Wednesday, 12 March 2014

Project 4, Session 8

As part of the risk analysis, we need a contingency plan.  Worst case scenario, you're host PC could be infected.  Perform a bit-to-bit backup of your computer before you start working with the images.   You can then restore the PC should it become infected.

Priten Patel
Research methods how to secure the system
Prevent Compromising the machine by writing data to it / altering data
- Steps to take & Document
Explain how to remove the malware infection

Jack Hall
Research on isolating virtual machines from the physical machine.
Instead of remote logging, need to create a log sheet to show the decision making with the analysis
Detail all applications installed
Explain how to Improve the security in order to prevent the malware infection in the first place

Abdul Rauf
Document Different methods of bit to bit cloning
Detail service packs

Kirran Aldridge
Detailed operating systems used
Detailed BIOS settings
Did not attend

Hisham Qureshi
Legal Aspects - Notified of task change via text
Did not attend

Everyone
Produce multiple copies of the machine using bit to bit cloning
Find the infected files
Explain the purpose / payload of the malware
Detail any adverse effects
Detail the type found malware on the machine
Critically evaluate own methods used
Explain tools and techniques

Links:

http://www.shadowdefender.com/

Monday, 10 March 2014

Project 4, Session 7

As part of the risk analysis, we need a contingency plan.  Worst case scenario, you're host PC could be infected.  Perform a bit-to-bit backup of your computer before you start working with the images.   You can then restore the PC should it become infected.

Priten Patel
Research methods how to secure the system
Prevent Compromising the machine by writing data to it / altering data
- Steps to take & Document
Explain how to remove the malware infection

Jack Hall
Research on isolating virtual machines from the physical machine.
Instead of remote logging, need to create a log sheet to show the decision making with the analysis
Detail all applications installed
Explain how to Improve the security in order to prevent the malware infection in the first place

Abdul Rauf
Document Different methods of bit to bit cloning
Detail service packs
Did not attend

Kirran Aldridge
Detailed operating systems used
Detailed BIOS settings
Did not attend

Hisham Qureshi
Legal Aspects - Notified of task change via text
Did not attend

Everyone
Produce multiple copies of the machine using bit to bit cloning
Find the infected files
Explain the purpose / payload of the malware
Detail any adverse effects
Detail the type found malware on the machine
Critically evaluate own methods used
Explain tools and techniques

Links:

http://www.shadowdefender.com/

Friday, 7 March 2014

Project 4, Session 6

As part of the risk analysis, we need a contingency plan.  Worst case scenario, you're host PC could be infected.  Perform a bit-to-bit backup of your computer before you start working with the images.   You can then restore the PC should it become infected.

Priten Patel
Research methods how to secure the system
Prevent Compromising the machine by writing data to it / altering data
- Steps to take & Document
Explain how to remove the malware infection

Jack Hall
Research on isolating virtual machines from the physical machine.
Instead of remote logging, need to create a log sheet to show the decision making with the analysis
Detail all applications installed
Explain how to Improve the security in order to prevent the malware infection in the first place

Abdul Rauf
Document Different methods of bit to bit cloning
Detail service packs

Kirran Aldridge
Detailed operating systems used
Detailed BIOS settings

Hisham Qureshi
Legal Aspects - Notified of task change via text
Did not attend

Everyone
Produce multiple copies of the machine using bit to bit cloning
Find the infected files
Explain the purpose / payload of the malware
Detail any adverse effects
Detail the type found malware on the machine
Critically evaluate own methods used
Explain tools and techniques

Links:

http://www.shadowdefender.com/

Wednesday, 5 March 2014

Project 4, Session 5

Priten Patel
Research methods how to secure the system
Prevent Compromising the machine by writing data to it / altering data
- Steps to take & Document
Explain how to remove the malware infection

Jack Hall
Research on isolating virtual machines from the physical machine.
Instead of remote logging, need to create a log sheet to show the decision making with the analysis
Detail all applications installed
Explain how to Improve the security in order to prevent the malware infection in the first place

Abdul Rauf
Document Different methods of bit to bit cloning
Detail service packs
Did not attend

Kirran Aldridge
Detailed operating systems used
Detailed BIOS settings

Hisham Qureshi
Complete work outlined in the 'everyone' section.  No specific work available due to missed sessions.
Arrived late 

Everyone
Produce multiple copies of the machine using bit to bit cloning
Find the infected files
Explain the purpose / payload of the malware
Detail any adverse effects
Detail the type found malware on the machine
Critically evaluate own methods used
Explain tools and techniques

Links:

http://www.shadowdefender.com/

Monday, 3 March 2014

Project 4, Session 4

Priten Patel
Research methods how to secure the system
Prevent Compromising the machine by writing data to it / altering data
- Steps to take & Document
Explain how to remove the malware infection

Jack Hall
Research on isolating virtual machines from the physical machine.
Instead of remote logging, need to create a log sheet to show the decision making with the analysis
Detail all applications installed
Explain how to Improve the security in order to prevent the malware infection in the first place

Abdul Rauf
Document Different methods of bit to bit cloning
Detail service packs

Kirran Aldridge
Detailed operating systems used
Detailed BIOS settings

Hisham Qureshi
Assigned work once He Has attended a group session

Everyone
Produce multiple copies of the machine using bit to bit cloning
Find the infected files
Explain the purpose / payload of the malware
Detail any adverse effects
Detail the type found malware on the machine
Critically evaluate own methods used
Explain tools and techniques



Links:

http://www.sandboxie.com/

NOTE:
INCLUDE ALL LINKS ACCESSED WITHIN THE WORK.

Friday, 28 February 2014

Project 4, Session 3

Priten Patel
Research methods how to secure the system
Prevent Compromising the machine by writing data to it / old ring data
- Steps to take & Document
Explain how to remove the malware infection

Jack Hall
Research on isolating virtual machines from the physical machine.
Remote logging - to find automated system to record all keyboard strokes, mouse movements etc & Document
Instead of remote logging, need to create a log sheet to show the decision making with the analysis
Detail all applications installed
Explain how to Improve the security in order to preventDefault the malware infection in the first place

Abdul Rauf
Document Different methods of bit to bit cloning
Detail service packs
Did not attend

Kirran Aldridge
Detailed operating systems used
Detailed BIOS settings
Did not attend

Hisham Qureshi
Assigned work once He Has attended a group session

Everyone
Produce multiple copies of the machine using bit to bit cloning
Find the infected files
Explain the purpose / payload of the malware
Detail any adverse effects
Detail the type found malware on the machine
Critically evaluate own methods used
Explain tools and techniques


Unassigned Work:

What the user shoulderstand do post infection - EC: old passwords

NOTE:
INCLUDE ALL LINKS ACCESSED WITHIN THE WORK.

Wednesday, 26 February 2014

Project 4 - Session 2

Priten Patel
Research methods how to secure the system
Prevent compromising the machine by writing data to it/altering data
- Steps to take & Document
Explain how to remove the malware infection

Jack Hall
Research on isolating virtual machines from the physical machine.
Remote logging - find an automated system to record all keyboard strokes, mouse movements etc & Document
Detail all applications installed
Explain how to improve the security in order to prevent the malware infection in the first place

Abdul Rauf
Document Different methods of bit to bit cloning
Detail service packs

Kirran Aldridge
Detail operating systems used
Detail BIOS settings

Hisham Qureshi
Assigned work once he has attended a group session

Everyone
Produce multiple copies of the machine using bit to bit cloning
Find the infected files
Explain the purpose/payload of the malware
Detail any adverse effects
Detail the malware type found on the machine
Critically evaluate own methods used
Explain tools and techniques


Unassigned Work:

What the user should do post infection - EG: alter passwords

NOTE:
INCLUDE ALL LINKS ACCESSED WITHIN THE WORK.