Discussion 1: current events

Discussion 1: Current Events
No unread replies.No replies.
Gain an understanding of the Cyber Forensics Profession
Post your weekly current event discussion here. The topic of your posting should be related to information assurance since that is our class title.
A Current Event is simply a newsworthy item that helps us to stay current on what is going on in information security today. You can select any reputable source to find your current event.
Guidelines & Expectations
Please give your analysis of the event and provide a link.
To receive full credit for this discussion, submit an original post in the discussion arena below. Then, respond to 2 other students posts. Remember, this is meant to be a discussion, so add some new information in your replies. Be objective, clear, and concise.
NOTE: To receive full credit, original post due by Friday. Peer responses are due by Sunday.

However, one always needs an active internet connection to use this system.

This project focuses on developing an e-Authentication system using a combination of QR code and OTP
for enhanced security. The e-Authentication system is designed to avoid hacking accounts through
shoulder surfing and misuse of login credentials. To be able to use the system, an online user must first
register by entering the basic registration details (name, address, zip code, etc.). Once the registration is
complete, the user can access the login module to authenticate the account by entering the email ID and
password combination they used during registration. Then, the user can proceed to the next
authentication step using either QR (Quick Response) code or OTP (One Time Password). As per the
option selected by the user, the system will generate a QR Code or an OTP. While the QR code will be
sent to the user’s email address, the OTP will be sent via SMS to the registered mobile number. The
system randomly generates the QR Code and OTP at the login time. It makes the login more secure.
However, one always needs an active Internet connection to use this system.

Using your own computer, explain step-by-step how you would locate and enable the firewall log and monitor your own network traffic.

All firewalls have some type of logging feature. This feature documents how the firewall handled various types of network traffic. The logs, if enabled, provide valuable information like source and destination IP addresses, port numbers, and protocols. You can also use the Windows Firewall log file to monitor TCP and UDP connections and packets that are blocked by the firewall. Using your own computer, explain step-by-step how you would locate and enable the firewall log and monitor your own network traffic. Provide “screenshots” to document this process. What would you be able to determine from logging the firewall activity?