Monday, December 30, 2019

A Worn Path Phoenix Jackson a Very Old Woman Essay

Heroes are born everyday. But not all of them have to be able to fly around the world or stop a bullet with their teeth. They dont have to be like superman and wonder woman. There are many hereos in the world, you just have to know where to look for them. They are just ordinary people a lot of the time. Many of them can be parents and grandparents. It all depends on what the person does to be considered a hero, such as a grandparent that would walk about 50 miles to get medicine for their sick grandson. That is what Phoenix Jackson did for her grandson in the short story, A Worn Path. Phoenix Jackson is a very old woman who lives out in the backcountry of Mississippi with her sick grandson. She takes care of him because she is his†¦show more content†¦On the way to getting her grandsons medicine she has to deal with a lot of harsh conditions to get to the big city. She has to go through marshes and thorn bushes. Swampy part where the moss hung as lace from every limb. Thorns, you doing your appointed work. Never want to let anyone pass, no sir . Phoenix has endured going through thorns and swampy places so that she can get the medication for her grandson. She never gives up, no matter how tough things get. She is determined to get to the city as soon as she can so that she can get back to see her grandson. Phoenix also forgets her purpose for the mission in which she goes every now and then. But soon after she remembers and keeps on going. Phoenix lives with her grandson who she takes care of. She has to walk all the way from her small home in the woods to the big city so that she can get medication for her grandson, who has a problem with his throat. But on the way she runs into harsh conditions. These conditions do not set her off her course or slow her down. Phoenix is a hero in her own way. She takes care of her sick grandson, and she walks all the way to the big city so that the medicine that her grandson needs would be free. Good literature is as this short story is. It shows the real world and not of the worlds where super heroes fly around the world 20 times in 10 seconds. Real life heroes arent like those in comic books. They are everyday people that do things like youShow MoreRelatedDecoding The Symbolism Used in A Worn Path by Eudora Welty1276 Words   |  6 PagesToday we will be talking about the different literary references used throughout Eudora Welty’s â€Å"A Worn Path†. I will explai n and decode different techniques used by the author throughout her story. The story is of an old southern African American woman, named Phoenix Jackson, making her way into to town to pick up her grandsons medication from the doctor’s office. But this is no normal old woman. She cannot see and is picking her way with a cane to make her way across a barrage of obstacles.Read MoreSymbolism in A Worn Path By Eudora Welty1096 Words   |  5 Pagesjust weren’t advancing economically. A Worn Path by Eudora Welty is a story about an old African American woman named Phoenix Jackson who takes a journey along a path with manifold of dangerous objects. Phoenix Jackson takes the journey thru the path because her grandson drank liquid named lye and got sick from his throat. Phoenix Jackson makes her journey thru the path to go to the doctor’s office to get some medicine. As Phoenix Jackson walks thru the path she encounters a lot of animals like foxesRead More Realism i n Eudora Weltys A Worn Path Essay1229 Words   |  5 PagesRealism in Eudora Weltys A Worn Path Eudora Weltys A Worn Path is a story that emphasizes the natural symbolism of the surroundings. The main character in the story, Phoenix Jackson, is an old black woman who seeks out to find medicine for her sick nephew. This story contains a motif, which is the continuous walking of Phoenix Jackson throughout her journey. She lives in the pinewoods and faces the challenging experience of walking through the snowy, frozen earth to get to the hospitalRead MoreSymbolism of the Title a Worn Path891 Words   |  4 PagesSymbolism of the Title â€Å"A Worn Path† The short story, â€Å"A Worn Path† by Eudora Welty describes a very interesting character whose name is Phoenix Jackson. She isn’t your average person. Phoenix is a very old and boring women but the story is still interesting. The title is very symbolic of the story and has a very good meaning. Throughout the story you begin to learn more and more about Phoenix and you also discover some important things. Phoenix Jackson is a very old and small woman. She wore a darkRead MoreAnalyzing ‚Äà ºA Worn Path‚Äà ¹ by Eudora Welty - 1875 Words   |  4 PagesAnalyzing â€Å"A Worn Path† by Eudora Welty In the story â€Å"A Worn Path†, Eudora Welty shows an old woman living in a time period where racial prejudice is very high and out of control. Phoenix Jackson is a grandmother whose motivation for living seems to be to nurture her grandson back to health. The strength of love may make people do or say unusual and implausible things. The central idea of this story is that love can empower someone to overcome many life threatening obstacles. This idea isRead MoreEssay about A Worn Path by Eudora Welty 21212 Words   |  5 PagesA Worn Path In the story by Eudora Welty, â€Å"The Worn Path† Phoenix Jackson is a complex character who defies a stereotype in a symbolic way. Weltys story describe Phoenix as the o;d lady who had to travel miles a day in order to prove to the other characters that her grandson was not dead. Having to prove that her grandson was not dead Phoenix had three traits of characteristics. She was loving, determined, and persistent. These traits help her to overcome being stereotyped and ultimately herRead MoreSymbolic Source In A Worn Path by Eudora Welty1287 Words   |  6 Pagescatching fire; their symbol is a mocking bird with an arrow on it. A Worn Path is about a long walk through the woods an old lady named Phoenix Jackson has to go through every time her grandson runs out of medicine. A long time ago her grandson swallowed lye that ruined his throat, the medicine is the only thing that relives the pain to his grandson. Throughout the woods to Natchez town Phoenix goes through so many things. Phoenix would go through the woods every time his grandson would finish hisRead MoreThe Character Of Phoenix Jackson, A Worn Path939 Words   |  4 Pages2014 The Character of Phoenix Jackson,† A Worn Path† Eudora Welty’s â€Å"A Worn Path,† is a story about an elderly woman name Phoenix Jackson walking on a path to Natchez to get some medicine for her ill grandson that swallowed some lye that affected him severely. The story portrayed a vivid idea of her personalities and the readers realize how unique Phoenix Jackson is. Phoenix faced many trials and tribulations while on her journey but she continued to move forward. Phoenix character is like noneRead Morecompare contrast1165 Words   |  5 PagesRose for Emily Vs. A Worn Path In the pages of the short stories, â€Å"A Worn Path† and â€Å"A Rose for Emily† we are able to see a similar side and connection between the two. As we look at the theme, tone, and morals we are able to better grasp the conflict in these two stories, while detecting whether the two protagonists, Miss Emily and Phoenix Jackson are psychologically splintered. The main moral in â€Å"A Worn Path† is the love, and life of Phoenix Jackson. â€Å"Though quite old and suffering from infirmitiesRead MoreA Worn Path Research Paper959 Words   |  4 PagesHeroic Efforts Of Phoenix Jackson In â€Å"A Worn Path† In Eudora Welty’s â€Å"A Worn Path,† the character Phoenix Jackson is introduced. Phoenix Jackson is an uneducated, African-American woman without any family besides her sick grandson. Phoenix is the hero of this story and fits the role well by delivering much-needed medicine to her grandson. Phoenix shows many distinct traits that reveal her to be a hero to her grandson. The heroic feats she accomplishes pave a path that leads to her satisfaction as

Sunday, December 22, 2019

John Keats Poetry Analysis - 864 Words

Despite his close association with romanticism, John Keats was not always a lover. A childhood friend said of Keats, â€Å"His penchant was for fighting. He would fight anyone (John).† Keats lived to be only twenty-five years old before dying of tuberculosis and spent several of those years training to become a surgeon before abandoning his apothecary studies to become a poet. The subject matter of Keats’ poetry ranges from politics, to Greek-style epics, to love letter odes to nature (John). Keats became more closely aligned with romanticism as he befriended other romantic era poets and was described as being part of a, â€Å"new school that would revive Nature and put a spirit of youth in everything (John),†Ã¢â‚¬  by Examiner editor Leigh Hunt.†¦show more content†¦Ã¢â‚¬Å"To Autumn† is filled with lush autumnal imagery that begins by describing autumn as the, â€Å"Season of mists and mellow fruitfulness, Close bosom-friend of the maturing sun (Keats To).† Keats praises the beauty and bounty of autumn throughout the poem and lauds it in a way that is not expected for the season that transitions the liveliness of summer to the sobriety of winter. In fact, Keats reassures autumn that it does not need to compare itself to spring, â€Å"Where are the songs of spring? Ay, Where are they? Think not of them, thou hast thy music too (Keats To).† This line seems oddly comforting to be addressed to a non sentient time of year, but given Keats’ other characterizations of autumn throughout the poem it makes sense. Through illustrations like, â€Å"Sometimes whoever seeks abroad may find Thee sitting careless on a granary floor, Thy hair soft-lifted by the winnowing wind (Keats To),† and, â€Å"sometimes like a gleaner thou dost keep Steady thy laden head across a brook (Keats To),† Keats depicts autumn as a rather feminine, graceful, gentle harvester. Given Keats’ taste for greek mythology, it is easy to see similarities between the description of autumn here and the Greek goddess of the harvest, Demeter. The most defining characteristic of romantic poetry is the appreciation of nature; â€Å"To Autumn† is essentially a love letter to nature. Each line of â€Å"To Autumn† treasures what the season does, â€Å"AndShow MoreRelatedAnalysis Of John Keats s Poetry1013 Words   |  5 Pagesit through the beauty of nature’s imagery. John Keats uses a different aspect of fall in each stanza. He describes the ripening of fruit, processes of the harvest, and sounds of insects and animals. Each aspect was expressed in such a way it was as if I was experiencing the aspects of autumn myself. There is something sublime about the things he is describing. His words take what I would see as ordinary and make it seem exceptional. Historical content Keats, a romantic poet, wrote â€Å"To Autumn† in 1819Read MoreJohn Keats s Life Of Poetry1024 Words   |  5 PagesLike many poets, John Keats has had a very troubling and traumatic life and it shows in his writings of poetry. Death and many other awful troubles causing him to have a life that anyone would feel horrible in. John Keat’s poetry has many dark recurring themes. One speculation is that his poetry was an escape from his melancholy filled life. There are many aspects to Keats’s life that could have been motivation to write his poetry. One would say that he connected works of poetry with the events ofRead MoreCombined Experience of Suffering, Death and Love all at Once1541 Words   |  7 Pagestheir work. John Keats was a famous poet who grew up in an idyllic life until tragedy continuously stroked until his death at twenty-five years old. At eight years old, his father died in a tragic riding accident. Six years later, his mother died of tuberculosi s (TB). In the midst of his troubles, his teacher strongly encouraged his reading and literacy ambitions. Living next to an insane asylum, Keats eventually started to develop physical and emotional problems. Diagnosed with TB, Keats helplesslyRead MoreLiterary Analysis Of John Keatss Ode To Autumn830 Words   |  4 PagesAnalysis of John Keats Ode to Autumn My initial reaction to this work evoked a taste of wanting to taste the fruit of season. The poem, Ode to Autumn, also reverted me back to my years of early reading when I read â€Å"The Secret Garden†. I am enamored by the way Keats almost makes me see the fruit and vines. Reading about the symbionic relationship that takes place between the sun and the changing season is awe-inspiring; as it relates to the reaction or the beauty that is created based on that relationshipRead MoreJohn Keats: The Next Shakespeare Essay829 Words   |  4 PagesJohn Keats can easily be ranked as the top British poet to ever live; or at least in the top five ranking mark. His usage of his poems structures has become famous, just as his poems have become famous. Due to the young death of this famous poet, his literary work was cut short. Ever since he knew he was going to die, when he discovered he had contracted tuberculosis, he had thought that he would never be remembered; so much so that a ccording to the web-site â€Å"Poets Graves† which states the inscriptionRead MoreJohn Keats : The Five Senses, Reality Departures, And Nature1628 Words   |  7 Pagesâ€Å"If Poetry comes not as naturally as Leaves to a tree it had better not come at all† (biography). John Keats was an English-born poet who was known for his sonnets, romances, and epics. He was a well-known romantic poet who was criticized because of his style of poetry. In his poems, Keats uses frequent themes such as death, the five senses, reality departures, and nature. As a romantic poet, John Keats uses imagery and emotion based themes as way to display his beliefs in his poetry. Born inRead MoreAnalysis Of The Poem Ode Of Spring By John Keats Essay1376 Words   |  6 PagesIn the poem Ode to Autumn by John Keats, my initial thoughts of this work is how the author does a beautiful job describing the season. The way that he makes his words come to life. The poem makes you feel as if you are right there in the midst of autumn. As I read through the poem, it was as if I could inhale the autumn air. I think the thing that I loved most about this piece is the mere fact that it is my most favorite season of the year. When the poem talks about the songs of spring, it tellsRead Moreâ€Å"Beauty is truth, truth beauty† Essay767 Words   |  4 PagesOf the five odes written by John Keats, this ode was written to show the beauty of love through a work of art. This work of art is a Grecian Urn, one side adorned with a woman being pursued by a â€Å"bold lover† and on the other a priest leading a heifer to be sacrificed. The beauty of this poem is given in five stanzas of iambic pentameter with a two part rhyme scheme, giving the poem a sense of a two part structure and, furthermore, two meanings just as there are two sides of the urn. The manifestRead MoreGood Morning And Thankyou For Tuning Into The Poet s Voice1391 Words   |  6 Pagesyou a poem called â€Å"Ode on Melancholy†, by the British Romantic poet John Keats, who is arguably the most popular romantic poet of his era. Through a discussion of Keats and a close analysis of the poem I will talk about how â€Å"Ode on Melancholy† upholds the dominant ideologies of the romantic period, the period in which the poem was constructed. First of all, we must delve into John Keats and explore his life a little. John Keats was born on the 31st of October, 1795, in London where he lived withRead More An Analysis of On Sitting Down To Read King Lear Once Again Essay1144 Words   |  5 Pages An Analysis of On Sitting Down To Read King Lear Once Again nbsp; The poem On Sitting Down to Read King Lear Once Again by John Keats is a sonnet about Keats relationship with the drama that became his idea of tragic perfection, and how it relates to his own struggle with the issues of short life and premature death. Keats uses the occasion of the rereading this play to explore his seduction by it and its influence on himself and his ways of looking at himself and his situation in spite

Saturday, December 14, 2019

Social Structure Theory Paper Free Essays

Statistically, people in one social environment do end to behave differently from people in a very different environment. Social structure are patterns that reflect our everyday lives. Poor people are viewed as the main ones quick to commit crimes. We will write a custom essay sample on Social Structure Theory Paper or any similar topic only for you Order Now Cultural deviance leads, for example, to the formation of well-organized gangs. If poor behavior in younger children is pointed out early and seek help in advance the problem should be prevented. Most violent behavior with children begin at home then occurs next in school. Young children experiencing delinquent behavior should be seen by a psychiatrist to diagnosis the issues. I am going to discuss n the last part of this paper, what are some possible ramifications for this social policy change. The video that I have chosen for this paper is the â€Å"Senseless Hate Crime† to best fit with my agreements of the social structure theory being the main reason for criminality evolving. Social structure theory is defined as unfavorable circumstances among the economic class being the main concern of crimes occurring. Crime occurs when people are frustrated by the lack of financial success. Some people who are under stress turn to crime, but negative emotions may build up. It is armor that most young adults who are fresh in college will experience doing drugs or drinking alcohol. Running head: SOCIAL STRUCTURE THEORY PAPER 3 Most young adults that become drug or alcohol addicts must have their substance. If addicts are without their substance he/she will do whatever comes to his/her mind. In the video â€Å"Senseless Hate Crime† on July 2, 1 990, a man named Julio Riviera was killed by a gang known as DMS because he was gay. Riviera was a considered a peaceful man that worked as a bar tender. Riviera was loved by his community and he was trying to escape the violence n the streets in Queens, New York. There were three guys that killed Riviera in a schoolyard in Queens, New York. One of the top suspects was 21 year old Daniel Doyle who was a college student that became a violent person in college. Doyle became addicted to drugs and would tease other students at school. He was raised by his parents who raised him to be a respectful and responsible adult. His behavior had changed and Doyle became involved in a gang known as Doc Martens Skinheads. Erik Brown twenty-one years of age and Seat Basic twenty years of age both help brutally murder Julio Riviera. Doyle along with his two friends were out drinking at his house and they left headed out to kill whoever they could find as a target. They ended up finding Mr.. Riviera hanging out and he became their victim. This film was selected because it explains the causes of how an innocent life can be taken. Mr.. River did not know that he was a target to someone murdering him. His life was taken due to irresponsible young adults who abused drug and alcohol. Doyle and his friends chose to join a gang that would forever destroy their lives as young adults. According to Christian Parents says that, â€Å"when crime is a reusing issue, community infiltration frequently focuses on stopping the violence rather than on broader questions of social justice and economic redistribution† (2000). Mr.. Riviera was a man that was innocently killed by violent young adults, who were under the influence of alcohol. 4 The people in Queens, New Horal felt that the case should have been classified as a hate crime, but Mr.. Riviera autopsy reports revealed he had drugs found in his body. Mr.. River’s case was a very disturbing case especially for his family, they believe justice was served, but it took a while for it to occur. The case should have automatically been reviewed as a hate crime. The people of Queens, New York, felt that it was wrong for Doyle and his two friends to have killed Mr.. Riviera for no apparent reason. Law enforcers had to investigate the case a second time to make determination on what to label the case under. His family wanted the right kind of justice served for their victim’s murder. The people of Queens, New York believed the case should be considered a hate crime. Doyle testified in court and informed the court that he came up with the idea to kill whoever he could find as a target. Doyle and his two rinds ended up meeting up with Mr.. Riviera. Mr.. Riviera did not assume that his life would come to end on July 2, 1990. River’s family were in disbelief that Mr.. Riviera was announced dead due to his sexual status. His sister-in-law Peg Riviera did not believe Mr.. Riviera was not just murdered for doing anything wrong. She did not get to meet her brother-in-law until after 15 years. She would go and visit the bar that he loved and worked. She pointed out that Mr.. Riviera was well liked man in Queens, New York. The people eventually began to fight back for what they believed about Mr.. River’s case as a hate crime. The people of Queens, New York, protested until the authorities reviewed the case again before finalizing a decision. 5 According to Payday Halyard and Steve Combs states that, â€Å"For it is clear that various forms of harms are not distributed randomly, but fall upon people of different social classes, genders, degrees of able-bodiless, racial and ethnic groups, different ages, sexual preferences, and so on† (2007). Mr.. River’s lost his life because he was gay, but he is still considered a human that is attractive to the same sex. Everyone has the freedom of speech, to believe in what they want to believe n, and rights that are protected that cannot be violated. We as people cannot do not have control over other people’s sexual status. Gay, lesbians, and other homosexuals should not be treated any differently than normal human beings. Those that are homosexuals believe in dating the same sex instead of opposite sex. No one should not be murdered because of their sexual status. People that target homosexuals should be given life behind bars without the possibility of parole. Mr.. Riviera was picked on by three irresponsible and uncaring young adults. He deserved to be accepted no matter what he lived in. They are old enough to know that people have feelings and their feelings should matter. Innocent people that are killed because of their sexual status deserves the right kind of justice. Everybody is different in every way, but we all should be able to come together as one in this world. Homosexuality is not a crime and the police cannot arrest anyone for being gay. Homosexuals should be respected because it provides happiness to the couples. If homosexuals are not being respected their rights are being violated. Homosexuals are entitled to make considerations as straight people. They do not have to hide their identity because they represent themselves. They are people who are ready to adopt new ways of doing things. It is a fact that homosexuality is role portrayed in every society. Homosexuals are main targets that are being bullied by other people who are against their beliefs. 6 Conclusion Based from the video â€Å"Senseless Hate Crime† a homosexual man named Julio Riviera was killed because of his homosexuality. Three young adults decided to kill an innocent person whoever they saw first as a target. Doyle was the main suspect in Mr.. River’s case. Mr.. Riviera did not bother no and e work in a bar as bar tender. On July 2, 1990, Mr.. River’s life was taken and his death left a toll in the city of Queens, New York. Doyle and two of his companions were drunk at his house party and headed out to take an innocent life. Doyle and his companions did not care who they targeted. Their minds were set on killing somebody. In this case Doyle should have receive life behind bars without the possibility of parole or the death penalty. Doyle and his companions violated Mr.. River’s right. They abused his homosexuality rights as being accepted as a homosexual. They are young adults with maturing minds, but they did not have to target anyone as a victim. They were drunk and Doyle knows how his attitude gets when he is under the influence of too much alcohol. Doyle peer pressured his two companions into murdering someone, but they all were responsible for their own actions. Mr.. Riviera was only hated by Doyle and his two companions. The saying is friends do not let other friends drink alcohol. If Dole’s friend really cared for him as a friend they would have tried to change Doll?s mind about his idea. Dole’s friend could tried to reach out for help if he tried to effuse their help. How to cite Social Structure Theory Paper, Papers

Thursday, December 5, 2019

Digital Forensics Investigative Plan †Free Sample Available

Question: As part of the auditing team in capacity of a Digital Forensics expert, your task is to prepare digital forensics investigative plan to enable a systematic collection of evidence and subsequent forensic analysis of the electronic and digital data. Assuming all systems are Windows based, this plan should detail following: (1) Justify why use of the digital forensic methodology and approach is warranted including procedures for corporate investigation.(Apply with the case study) (2) Describe the resources required to conduct a digital forensic investigation, including team member skill sets and required tools. .(Apply with the case study) (3) Outline an approach for data/evidence identification and acquisition that would occur in order to prepare the auditors for review of the digital evidence. (Apply with the case study) (4) Outline an approach and steps to be taken during the analysis phase making the assumption the computer system is a Microsoft Windows-based computer. .(Apply with the case study) (5) Create a table of contents for the investigative plan describing what the primary focus of the report would be. .(Apply with the case study) Answer: Executive Summary Global Finance Company is one of the largest companies in Australia with 10,000 employees placed in all over the world, in its branches. The company has multiple sectors of interest that include investment, superannuation and retirement services. The clients of the company start from individuals to larger corporate and superannuation fund investors. The expertise of the company includes fixed interest, property, fixed interest, private equity, infrastructure and global shares. Company has initiated the global business in the year 2000, with the assistance and support of Information Technology. Information security has become a concern, over the years after setting the IT infrastructure. Company realizing the security of the information after a suspicion of compromise happened in one of its regional branch, enforces a digital forensic audit team to explore the sources of compromise with the vision of applying securing practices throughout all its branches in the world. Introduction A concern has been raised Queensland branch, in one of its regional branches by a suspicion of compromise of computer of a manager. Information security officer, at head office, who is accountable to the incident, has enforced an audit team to investigate the source of compromise and to submit the report to the officer. The case study includes the complete digital forensic process done by the audit team.Global Finance Company and the Concern Global Finance Company is an international player in the financial market with 10,000 employees working throughout the world. The company actively provides financial services both in Australia and outside Australia. The company has introduced computerization and network communication among all the branches by setting up information technology infrastructure worldwide, in the year 2000. Right from then, security of the information has not been taken as the priority and no such actions were taken accordingly. Recently a concern was raised by one of the managers from the regional branches, regarding the security of the information, as the manager suspected that the computer used had been compromised. Having no active supervision of the information and its security with poor implementation of the network segmentation and firewall, the information security officer believed the suspicion and enforced a digital forensic audit team to investigate the security concern and provide the report to the same officer. The investigation proposed was to be done over the data present in the managers computer, like MS-Word, Spreadsheets, Outlook and also deleted files. Digital Forensic Methodology The information security officer has understood that the computers and network over the regional branches are not enough secured as the firewalls and network segmentation were poor. So, the officer has proposed a macro level investigation, digital forensic methodology, which includes many of sub-methodologies like computer forensic, mobile forensic, data recovery.Whatever the digital forensic methodology applied and followed by the audit team, the team has to be abide the following principles, which are for the private company investigation. 1.The data present in the targeted computers must be preserved as is and should not be modified, as the same data has to be presented as a reference in the report.2. The audit team member must be have enough expertise, so that the original data can be handled safely, as the data is the precious and significant resource of the company.3. The audit trial and relevant documentation that is involved in the entire process must be well preserved.4. Information security officer is the whole and sole responsible for the audit and security of the information of the company. Scope of the Digital Forensic Investigation The scope of the investigation involves the following.1. To identify all possible malicious activities explored with 5Ws or why, where, what, when and who, caused for the compromise of the managers computer2. To identify the security lapse3. To identify all possible digital evidences from every computer and associated network present in the Queensland branch office4. To find and analyze the impact of the compromise to the branch5. To identify the relevant legal procedure, when illegal or alleged misconduct activity is found6. To submit the detailed final report to the chief, the information security officer, located in the head office, who takes the consequent actions to be performed to secure the information in all the branches of Global Finace. Digital Forensic Approach We apply Four Step Forensics Process for the case of Global Finance information security concern. Figure 1: FSFP Digital Forensic Model Digital Forensic Preparation For The Investigation FSFP Digital forensic investigation process is conducted in phases. The phases are, PHASE 1 - COLLECTION OF REQUIRED RESOURCES Collection is the acquisition of the data after identifying, labeling and recording it from all the computing devices in the Queensland branch. Data collection is done in two ways, volatile data collection and non-volatile data collection. While the data is got ready for the collection, the impact of investigation also has to be made, in terms of down time and productivity of the company. Managers computer should not shut down as the running system can give crucial information, about the compromise. Volatile Data Acquisition The managers computer, which is the targeted computer must be accessed through the LAN connection. Here the servers and workstations are run on Microsoft Windows and the same OS based. cryptcat tool can used to hear from the server of the network. A tool set that is trusted to be used and record through cmd.exe file. Then the commands have to be executed. Cryptcat 6543 k key Cryptcat -1 p 6543 k key Graphical user interface tools also are to be used like RootKit Revealer, Tcpview and Process explorer for collection potential hidden data of the system. other Windows based tools that are to be used on the Windows based systems are, HBGrays fastDump to aquire the local physical memory HBGrays F-Response to acquire remote physical memory Ipconfig for collecting the subject system details Netusers and qusers for identifying logged in user information Doskey or history for collecting command history Netfile for identifying the drivers and services Volatile data acquisition is done from various computing resources. RAM or Random Access Memory, Cache memory and registry Information from firewalls, network diagrams, servers, switches, routers, implemented networking devices like routers, etc. Data from clipboard is very significant and potential source for the forensic investigation Network connection, network data, running processes Non Volatile Data Acquisition Non volatile data is collected from the permanent storage devices. Copying the non volatile data from the regional office is done and this process is called forensic imaging. All t Permanent storage data from Hard Disc, pen drives, DVDs, CDs, pen drives, flash drives and remote computer. Online data like database logs, application logs, web server logs, Windows event logs, firewall logs, IDs logs, antivirus logs and domain controller logs All the non volatile data is collected from the target managers computer. The data has to be preserved without doing any modifications. Forensic imaging can be accomplished by various tools like, FTK, ProDiscover and EnCase. The data is copied as the read only memory by the audit team, using the write blocker. This process is different from the hard disc cloning, as it cannot give integrated data including the metadata.Apart from the volatile and non volatile data acquisition, online and offline data acquisition is also performed by the audit team. Online tools used for tracking online information are Wireshrk or ethereal tool.Once the audit team collects all the digital evidences, these evidences are to be well documented right from beginning to the end so that the integrity can be maintained. The entire media is made to be read only, till the report is submitted to the information security officer. PHASE 2: EXAMINATION After the digital evidence collection, the team does thorough examination with the help of many forensic investigation tools. The examination is conducted for the following. File System Examination NTFS or New Technology File System disc is a configuration file, and it contains MFT or Master File Table. MFT carries the important information regarding the discs and files in the operating system in the form of records of metadata. MFT carries residential and non residential files.The data stream file is stored as c: echo text_mass file1.txt:file2.txt The above can be accomplished from the command, c:more file1.txt:file2.txt Windows Registry Examination Team considers the Windows registry to be a critical source from its crutial log file, as these logs can reveal potential information about modifications done to the file, lastwrites attempted. The windows registry structure, in terms of its hives are, HKEY_CLASSES_ROOT HKEY_USERS HKEY_CURRENT_USER HKEY_CURRENT_CONFIG HKEY_LOCAL_MACHINE Autostart : it is a part of registry, which is launched without the user initiation. Most Recent Used List or MRU: It shows all the current activities. User Activity: actions and activities performed by the user on taget computer can be investigated through the hive, HKEY_CURRENT_USER Audit team can gather several other clues from UserAssist, Wireless SSIDs, USB Removable Storage, and many others. Audit team gathers much important evidences from the past data history of the target computer. Database Forensic Examination The database stored in the managers computer is well tracked by the team, in terms of data identification, preservation and analysis. The remote connections, IP addresses for the possibilities of authorized and unauthorized access of the target computer. They use Data Definition Language or DDL, Data Manipulation Language or DML for database transactions. Customized configuration file can be used by the team to execute Distributed Management Views and Database Consistency Checker. Network Forensic Examination Packet forensic or mining is to be tracked by the team through the network to track the network traffic for browsing data, queries, mails, etc. Network forensic is done two ways like security related data and law enforcement related data. Audit team can further grab the system information, process listing, service listing, logged on users, registry data, system information, network connection, binary dump into the memory. Packet sniffers are also used to identify, mapping, email communication, fingerprinting and many others. PHASE 3 - ANALYSIS After each and every piece of data is examined for potential unauthorized sources, the analysis is done by the team, as, Gather the unusual or hidden files For unusually opened sockets Unusual accounts Unusual application requests Malicious activities Complete file systems analysis Complete memory analysis Patching level system and updated levels Malicious activities Complete timeline analysis Malware analysis Complete event correlation analysis Malware analysis is deeply analyzed as it is the potential source of compromise and it includes the sub tasks like prefetch examination, registry examination. Audit team may use either static analysis or dynamic analysis for the malware analysis. PHASE 4 - FINDINGS The findings are then considered to be listed by the audit team and are summarized as follows, Identification of the computer of the manager by the attacker through remote access OS patches, in case not done in the target computer Identification of the source of compromise of the computer Suspected malware PHASE 5 REPORT Audit team finally generates the final report in any of the format, like verbal report, formal report, examination plan or written report. In this case a formal and written report is generated to submit to the information security officer in the head office. Final Report Purpose of the Report The report is submitted for the formal digitally investigated information about every source of compromise happened to the managers computer, and the rest of the computers in the regional office. Author of the Report Information Security Officer Incident Summary The source of the compromise explored from the managers computer is caused from x1, x2 and x3 reasons evidence Every log file and every important digital evidences tracked in the investigation analysis Analysis of the unauthorized sources, done from the sources x, y and z conclusion The managers computer and every other computing device in the regional office are thoroughly digitally investigated and finally the sources of compromise are found supporting documents Supporting documents include Volatile and non- volatile data, registry info, log info, every reports generated from the analysis tools and so on. CONCLUSON The managers computer, which is suspected for the compromise and the rest of the computing devices present in the same regional office are thoroughly and successfully examined for the potential authorized and unauthorized sources and the source of compromise has been explored and found. The final report is being submitted to the accountable person, the information security officer. REFERENCES Kenneth J. Zahn (2013), Case Study: 2012 DC3 Digital Forensic Challenge Basic Malware Analysis Exercise, GIAC (FREM) Gold Certification John Ashcroft (2001), Electronic Crime Scene Investigation, A guide for First Responders, NIJ Guide M Reith, C Carr, G Gunsch (2002). "An examination of digital forensic models". International Journal of Digital Evidence Richard Brian Adams (2012), The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice Agarwal, A., Gupta, M., Gupta, S., Gupta, S. C. (2011). Systematic Digital Forensic Investigation Model, International Journal of Computer Science and Security, 5(1), 118-130. Armstrong, C. (2003), Mastering Computer Forensics. In C. Irvine H. Armstrong, Security Education and Critical Infrastructures Kluwer Academic Publishers.