Intro

I am a Digital Forensics student studying at university in the UK. I also do some Cyber Security modules.
I am currently in my 2nd year.
I have mainly started this to post interesting things I have learned and problems I have encountered.
However, I will use it to do write ups about useful things I want to remember such as commands and tools I have used so I don't forget them! (To be honest, I don't expect anyone to read this!)

Friday 3 April 2015

Effects of Encryption on IT Systems and Digital Investigations

I feel that alot of my posts on this blog have been Cyber Security related when theoretically, given the name of my course "Forensic Computing" it should be based around Forensics!
So its my "Easter Resolution" to do more forensics posts. Starting with this one.

The title of this post was the title of the essay i had to write. As i said in the other post, i enjoyed doing this essay. It forced me to really look at encryption and learn the ins and outs. Before doing it, i had a general idea of Symmetric and Asymmetric encryption but not the technical details of it.

The breakdown of my essay was something like this:

Ahh The Easter Break...My Work Overview

After completing all the exciting work before Easter, because, well, it was more exciting that the standard essays. I am now left with completing pure essays and not much hands on Hacking/Forensics!

Currently left to hand in i have:

  • Essay on "The effects of Encryption on IT Systems and Digital Investigations"
  • Essay on "Biometric Spoofing Techniques"
  • A Penetration Testing Methodology
  • A Penetration Testing Report
  • Writing up notes from a Digital Investigation on a suspects USB stick and network traces.