Ann's Bad Im Case Study

Superior Essays
Name
Professor
Institution
Date
Ann’s bad AIM
1. What is the name of Ann’s IM buddy?
The name of Ann’s IM buddy is sec558user1
2. What was the first comment in the captured IM conversation?
Here is the secret recipe. I just downloaded it from the file server. Just copy to a thumb drive and you are good to go >
3. What is the name of the file Ann transferred?
Recipe.docx
4. What is the magic number of the file you want to extract (first four bytes)?
0x504B0304 (one byte=8bits=2 hex digits)
5. What was the MD5sum of the file?
8350582774e1d4dbe1d61d64c89e0ea1
6. What is the secret recipe?
Recipe for disaster:
1 serving
Ingredients
4 cups sugar
2 cups water
In a medium saucepan, bring the water to a boil. Add sugar. Stir gently over low heat until
…show more content…
Cyber vandals use premade tools to cause grief to their fellow citizens. DDoS attacks are a competitive business tool to keep a competitor from participating in a particular event or shutting down online businesses. Some states sponsor the use of the DDOS to silence government critics and internal opposition.
To defend against a DDOS attack, a common and effective way of deploying a DDoS protection is by using Border Gateway Protocol routing. Second, writing some python scripts that try to filter out the bad traffic will try to use the systems firewall to filter out the bad traffic. Third, Internet service providers can be used because they have more bandwidth, which can help with large volumetric attacks. Using cloud mitigation providers who have built massive amounts of network bandwidth and DDOS mitigation capacity to scrub the traffic and send clean traffic to the data center.
Uses honeypots have in law
…show more content…
They attract hackers to attack the system in order to study them. Honeypots derive their value from threats using them. Thus if not interacted with, the honeypot has no value. Honeypots are important in the process of catching and prosecuting cyber criminals.
Emails are among the most common ways people communicate ranging from internal meeting requests, to distribution of documents and general conversation. Email forensics helps study the source and content of the email as evidence identifying the actual sender and recipient of the message. Some tools help identify the point of origin of the message, trace the path traversed by the message to identify spammers and identify phishing emails that try to obtain information from the receiver.
Most of the browsers save web browsing history in their own unique formats and are stored as hidden files. Thus, web forensics deals with gathering critical information related to crime by exploring the browsing history of a person, files they have uploaded, number of visits to a website, any material downloaded from the website, the cookies setup as part of the visit and other critical information. One cannot easily delete the history files making it simpler for law enforcement agencies to track down criminals and prosecute

Related Documents

  • Decent Essays

    Hrm/531 Week 3 Quiz

    • 497 Words
    • 2 Pages

    Purchasing Units Recipe Units Physical Inventory Count Meat & Poultry Unit Unit Price Unit Conversion Unit Cost Inv Count Unit Conversion Unit Cost On Hand $ Total Beef Beef, Stew Meat, Frzn lb $ 2.18 oz 16 $ 0.14 lb 1 $ 2.18 20 $ 43.60 Black Angus lb $ 7.83 oz 16 $ 0.49 lb 1 $ 7.83 13 $ 93.96 Filet, Steak lb $ 9.56 oz 16 $ 0.60 lb 1 $ 9.56 12 $ 114.72 Pork Bacon 10# $ 25.83 oz 160 $ 0.16 lb 10 $ 2.58 8 $ 20.64 Chop lb $ 4.80 oz 16 $ 0.30 lb 1 $ 4.80 15 $ 72.00 Pork Rib Back lb $ 2.45 oz 16 $ 0.15 lb 1 $ 2.45 45 $ 110.25 Chicken Tenders 2/5 lb $ 25.50 oz 160 $ 0.16 lb 10 $ 2.55 0 $ - Brst lb $ 2.49 oz 16 $ 0.16 lb 1 $ 2.49 12 $ 29.88 Other Duck lb $ 1.98 oz 16 $ 0.12…

    • 497 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Log files created by the web browser also store web browsing history information such as web pages visited and accessed along with dates and times of those visits (Ravi, 2007). The registry can provide evidentiary value to the digital forensic investigator as well in relation to web browser artifacts. Items such as passwords, default search provider and search engine, and the URLs typed into the web browser address bar are stored in the NTUSER.DAT file located within the NTUSER.DAT hive in the registry. Twenty five URLs can be stored at one time in the NTUSER.DAT file and they are cycled out as new URLs are typed into the web browser.…

    • 661 Words
    • 3 Pages
    Superior Essays
  • Decent Essays

    You've Never Had Country Sausage Gravy Like This Before If you sit down at any breakfast table in the country, you are going to get a huge helping of country sausage gravy. In fact, you will probably see it on tables when meals like country fried steak. Country sausage gravy is a southern comfort food, and is pretty easy to make.…

    • 219 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Managing Threats to Data Common threats to data consist of Botnets, DDoS (Distributed denial of service), Hacking, etc. You can manage and prevent data threats with antivirus/malware/hacking/etc software. By downloading a legitimate program you can protect your computers data. The software will alert you if there is something out of place in your computer before it’s too late, so you can get it removed.…

    • 1963 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    2) Network traffic shows that hundreds of hosts are constantly sending only SYN packets to a single Web server on campus. a. This type of traffic suggests a SYN flood attack, which according to Techtarget (http://searchsecurity.techtarget.com/definition/SYN-flooding) is when half-open connections are attempted by the user only sending SYN packets. The server will respond with SYN/ACK packets (on open ports), but the client ignores them and re-sends SYN packets. This means the server cannot handle legitimate traffic when needed. Similar to #1 above, IDS and IPS devices can detect all of this traffic and an IPS can drop the packets before they get to the target server after the pattern is recognized as an attack.…

    • 1074 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Arroz con leche is a very popular traditional Hispanic dessert. It’s a sweet, rice-based pudding that is made by slow cooking the rice in milk and although it is very well known recipe, there are many different ways it is prepared. Even though it originated from Spain, it is being made throughout the world. This recipe is the traditional Mexican versions of making arroz con leche. Ingredients needed: 1 ½ cups of rice 1-2 stick(s) of cinnamon 1 cup of sugar 1 can of carnation evaporated milk ½ gallon of milk Instructions:…

    • 132 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    SPICED PECANS If spicy-hot Cajun seasoning isn’t to your liking, you can use sweet-hot barbecue sea- soning blend, savory Italian seasoning blend, or another seasoning mix instead. Yield: 16 (1-ounce) servings INGREDIENTS: 3 pounds pecan halves 2 tablespoons extra-virgin olive oil or melted butter 2 tablespoons Cajun seasoning blend 1.Add the pecans, oil or butter, and Cajun seasoning blend to the slow cooker. Stir to combine. Cover and cook on low for 1 hour.…

    • 330 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    1. Internal Bot If an attacker is attempting to breach the enterprise, they may attempt to insert a bot within the network which will wreak havoc on the organization’s system. The internal bot addresses security at the perimeter of the enterprise. The DPI (deep packet inspection) engine will identify network malware that’s attempting to penetrate the network.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Lorraine makes really good grades, and John just does not care. They both hang out together, and do normal childish things for example, prank calls, with their friends Dennis, and Norton who acted putrid. They close their eyes and scroll their finger down a phone book to randomly choose someone to call, but what they did not know is this would be the last time they prank called. This times it was Lorraine’s turn to go, and she started scrolling through the book. Her finger lands on an address that says Pignatti Angelo 190 Avenue.…

    • 1248 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Leaves are slowly beginning to fall off the trees and changing to beautiful orange, red, and yellow colors. The wind is getting colder and colder, and sweaters, scarfs, and coats are becoming a part of her everyday outfit. It is that time of year again. Fall is the time of year most people dread and are unprepared for; nonetheless, it is the time of year when being home inside warm doors becomes cheerful. Everyone has her own way of making those cold days inside enjoyable, but what better way to enjoy the fall weather with a delicious Bananas Foster dish?…

    • 630 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Paleo Diet Recipes

    • 606 Words
    • 3 Pages

    Paleo Diet Recipes are dairy free. Discover cow's milk alternative and Paleo friendly foods that contain calcium. 2 FREE Paleo Kids Recipes. The Paleo Diet is dairy free, gluten free and soy free. Parents maybe faced with a dilemma with children that are cow's milk intolerant.…

    • 606 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ending up with online chat rooms. which she found fun, mostly a Teen Chat Room. Which she found someone with the user-name as VALLEYGUY(AKA-Mike). after finding this user she spared a lot of her free time to going online to speak to him.…

    • 479 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Introduction In 2017, there have been several high profile cyber-attacks that have affected various systems across the country and the world. Among these cyber-criminals is the group known as the Shadow Brokers who debuted in August 2016 after claiming to have breached the spy tools of the Equation Group, an elite NSA-linked operation. In April 2017, the Shadow Brokers released what is said to be significant NSA tools which individuals have used to infect computer systems with ransomware. As a result of the Shadow Brokers’ breach, one strain of ransomware, WannaCry, spread worldwide in May 2017 hitting several targets that included public utilities and large corporations. It even attacked National Health Service facilities in Great Britain,…

    • 657 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Digital Forensics

    • 755 Words
    • 4 Pages

    In preparing for processing the potential crime/incident scene, I would have my digital forensics team to understand and perform the following tasks: identify for potential digital evidence, understand rules of evidence, prepare for the search and seize digital evidence, and to ensure proper storage/chain of evidence processes are properly documented and followed. Computers and digital media are progressively involved in unlawful exercises. The computer maybe contraband, products of the crime, an instrument of the offense, or just a storage that holds evidence of the offense. Investigation of any criminal activity may deliver electronic proof.…

    • 755 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays