Computer science assignment
Task 1
In the field of computing, there are tools that can be employed in the collection of both live memory images and the various forms of off media. One of the most commonly used tools that can be used in the collection of live memory images is the FTK imager. The latter stated tool is usually utilized as an imaging tool as well as a data previewer. The FTK Imager has been found to gain relevance in forensic science, and this is whereby it has been used in the acquisition of evidence by creating copies of evidence without tampering with the original evidence (Graves, 2013). Besides, the FTK imager captures the random live access memory and does not have the capability of catching the memory dump.
Apart from the FTK imager, the other tool that can be used in the collection of live memory images along with the various forms of off media is the DumpIt. This tool is known to be the simplest one to use. The DumpIt can be placed on and run from a USB stick. The tool operates in such a way that the user is only expected to double-click, an element that will prompt him or her to open a window as well as dump the memory in a given predetermined location. On saving the desired memory or image, the resulting file is usually created and is automatically assigned a hostname along with the acquisition date.
Last but not least, the other tool that has the capability of capturing and storing live memory images and various forms of off media is the winpmem. The use of this tool is convenient in that it enables the user to specify a location and file name. Once executed, the winpmem offers feedback, and at the same time shows progress as it runs.
Task 2
As the webmaster of a server that is shared across departments within my organization, there are various security-related rules that I find fit in guiding the staff members who are dedicated to adding some web pages to the site. One of these security measures is that the staff members should consider using strong password protection along with authentication. This rule will be instrumental in the prevention of any conflicts that may arise. For instance, with the use of strong passwords and authentication, it will be so easy for each staff member to be held accountable for their actions. Before making any additions to a web page, each of the staff members is expected to log in to the site and log out once he or she is done with business.
Besides that, the other security-related measure that can be put in place is having an administrator to moderate the posted content. In this case, there will be an individual who will be mandated to verify any posting by the staff members. This will help in ensuring that only relevant content is posted. Apart from that, the other security rule that can be enforced is that of having third party security controls. In this regard, the organization may employ a person who will be charged with the responsibility of temporarily accessing the network of the organization (Rainer, Cegielski, Splettstoesser-Hogeterp, & Sanchez-Rodriguez, 2014). This person may be a former employee or a consultant, whose role will be to give a third eye to the content posted and advise on the way forward.
Last but not least, system audit is the other security-related rule that can help in an environment of a shared server. In this case, the audit will aim at enhancing accountability on what is posted. Besides, the audit will also serve to determine whether the current security controls are effective. Lastly, training of the employees on system security is the other policy that will help in ensuring that what is posted is relevant and is within the expectations of the organization.
Task 3
CHANGES IN ORACLE 12C
There was the introduction of two audit roles in Oracle 12c. The two newly introduced roles are the AUDIT ADMIN and the AUDIT VIEWER. The main reason for the introduction of the latter stated role of the viewer was to ensure that there is smooth management of the various audit policies to include initiation of housekeeping, maintenance along with the retention of data, and defined auditing. On the other hand, the AUDIT ADMIN role was aimed at streamlining the administrative role. This paper aims to highlight the AUDIT VIEWER and the AUDIT ADMIN roles, why they were necessary, the problems that they solved, and subsequently the beneficiaries to them.
AUDIT VIEWER role, as the name suggests, was introduced to enable the users to view as well as analyze data for security reasons. Also, this role helps in configuring auditing with the aim of administering fine-grained audit policies along with the unified audit policies. “The AUDIT VIEWER role was mainly introduced to view and subsequently make periodic reports on the audit data” (Freeman, 2013). However, it should be noted that this role only enabled the auditor to view and analyze data, and is known to make the analysis of the memory intuitive and quicker. To this end, it is clear that the introduction of the two roles was important.
“The main reason for the introduction of the two audit roles in Oracle 12c was to come up with solutions to some security issues” (Bach, 2013). For example, when it comes to the AUDIT ADMIN role, this was aimed at making it easier for people to view the audit records as well as clean up the audit trails. In addition, this role also focused on highlighting the exclusions that may be evident in the audit policies. Therefore, the AUDIT ADMIN role was meant to basically execute administrative roles. Without this role, it would be meaningless to have a running system in place.
Oracle 12c considered the two roles necessary as they helped in ensuring that the system runs as expected. Apart from that, the other element that necessitated the introduction of the two roles is that there was a need to make some occasional changes in the system. “With the AUDIT VIEWER role in place, the organization could be able to highlight any areas that need further improvement before things get out of control” (Pavlovic, & Veselica, 2016). This role would then be succeeded by the AUDIT ADMIN role which partly serves to execute the various aspects of the system. Therefore, the two roles in Oracle 12c are meant to complement each other.
In conclusion, the AUDIT VIEWER and the AUDIT ADMIN roles were meant to benefit the customers. In this case, the clients of an organization benefit in that they can trust the organization with their data, thus the roles helped in solving trust issues. Apart from that, the two roles benefit the clients in such a way that they guaranteed compliance. When auditing practices are put in place, there is no doubt that an organization will act as expected. This claim is based on the fact that auditing aims at advising the organization on what it should do given its identified flaws.
References
Bach, M. (2013). Expert consolidation in Oracle Database 12c.
Freeman, R. G. (2013). Oracle database 12c new features.
Graves, M. W. (2013). Digital archaeology: The art and science of digital forensics.
Upper Saddle River, NJ: Addison-Wesley.
Pavlovic, Z., & Veselica, M. (2016). Oracle Database 12c Security Cookbook.
Rainer, R. K., Cegielski, C. G., Splettstoesser-Hogeterp, I., & Sanchez-Rodriguez,
- (2014). Introduction to information systems: Supporting and transforming business.