Write a report outlining methods of acquiring image in linux

Assignment Help Operating System
Reference no: EM13833337

Task 1: Case Project

You are required to acquire an image of a disk on a computer which is removed from an incident scene. You discovered that it is a Linux computer. What are your options to acquire the image? Write one to two pages report to specify the hardware and software you would use.

Deliverable: Write a 300-500 words report outlining two methods of acquiring an image in Linux. Student can use Kali and Ubuntu Linux virtual machine (VM) images provided in this subject's lab.

Task 1: Research Project

Your supervisor has asked you to research current acquisition tools that would able to investigate major smart phone operating systems such as Android and Apple vendors. Form a comparison table including the following information:

a. OS and/or phone vendors supported;

b. Platform designed to run on;

c. Type of information possible acquired such as device information, phonebook, logs, etc..;

d. Cost.

Deliverable: Minimum of five forensic vendors listed with in-text references to provide under each vendor column. Wikipedia information will not count as vendor source.

Rationale

This assessment task covers digital crime, forensic process and procedures, data acquisition and validation, e-evidence, e-discovery tools and equipment, operating systems and file systems. This assessment has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to:

• determine the legal and ethical considerations for investigating and prosecuting digital crimes

• formulate a digital forensics process

• evaluate the technology in digital forensics to detect, prevent and recover from digital crimes

• analyse data on storage media and various file systems

• collect electronic evidence without compromising the original data;

• evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab;

• compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation;

• prepare and defend reports on the results of an investigation.

Reference no: EM13833337

Questions Cloud

Application of corporate strategies : Briefly trace the development and growth of the organisation from its beginnings to the present through the application of corporate strategies - what types of strategies have these been?
Why is the burden of proof on the plaintiff : Using the Internet or www.google.com find three companies that have settled discrimination lawsuits in the last two years and indicate the following for each company: Company Name and Year Lawsuit was settled. Why is the burden of proof on the plai..
Compute the total revenue-the total cost : You are the manager of the surgery department at a hospital which serves mostly Medicare patients. The hospital performs 1,000 surgical operations per year using the traditional method. Compute the total revenue, the total cost, and the profit at the..
Elaborate on the meanings of the details and quotes : Write an essay that discusses why and how specific symbols are used to depict one or two of the themes from Unit 2 in a particular way. Your essay should incorporate details and quotes from the story (using parenthetical documentation with the author..
Write a report outlining methods of acquiring image in linux : Write a 300-500 words report outlining two methods of acquiring an image in Linux. Student can use Kali and Ubuntu Linux virtual machine (VM) images provided in this subject's lab.
Using primary authority as sources write a memo to mark life : Mark and Lindsey Armstrong recently divorced. Although grief stricken, Mark was at least partially comforted by his monthly receipt of $10,000 of alimony. Due to problems with the real estate market Mark and Lindsey have been unable to sell their Mc ..
Determine the equilibrium price and quantity in this market : Assume the market for a commodity is described by the demand and supply functions. Determine the equilibrium price and quantity in this market.
The syndicated bank loan market : In 1998, the Syndicated Bank Loan market (defined as loans having more than two bank lenders) was a vast and cheap source of debt financing for U.S. corporations. This market was characterized by a large number of financial institutions that aggressi..
The value of the asset : Assume you have an asset which will pay 5,000 dollars at the end of each year forever. Then, if the interest rate is 5% per year, the value of the asset is

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd