Post on the blog to explain to the class how your methodology works.

Cyber Security
part 1
section 1 Research and explain your topic (pick one from below) as it relates to Unix File System:
Boot Blocks
Superblock
Cylinder Group
Inode/vnode
Hard Link
Symbolic Link/Symlink
Create a poster to explain to the class. Include diagrams and text as needed.

section 2
Password cracking is used for both criminal acts and to investigate crimes
Password cracking is a challenge in cell phone forensics and computer forensics in general
Research your topic (pick one from below). Post on the blog to explain to the class how your methodology works.
Brute force
Dictionary Attacks
Syllable Attack
Rule-Based Attack
Hybrid Attack
Rainbow Attack

part2
Research Linux and its role in forensics
On the worksheet provided:
Identify some of the Linux utilities and versions (hint – we used one in lab) that can be used for forensic purposes (give a brief description)
Develop a Pros and Cons list for using Linux