | 
IT SECURITY MANAGEMENT
IT Security Management: Digital Forensics and Network Design_1

Table of Contents
Introduction..............................................................................................................................2
Task -1 Digital Forensics.........................................................................................................2
1. Case Study Description.................................................................................................2
2. Virtual Disk Image........................................................................................................3
Task - 2 Network Design..........................................................................................................5
1. Network Topology.........................................................................................................6
2. Security Assumptions and Challenges........................................................................9
3. Authentication and Authorisation Mechanisms.........................................................9
4. Key Management Issues.............................................................................................11
5. IDS................................................................................................................................13
6. Security Issues.............................................................................................................14
7. Measure the ROI on Security.....................................................................................15
8. Security Breach...........................................................................................................16
Conclusion...............................................................................................................................16
References...............................................................................................................................17
1
IT Security Management: Digital Forensics and Network Design_2

Introduction
This projects aims to analyse the digital forensic case investigation, which involves
network designing and security solutions for a new start-up company. This company
basically is a small medium enterprise and this company owned by Luton. Using E-
government model, in production and accounting records, Luton decided to encounter many
anomalies. This company has investigator and employed for digital forensics. So, investigator
needs to evaluate determine any form of malicious activities that take place in the network.
Provide prevention for the malware with the company system. All this will be analysed and
discussed in detail. The digital forensic tool needs to be analysed and discussed in detail.
Also the network security for this company will be analysed and discussed in detail. Further,
analysing the authentication and authorization mechanisms will be done. Key management
issues will be analysed and discussed. Measures on ROI security will be measured and
discussed in detail. Finally, the security breaches will be identified.
Task -1 Digital Forensics
1. Case Study Description
The new start-up company is a small medium enterprise and this company is owned
by Luton. In production and accounting records, Luton decided to encounter many anomalies,
using E-government model. Basically, this company begins with system check for the log
files, then it determines various suspicious entries along with various IP addresses. These
information is transferred outside the company with the help of firewall. The enterprise
system is also received and has encountered many complaints from the customers. It included
that a strange message is often displayed in the processing time and sometimes it leads to
redirect to the payment pages but it does not look relevant. So, this company faces hard
situation for ensuring uncompromised computer system in terms of enterprise’s system. This
company also contains investigator and is employed for digital forensic. Thus, the
investigator must perform evaluation of malicious activities that occur in the network. It
provides prevention for those malware with the company system.
2
IT Security Management: Digital Forensics and Network Design_3

2. Virtual Disk Image
Here, we will create the virtual disk images by using Magic ISO software. This software is
used to provide effective virtual disk image file. It also makes back-up copies of the disk
image files. To create the Virtual disk it follows the below steps.
First, open Magic ISO software.
Click File New Disk Image 2.24 MB.
It is illustrated in the below figure.
This process opens the new disk image file and renames the file as Disk File, as shown
below.
3
IT Security Management: Digital Forensics and Network Design_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Malicious Software Protection Policy
|6
|1728
|181

IT Network Security
|68
|3007
|50

Digital Forensic Technology - Analysis and Results
|7
|1057
|77

COS30015 IT Security : Malware Analysis
|12
|4290
|62

Digital Evidence Analysis on a Network Channel
|6
|1303
|146

Computer Crime and Digital Forensics Research 2022
|16
|3539
|20