Computer forensics examiners

Assignment Help Basic Computer Science
Reference no: EM131229063

This week you are reading and watching about the forensic tools used by Computer Forensics Examiners. While the two most popular tools are Guidance Software's EnCase and AccessData's FTK, there are other tools that are available and should be part of your toolbox. Once you have properly identified and collected digital evidence, the next step is to analyze it. It does not really matter if you are performing analysis as part of a criminal investigation or as part of a corporate investigation; you should always follow the same protocols. An emphasis in this course is on helping you understand why using an analysis protocol is important. Remember, you should NEVER, EVER work on original evidence, if it can be avoided by any means; instead, use a forensic image. When you work on the image, you pick the tools you will use. Again, it does not matter which tool you actually use, as long as the tool is accepted by the forensic community, and you are able to testify to the tool's validity, as well as the process you used in your examination.

During your analysis, you should document every step you take and all of your findings. Some tools have a report function that works well to capture both the identified data and the date/time of your various analyses. However, this should always be supplemented with your own notes and documentation.

This week, I would like you to discuss why you need to use a write blocker (either hardware or software) in your examinations, whether for a criminal case or a corporate case.

Also, imagine you are a computer forensic examiner receiving a suspect hard disk drive from a detective in your department. The drive was seized properly during a legally executed search warrant. The detective signs the chain of custody log and hands you the drive. Your job is to accept the drive, conduct an analysis, and maintain the drive until trial. Please explain the steps you would take, from receipt until testimony, including the reasons why you would take each step. For example, what would you check for when you sign for the drive on the chain of custody?

Reference no: EM131229063

Questions Cloud

Research replacement desktops for our dell optiplex : You have been asked to research replacement desktops for our Dell Optiplex 755 systems running 4GB of RAM with 500GB of storage. Take time to research this model and come up with a vialble replacement solution. Explain how CPU speed, amount of mem..
Reads the same forwards and backward : 1. If an array contains n elements, what are the maximum number of recursive calls made by the binary search algorithm? 2. A palindrome is a string that reads the same forwards and backward. consider some example
Prominent black professor takes unpaid leave of absence : A prominent black professor takes an unpaid leave of absence to protest the fact that his extremely prominent university has failed to ever hire any black females in tenure-track (regular, permanent) positions on the faculty. When he does not return ..
Write a 2d tm mode fdtd simulation that is 100 grid cells : Now, investigate the stability of this problem by varying ?t; how large can you make ?t before the simulation goes unstable? Can you surpass the CFL condition? Why or why not?
Computer forensics examiners : This week you are reading and watching about the forensic tools used by Computer Forensics Examiners. While the two most popular tools are Guidance Software's EnCase and AccessData's FTK, there are other tools that are available and should be part..
Employees should be used to such rude and crude behavior : A construction company was sued for harassment when it failed to take seriously the complaints about offensive graffiti scrawled on rented portable toilets. The employer defended by saying (1) employees should be used to such rude and crude behavior;..
Claim for violation of the constitutional right : Can a government employee state a claim for a violation of the constitutional right to privacy when she was required, as a job applicant, to sign an affidavit stating that she had not used tobacco products for one year prior to the application date?
Determining the network standards and protocols : List and discuss at least three major ways your life has been impacted due to the ability to communicate over the Internet? What specific network standards and protocols do you use personally when communicating over the Internet?
What are the six main barriers to effective communication : What are the six main barriers to effective communication? Which barriers are easiest to surmount? Why? please provide a different answer than the ones that have already been answered.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Opportunity cost of studying chapter

Suppose your studying partner states that the opportunity cost of studying chapter 1 of your microeconomics textbook is about 1/25 the price you paid for the book, since the chapter is about 1/25 of the book. Do you agree with this assessment? Exp..

  Create wireframes for the five pages of your proposed design

This step in redesigning the spa website will be to create wireframes for the five pages of your proposed design. Specifically, you will address the following.

  Different entities or objects, logical process

Different entities or objects, logical process, data flows, and data stores that are involved starting from the time of submitting a time sheet

  Explaining dns zone in secure dynamic updates

If a DNS zone accepts only secure dynamic updates and the DHCP server is a member of the DnsUpdateProxy security group.

  Summary of everything

This final section is a summary of everything you have learned about your company.  Briefly recap what you have learned, and state your opinion on whether or not the stock in the company would be a good investment and why or why not based on:

  Internet, internet, intranet

Define the terms internet, Internet, intranet and extranet, highlighting the similarities and differences between them.

  Online search for a good or service offered

Online search for a good or service offered in another country

  Brainstorming skills to determine procedure to follow

The lead investigator gives you these graphics files and tells you that at least four messages should be embedded in them. Use your problem solving and brainstorming skills to determine a procedure to follow.

  Difference between bounded and unbounded media

Explain the difference between bounded and unbounded media, and provide examples of each that are commonly found in homes, schools, or area businesses.

  Determine entities from functional requirements

Using Crow's feet, determine and draw relationships between entities. (Typically verbs in sentences will recognize these). Find out the entities from functional requirements.

  Open source licenses

Open source licenses are licenses that comply with the Open Source Definition; in short, they allow software to be freely used, modified, and shared. To be approved by the Open Source Initiative (also known as the OSI), a license must go through the ..

  How do you define classes in css

How do you define classes in css? Please give an example and explain what classes are?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd