Author Archives: 2201798295alifio

COMP6348 Network Forensics – Week 10

Some things we learned this week are: Types of storage media includes; ROM, NVRAM, DRAM, CAM and Hard Drive. Switches are used to map MAC addresses to the corresponding physical switch ports. There are different types of switches; such as, … Continue reading

Posted in Courses Related | Leave a comment

COMP6348 Network Forensics – Week 8

Some of the things we learned this week are: We learned about the differences between NIDS and NIPS. NIDS or network intrusion detection system examines the network traffic patterns to identify intrusions for an entire network. NIPS or network intrusion … Continue reading

Posted in Courses Related | Leave a comment

COMP6348 Network Forensics – Week 7

Some of the things we learned this week includes: The differences of AM & FM radio signals. AM refers to amplitude modulation, whereas FM refers to frequency modulation. AN AM signal usually has more ranges as compared to FM signals, … Continue reading

Posted in Courses Related | Leave a comment

COMP6348 Network Forensics – Week 5

Some of the things we learned this week are: The goal of evidence acquisition is to find & gather data from various network sources in an organization, though trying to minimalize the impact on the organization itself while doing so. … Continue reading

Posted in Courses Related | Leave a comment

COMP6348 Network Forensics – Week 4

Some of the things we learned about this week are : We learned about flow analysis. Flow itself refers to the act of sending a group of packets from a source to a certain destination. Flow analysis, is simply an … Continue reading

Posted in Courses Related | Leave a comment

COMP6348 Network Forensics – Week 2

Some of the things we learn about this week: Some sources of network-based evidences are: On the wire, these are physical cabling that carries data over the network. In the Air, these refers to wireless stations – to – station … Continue reading

Posted in Courses Related | Leave a comment

COMP6348 Network Forensics – Week 1

Some of the things we learn about this week: Network forensics is a part of digital forensics that focuses on monitoring and analysing network traffic. Its purpose is for intrusion detection/prevention, information gathering and legal evidence. Some differences regarding a … Continue reading

Posted in Courses Related | Leave a comment

COMP6210 – Ethical Hacking and Penetration Testing

Here are some of the tools used during the penetration testing for the final project report. Name: Alifio Rasendriya Rasyid ID: 2201798295 Class: L4BC-LEC Tools Used: 1. censys.io Censys is a search engine that scans the Internet searching for devices … Continue reading

Posted in Projects | Leave a comment

COMP6345 – Intelligent Systems, Weekly Report

Week 1 This week we were introduced to the world of Artificial Intelligence (A.I) and Machine Learning (M.L). We learned about the differences between A.I. and M.L. as well as a short history of it; for example, we learned about … Continue reading

Posted in Courses Related | Leave a comment

ISYS6169 – Final Project Team Contribution

Nicholas Michael Halim : Adding the UI effect, Make a graph/chart revenue on home menu, Back-end programming, Add convert PDF invoice code, Handle complex query, and final project report. Alifio Rasendriya Rasyid : Adding the UI effect, Designing UI, Whole … Continue reading

Posted in Projects | Leave a comment