top of page

Project Objectives and Progress:

NETWORK SECURITY

  • Create a network infrastructure design communications document that includes identified hardware components, connections to outside world, identified physical layer connectivity (media) and addressing, including operational and security components in the design.

  • Install, configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing and assessment.

 

  • Construct, implement and document a script or a program to automate a security-related process or other tasks such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis and assessment.

  • Create a policy or procedure that addresses events such as: a disaster recovery plan, a business continuity plan, an incident response policy, an acceptable usage document, an information security policy, a physical security policy, assessments or troubleshooting procedures.

  • Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security.

 

  • Research, document, test and evaluate several current industry information security based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity and availability.

 

 

 

TECHNOLOGY FORENSICS

  •  Articulate the complexity of and apply thinking skills to how the network and application infrastructure affects technology forensics investigations and incident response procedures.

  • Identify and apply in a forensics context the various topologies, standards, technologies and protocols employed in computer systems, including file system formats and their attributes.

  • Evaluate, select, and deploy computer forensic measures for the response, mitigation and analysis of a security incident pertaining to digital artifacts and how information was compromised.

 

  • Analyze and evaluate the current investigative and legal aspects of information and computer forensics including electronic discovery, deposition, litigation and corporate personnel processes.

  • Evaluate and execute the strategies, methodologies, technique, and state-of-the-art forensics tools for the preservation of digital evidence on computer systems, network systems and other electronic devices.

  • Create tracking processes to follow the trail of electronic evidence through digital systems, including documentation, formal reporting and presentation.

bottom of page