Computer forensics examiners

Assignment Help Basic Computer Science
Reference no: EM131229063

This week you are reading and watching about the forensic tools used by Computer Forensics Examiners. While the two most popular tools are Guidance Software's EnCase and AccessData's FTK, there are other tools that are available and should be part of your toolbox. Once you have properly identified and collected digital evidence, the next step is to analyze it. It does not really matter if you are performing analysis as part of a criminal investigation or as part of a corporate investigation; you should always follow the same protocols. An emphasis in this course is on helping you understand why using an analysis protocol is important. Remember, you should NEVER, EVER work on original evidence, if it can be avoided by any means; instead, use a forensic image. When you work on the image, you pick the tools you will use. Again, it does not matter which tool you actually use, as long as the tool is accepted by the forensic community, and you are able to testify to the tool's validity, as well as the process you used in your examination.

During your analysis, you should document every step you take and all of your findings. Some tools have a report function that works well to capture both the identified data and the date/time of your various analyses. However, this should always be supplemented with your own notes and documentation.

This week, I would like you to discuss why you need to use a write blocker (either hardware or software) in your examinations, whether for a criminal case or a corporate case.

Also, imagine you are a computer forensic examiner receiving a suspect hard disk drive from a detective in your department. The drive was seized properly during a legally executed search warrant. The detective signs the chain of custody log and hands you the drive. Your job is to accept the drive, conduct an analysis, and maintain the drive until trial. Please explain the steps you would take, from receipt until testimony, including the reasons why you would take each step. For example, what would you check for when you sign for the drive on the chain of custody?

Reference no: EM131229063

Questions Cloud

Research replacement desktops for our dell optiplex : You have been asked to research replacement desktops for our Dell Optiplex 755 systems running 4GB of RAM with 500GB of storage. Take time to research this model and come up with a vialble replacement solution. Explain how CPU speed, amount of mem..
Reads the same forwards and backward : 1. If an array contains n elements, what are the maximum number of recursive calls made by the binary search algorithm? 2. A palindrome is a string that reads the same forwards and backward. consider some example
Prominent black professor takes unpaid leave of absence : A prominent black professor takes an unpaid leave of absence to protest the fact that his extremely prominent university has failed to ever hire any black females in tenure-track (regular, permanent) positions on the faculty. When he does not return ..
Write a 2d tm mode fdtd simulation that is 100 grid cells : Now, investigate the stability of this problem by varying ?t; how large can you make ?t before the simulation goes unstable? Can you surpass the CFL condition? Why or why not?
Computer forensics examiners : This week you are reading and watching about the forensic tools used by Computer Forensics Examiners. While the two most popular tools are Guidance Software's EnCase and AccessData's FTK, there are other tools that are available and should be part..
Employees should be used to such rude and crude behavior : A construction company was sued for harassment when it failed to take seriously the complaints about offensive graffiti scrawled on rented portable toilets. The employer defended by saying (1) employees should be used to such rude and crude behavior;..
Claim for violation of the constitutional right : Can a government employee state a claim for a violation of the constitutional right to privacy when she was required, as a job applicant, to sign an affidavit stating that she had not used tobacco products for one year prior to the application date?
Determining the network standards and protocols : List and discuss at least three major ways your life has been impacted due to the ability to communicate over the Internet? What specific network standards and protocols do you use personally when communicating over the Internet?
What are the six main barriers to effective communication : What are the six main barriers to effective communication? Which barriers are easiest to surmount? Why? please provide a different answer than the ones that have already been answered.

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Identify the basic operation of the following algorithm

Identify the basic operation of the following algorithm (that takes as input an array A[0... n-1] of n integers) and analyze its worst-case time complexity.

  Write and test a version of selection sort for linked lists

Write and test a version of selection sort for linked lists. Write a program to test insertion sort for linked lists.

  Briefly describe the data collection techniques

Briefly describe the data collection techniques. Did the researcher use appropriate data collection techniques (qualitative and/or quantitative) to answer the study's research questions

  How often are network standards reviewed

1. How often are network standards reviewed? The standards are reviewed and updated approximately every 5 years. 2. What category of UTP cabling is the minimum for a telephone cable? Cat 5 is used for telephone cable, before Cat 5, Cat 3 was used.

  Is this now restricting the nature of the data in any way

Write another method to copy the data, inserting each item in order into the cell array.

  Bob''s encryption company

Suppose Bob's encryption company produces two machines, A and B, both of this are supposed to be implemen- tations of RSA using the same modulus n = pq for some unknown primes p and q

  Revisiting the deployment diagram

The only thing constant in the information technology landscape is that things always change. Such is the case for the textbook ordering system you examined in the previous unit.

  Significance of strategic management

Explain the significance of strategic management to support telecommunications planning model.

  Vba programming homework

VBA Programming homework: 1. A cosine can be approximated by the following infinite series: cosx=1-(x2/2!)+(x4/4!)-(x6/6!)+...

  Fancy company header

Design a modular program that allows the user to enter the number of rooms that are to be painted, the approximate square feet of wall space in each room (it may differ from room to room), and the price of the paint per gallon.  It should then cre..

  Give the function table and explain its operation

Give the function table and explain its operation.

  What other motivations may prompt such alliances

Discuss the reasons that companies embark on cross-border strate- gic alliances. What other motivations may prompt such alliances?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd