Write a report outlining methods of acquiring image in linux

Assignment Help Operating System
Reference no: EM13833337

Task 1: Case Project

You are required to acquire an image of a disk on a computer which is removed from an incident scene. You discovered that it is a Linux computer. What are your options to acquire the image? Write one to two pages report to specify the hardware and software you would use.

Deliverable: Write a 300-500 words report outlining two methods of acquiring an image in Linux. Student can use Kali and Ubuntu Linux virtual machine (VM) images provided in this subject's lab.

Task 1: Research Project

Your supervisor has asked you to research current acquisition tools that would able to investigate major smart phone operating systems such as Android and Apple vendors. Form a comparison table including the following information:

a. OS and/or phone vendors supported;

b. Platform designed to run on;

c. Type of information possible acquired such as device information, phonebook, logs, etc..;

d. Cost.

Deliverable: Minimum of five forensic vendors listed with in-text references to provide under each vendor column. Wikipedia information will not count as vendor source.

Rationale

This assessment task covers digital crime, forensic process and procedures, data acquisition and validation, e-evidence, e-discovery tools and equipment, operating systems and file systems. This assessment has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to:

• determine the legal and ethical considerations for investigating and prosecuting digital crimes

• formulate a digital forensics process

• evaluate the technology in digital forensics to detect, prevent and recover from digital crimes

• analyse data on storage media and various file systems

• collect electronic evidence without compromising the original data;

• evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab;

• compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation;

• prepare and defend reports on the results of an investigation.

Reference no: EM13833337

Questions Cloud

Application of corporate strategies : Briefly trace the development and growth of the organisation from its beginnings to the present through the application of corporate strategies - what types of strategies have these been?
Why is the burden of proof on the plaintiff : Using the Internet or www.google.com find three companies that have settled discrimination lawsuits in the last two years and indicate the following for each company: Company Name and Year Lawsuit was settled. Why is the burden of proof on the plai..
Compute the total revenue-the total cost : You are the manager of the surgery department at a hospital which serves mostly Medicare patients. The hospital performs 1,000 surgical operations per year using the traditional method. Compute the total revenue, the total cost, and the profit at the..
Elaborate on the meanings of the details and quotes : Write an essay that discusses why and how specific symbols are used to depict one or two of the themes from Unit 2 in a particular way. Your essay should incorporate details and quotes from the story (using parenthetical documentation with the author..
Write a report outlining methods of acquiring image in linux : Write a 300-500 words report outlining two methods of acquiring an image in Linux. Student can use Kali and Ubuntu Linux virtual machine (VM) images provided in this subject's lab.
Using primary authority as sources write a memo to mark life : Mark and Lindsey Armstrong recently divorced. Although grief stricken, Mark was at least partially comforted by his monthly receipt of $10,000 of alimony. Due to problems with the real estate market Mark and Lindsey have been unable to sell their Mc ..
Determine the equilibrium price and quantity in this market : Assume the market for a commodity is described by the demand and supply functions. Determine the equilibrium price and quantity in this market.
The syndicated bank loan market : In 1998, the Syndicated Bank Loan market (defined as loans having more than two bank lenders) was a vast and cheap source of debt financing for U.S. corporations. This market was characterized by a large number of financial institutions that aggressi..
The value of the asset : Assume you have an asset which will pay 5,000 dollars at the end of each year forever. Then, if the interest rate is 5% per year, the value of the asset is

Reviews

Write a Review

Operating System Questions & Answers

  Compare android and the linux operating systems

Compare and contrast Android and the Linux operating systems. Compare and contrast the Android and Windows operating systems

  In a table forma compare between segmentation and virtual

in a table forma compare between segmentation and virtual memory organizations in terms of the memory structure

  Write an essay on the using virtualization topic

Technicians often have to work with multiple operating systems, but are sometimes limited to a single workstation. Write an essay on the Using Virtualization topic

  Examination of evidence on original media

The "forensically sound" method is to never conduct any examination on original media. There are practical and legal reasons for not performing examination on suspect's computer,

  Security administrators to monitor servers

Discuss techniques used by security administrators to monitor servers for security purposes? For example, how are event logs and task or system monitors used?

  Creating a system life cycle chart

Create a system life cycle chart, utilizing Microsoft Word, Microsoft PowerPoint, or Microsoft Visio. The chart must include detailed descriptions of the activities performed in each of the following areas:

  Clusters can implemented by leveraging many operating system

Clusters can be implemented by leveraging many operating systems and applications. In a report of 1-2 pages, complete the following: Identify an operating system and application combination, and discuss at least 2 cluster implementation models suppo..

  File systems on linux vs. ntfs file systems

List what characters are absolutely not allowed for ext4 file systems on Linux vs. NTFS file systems on Windows in a plain text document.

  Fundamentals of operating systems programming assignment 1

programming assignment 1 - deadlock avoidance with ljf plus ltbrgt ltbrgtedf-tie-breaker and edf plus ljf-tie-breaker

  Explain whether the erp software is mostly appropriate for

originally the sap erp software was developed for and implemented by mostly manufacturing companies in the beginning.

  Format of a memory address

Assume that a computer using a set associative cache has 2^16 words of main memory and a cache of thirty-two blocks, where each cache block contains eight words.

  Compute number of disk tracks traversed by using fcfs-sstf

Compute number of disk tracks traversed by using FCFS, SSTF, SCAN, and LOOK algorithms for series of disk track service request given below.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd