Computer forensics examiners

Assignment Help Basic Computer Science
Reference no: EM131229063

This week you are reading and watching about the forensic tools used by Computer Forensics Examiners. While the two most popular tools are Guidance Software's EnCase and AccessData's FTK, there are other tools that are available and should be part of your toolbox. Once you have properly identified and collected digital evidence, the next step is to analyze it. It does not really matter if you are performing analysis as part of a criminal investigation or as part of a corporate investigation; you should always follow the same protocols. An emphasis in this course is on helping you understand why using an analysis protocol is important. Remember, you should NEVER, EVER work on original evidence, if it can be avoided by any means; instead, use a forensic image. When you work on the image, you pick the tools you will use. Again, it does not matter which tool you actually use, as long as the tool is accepted by the forensic community, and you are able to testify to the tool's validity, as well as the process you used in your examination.

During your analysis, you should document every step you take and all of your findings. Some tools have a report function that works well to capture both the identified data and the date/time of your various analyses. However, this should always be supplemented with your own notes and documentation.

This week, I would like you to discuss why you need to use a write blocker (either hardware or software) in your examinations, whether for a criminal case or a corporate case.

Also, imagine you are a computer forensic examiner receiving a suspect hard disk drive from a detective in your department. The drive was seized properly during a legally executed search warrant. The detective signs the chain of custody log and hands you the drive. Your job is to accept the drive, conduct an analysis, and maintain the drive until trial. Please explain the steps you would take, from receipt until testimony, including the reasons why you would take each step. For example, what would you check for when you sign for the drive on the chain of custody?

Reference no: EM131229063

Questions Cloud

Research replacement desktops for our dell optiplex : You have been asked to research replacement desktops for our Dell Optiplex 755 systems running 4GB of RAM with 500GB of storage. Take time to research this model and come up with a vialble replacement solution. Explain how CPU speed, amount of mem..
Reads the same forwards and backward : 1. If an array contains n elements, what are the maximum number of recursive calls made by the binary search algorithm? 2. A palindrome is a string that reads the same forwards and backward. consider some example
Prominent black professor takes unpaid leave of absence : A prominent black professor takes an unpaid leave of absence to protest the fact that his extremely prominent university has failed to ever hire any black females in tenure-track (regular, permanent) positions on the faculty. When he does not return ..
Write a 2d tm mode fdtd simulation that is 100 grid cells : Now, investigate the stability of this problem by varying ?t; how large can you make ?t before the simulation goes unstable? Can you surpass the CFL condition? Why or why not?
Computer forensics examiners : This week you are reading and watching about the forensic tools used by Computer Forensics Examiners. While the two most popular tools are Guidance Software's EnCase and AccessData's FTK, there are other tools that are available and should be part..
Employees should be used to such rude and crude behavior : A construction company was sued for harassment when it failed to take seriously the complaints about offensive graffiti scrawled on rented portable toilets. The employer defended by saying (1) employees should be used to such rude and crude behavior;..
Claim for violation of the constitutional right : Can a government employee state a claim for a violation of the constitutional right to privacy when she was required, as a job applicant, to sign an affidavit stating that she had not used tobacco products for one year prior to the application date?
Determining the network standards and protocols : List and discuss at least three major ways your life has been impacted due to the ability to communicate over the Internet? What specific network standards and protocols do you use personally when communicating over the Internet?
What are the six main barriers to effective communication : What are the six main barriers to effective communication? Which barriers are easiest to surmount? Why? please provide a different answer than the ones that have already been answered.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Why is this convention critical to the effective use of tree

Why is this convention critical to the effective use of the binary search tree?

  Estimate for risk management in accompanying data

Estimate for risk management as shown in accompanying data, which vulnerability must be evaluated for additional controls first? Which one should be evaluated last?

  Event viewer console for warnings and errors

Check the Event Viewer console for warnings and errors. You must start an in-place upgrade from within the existing operating system, so you cannot count on Windows Server 2012 R2 to correct any problems that prevent the computer from starting or ..

  Explore the intermediate phases

Explore the intermediate phases.

  Advantages and disadvantages of combining the session

advantages and disadvantages of combining the session

  Define a true wireframe model

What is the minimum information needed to define a true wireframe model? Is there enough information in a wireframe model to determine which edges are hidden?

  Promote travel programs hosted by the library

As a volunteer at your local public library, you are helping to promote travel programs hosted by the library. The head librarian has created a document with specifics for an upcoming program called Timeless Travel Tips.

  Empowering a person using health and social services

Investigate and illustrate ways of empowering a person using health and social services

  Record and add narration and timings to a slide show

Describe the various transmission mediums and explain the best use of each with various examples of business use.  Identify communications capabilities of each medium and the types of signals that are used for each.

  Assignment on the hot topic in human computer interaction

Assignment on the hot topic in human computer interaction

  What is the programming model of a hcs12 microcontroller

What is the programming model of a HCS12 microcontroller

  Explain what is establishing security controls

Explain what is Establishing Security Controls and why it is necessary for record keeping(e.g. what characteristics of records, recordkeeping systems or processes does it support?)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd