Hard Drive Destruction

The goal of this project was to remove the data that existed on the several hard drives.  The student attempted to use DBAN to erase the hard drives, but this was not effective.  The student physically destroyed the hard drives to ensure the data that was on those hard drives couldn’t be accessed.   Project…

Forensic Package Research

The client for this project was a Professor in the university department that needed forensic software researched.  The student provided a list of products including where each software could be downloaded and the price of each.  This was given to the client for consideration.  Project Student:  Rick Wilburn

Forensic Software

The goal of this project was to research the requirements for a PC running FTK 3.0.  The requirements were out of the scope of the department so this was passed to another student to research a different version available.  Project Student: Mark Mitchell

Server Room Monitoring

This project consisted of finding a solution to monitor the server room for security purposes.  The student working on this project set up two web cams and video surveillance software.  Project Student: Mark Mitchell

Backup Software Research

The goal of this project was to research and find a backup software for the Citrix Xen Server. The student narrowed it down to two open source software called Alike and Amanda.  After further testing and research the student decided that Alike best fit the needs of this project.  Project Student: Anna Schafer

WebCam Software Research

This project was completed for a university department.  The student researched web cam software that would be used for surveillance for the department.  The main component that the student was researching in a software was how long it would continue without interruption.  The other component was that the camera didn’t need to be on all…

Restoring the Logging Server

During the semester the hard drive in this server failed and needed to be reloaded.  The student installed the Nagios logging software and other programs that it was dependent upon to function.  Then the student reconfigured the logging software for use on the university department’s network.  Project Student: Rick Wilburn

SNORT Logging and Analysis

This semester the student learned how SNORT operates by using a set of signature based rules and how an open source per script is use to manage the rules. The student also learned how to use the Rule Analysis and log checking through the use of BASE, which is a common web based front end…

Federal Information Security Management Act Analysis

The goal of the Federal Information Security Management Act (FISMA) is to prevent confidentiality, integrity, and availability of private and sensitive data from being compromised.  Through this project the student learned the process of how to implement FISMA.  The FISMA Security Life Cycle can essentially be broken down to categorizing the information systems, selecting the…

Preparing Obsolete PCs for Release

This project dealt with prepping computers taken from one of the labs for donation,resale, or storage. In order to successfully wipe the computers hard drive, some of the computers hardware needed to be reinstalled. This included the hard drive, the ram chip, drive cables, keyboard, and the monitor. The hard drives were wiped according to…