Itt Tech Computer Forensics Paper

3338 Words14 Pages
ITT Tech Computer forensics | RUNNING HEAD: Investigate Evidence and Create a Report of the Findings | IS415 Cyber Forensics Assignment | | 3/17/2013 | ITT TECH ON-LINE Final Project | RUNNING HEAD: Corporate Tech Final Project Over the past nine weeks I have been working as a Forensics Intern at the AAA Computer Forensics firm and have encountered numerous issues with our clientele. I have done my best to mitigate, recovered data from reformatted drives and encrypted data with numerous cyber forensics tools. One of the hardest parts about being in the IT Security industry is maintaining a full effective plan, having end users obey the policies, and making sure criminals and hackers from committing further crimes within…show more content…
By proper end user training for anyone involved with the Corporate Techs site, proper scanning of all USB and thumb drives on a test computer being used for this particular site, can mitigate threats from bugs and viruses. Also, by changing all local computer default autorun policies, will disable usage of these USB ports and stop an occurrence from taking place. Last, it’s almost near impossible for an end user to not use a personal laptop during work hours for personal use or for work. But to mitigate further problems from happening, I will implement an encrypted file system for sensitive data. TrueCrypt is a program that I have found efficient that controls over endpoints that enter and exit the internal system. All Corporate Techs end users will be told that sensitive information, such as VPN, DV and Wi-Fi access should not be stored persistently on devices such as laptops or…show more content…
Personal E-Mail Accounts Prohibit Corporate Tech employees and contractors from transmitting sensitive information using any personal e-mail accounts (e.g., Hotmail, Yahoo, MSN). Testing & Vulnerability Assessment Ensure that all Corporate Techs systems and networks containing sensitive or mission critical information undergo vulnerability scanning and/or penetration testing to identify security threats at least annually or when significant changes are made to the system or network. Cryptography Ensure that all information requiring protection from unauthorized disclosure is encrypted during transmission using current NIST encryption standards and Department-approved encryption products. Corporate Tech employees and contractors shall not transmit such information without using cryptographic protections. Malicious Code Protection Implement and enforce a malicious code protection program designed to minimize the risk of introducing malicious code (e.g., viruses, worms, Trojan horses) into all systems and networks. Peer-to-Peer
Open Document