What processes are using the memory and how much

Assignment Help Software Engineering
Reference no: EM132449881

System Memory Analysis Assignment

Assignment

Using the memory file provided by your instructor, examine the memory from the computer and answer the questions below. Support your answers with screen captures from your analysis tools, as well as documentation from other sites that you may have used. Make sure to complete all of the components below.

Submit

1. A one paragraph (min) to one page (max) written BLUF-format document of your understanding of the system from which this capture was taken. Use good analytic writing style. Assume that you're writing to a somewhat technically-oriented boss or co-worker.

2. Document the list of processes that are running on the system. Attempt to categorize as "normal" or "suspicious".

3. Pick one interesting "normal" process. Do some research on it and figure out what it is.

4. If you can find one, document a suspicious process. Imagine it was a common piece of malware. Provide at least one resource you would use to find out what other people have said about this program.

5. Provide an overview of the system, to the best of your ability. What Operating System is it? How much memory does the computer have? At the time of capture, what processes are using the memory and how much? Organize your understanding of the processes in some way - OS, kernel, applications, processes, user-run programs, etc.

Attachment:- System Memory Analysis.rar

 

Reference no: EM132449881

Questions Cloud

Organization computer security risk posture : Faced with the need to deliver risk ratings for your organization, how do all the systems' risks sum up to an organization's computer security risk posture?
United nations international children emergency fund : What is the purpose of UNICEF and its major roles? What are the main functions of UNICEF? How does this agency help protect and or influences environmental
Describe where this type of ecosystem might be located : Describe where this type of ecosystem might be located. Name 1 specific example.Describe the structure of the ecosystem.
Attacking vulnerable web application and database : Compare and contrast cross-site scripting attack and a reflective cross-site scripting attack. Why are you sometimes asked to set the DVWA security level to low
What processes are using the memory and how much : What Operating System is it? How much memory does the computer have? At the time of capture, what processes are using the memory and how much
Controlling the different pollutant streams : List and discuss the options that we have available to us for controlling the different pollutant streams.
What are the three classifications of receivables : What kind of an account (asset, liability, etc.) is Allowance for Doubtful Accounts, and is its normal balance a debit or a credit? Neptune Company issued
How ecotourism is enhancing the demand for tourism : Research Report on Influence of ecotourism in increasing demand for tourism in UK - How ecotourism is enhancing the demand for tourism within UK?
Discuss differences between gaap and ifrs : What are differences between GAAP and IFRS and your expectations of having a common set of Accounting Guidelines in the foreseeable future.

Reviews

len2449881

2/5/2020 10:25:33 PM

Please use Volatility tool for memory forensics. There are 5 total that need to submitted. Read the instruction carefully.

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd