Friday 28 February 2014

Project 4, Session 3

Priten Patel
Research methods how to secure the system
Prevent Compromising the machine by writing data to it / old ring data
- Steps to take & Document
Explain how to remove the malware infection

Jack Hall
Research on isolating virtual machines from the physical machine.
Remote logging - to find automated system to record all keyboard strokes, mouse movements etc & Document
Instead of remote logging, need to create a log sheet to show the decision making with the analysis
Detail all applications installed
Explain how to Improve the security in order to preventDefault the malware infection in the first place

Abdul Rauf
Document Different methods of bit to bit cloning
Detail service packs
Did not attend

Kirran Aldridge
Detailed operating systems used
Detailed BIOS settings
Did not attend

Hisham Qureshi
Assigned work once He Has attended a group session

Everyone
Produce multiple copies of the machine using bit to bit cloning
Find the infected files
Explain the purpose / payload of the malware
Detail any adverse effects
Detail the type found malware on the machine
Critically evaluate own methods used
Explain tools and techniques


Unassigned Work:

What the user shoulderstand do post infection - EC: old passwords

NOTE:
INCLUDE ALL LINKS ACCESSED WITHIN THE WORK.

Wednesday 26 February 2014

Project 4 - Session 2

Priten Patel
Research methods how to secure the system
Prevent compromising the machine by writing data to it/altering data
- Steps to take & Document
Explain how to remove the malware infection

Jack Hall
Research on isolating virtual machines from the physical machine.
Remote logging - find an automated system to record all keyboard strokes, mouse movements etc & Document
Detail all applications installed
Explain how to improve the security in order to prevent the malware infection in the first place

Abdul Rauf
Document Different methods of bit to bit cloning
Detail service packs

Kirran Aldridge
Detail operating systems used
Detail BIOS settings

Hisham Qureshi
Assigned work once he has attended a group session

Everyone
Produce multiple copies of the machine using bit to bit cloning
Find the infected files
Explain the purpose/payload of the malware
Detail any adverse effects
Detail the malware type found on the machine
Critically evaluate own methods used
Explain tools and techniques


Unassigned Work:

What the user should do post infection - EG: alter passwords

NOTE:
INCLUDE ALL LINKS ACCESSED WITHIN THE WORK.

Monday 24 February 2014

Project 4 - Session 1

Priten Patel
Research methods how to secure the system
Prevent compromising the machine by writing data to it/altering data
- Steps to take & Document
Explain how to remove the malware infection

Jack Hall
Research on isolating virtual machines from the physical machine.
Remote logging - find an automated system to record all keyboard strokes, mouse movements etc & Document
Detail all applications installed
Explain how to improve the security in order to prevent the malware infection in the first place

Abdul Rauf
Document Different methods of bit to bit cloning
Detail service packs

Kirran Aldridge
Assigned work once he has attended a group session

Hisham Qureshi
Assigned work once he has attended a group session

Everyone
Produce multiple copies of the machine using bit to bit cloning
Find the infected files
Explain the purpose/payload of the malware
Detail any adverse effects
Detail the malware type found on the machine
Critically evaluate own methods used



Unassigned Work:

What the user should do post infection - EG: alter passwords

Detailed information on versions
Explain tools and techniques

Detail operating systems used
Detail BIOS settings

Project 3, End work Designation

Jack
Task 1 - Symmetric Key Encryption, History of Cryptography
Task 3 - Set up server, created database, improvements, compiled task 3 report

Priten
Task 1 - Compiled presentation, compiled report, public key encryption, why we encrypt data
Task 3 - Created the website

Abdul
Task 1 - What is cryptography, Hashing
Task 3 - None

Kirran
Task 1 - Substitution Ciphers, Legal Aspects
Task 3 - None

Hisham
Task 1- None
Task 3 - Encoding sites to prevent XSS

Monday 3 February 2014

Project 3, Session 10

Task 3 - File repository

Keep the use of text to a minimum, use graphs and images where possible.  Reminder: Include all references at the bottom of the report and state if there are any direct citations.

Resources required to run the website
File Provence - MD5 Checksum of the file available plaintext on the website
Admin Page with details of user payments
Authentication Log in email - Containing key (as well as passwords)
Security aspects - Lock account after 3 login attempts            

Priten -
Design the website
Create the website - Layout, forms, etc etc Deadline 7.02.2014
Flow chart of the processes involved - How the user receives the end product Complete for website

Jack - Compiling the Report
Design the website Complete
Database - Username, Password,  DOB, Email Address
                  Decryption Key, Book information, etc etc   Under design, Awaiting Server for construction
Flow chart of the processes involved - How the user receives the end product Complete for website

Kirran - 
Research Payment system - Paypal with automated email sending to the customer once product has been purchased Deadline 7.02.2014
Specification of the project requirements Extended to 31.01.2014 OVERDUE
TASK 1 WORK IS OVERDUE  31.01.2014
Did not attend

Abdul - 
Comparison of different encryption techniques (Less text, use bar graphs to compare) -
Strength, Speed of encryption, Read speed, Write Speed, Reliability Deadline 3.02.2014
Set up the Virtualbox image (Debian Web-Server) - Include PHPMyadmin Deadline 31.01.2014
SECURE and DOCUMENT WEB SERVER ^

Hisham - 
Encoding website entry OVERDUE 03.02.2014
Database protection (Protection from SQL Injections) Complete, Needs word count reduction
Concept Design PHP that locks out user after 3 passwords attempts (Blocks IP Address temporarily) Deadline 07.02.2014
Did not attend