Computer forensics examiners

Assignment Help Basic Computer Science
Reference no: EM131229063

This week you are reading and watching about the forensic tools used by Computer Forensics Examiners. While the two most popular tools are Guidance Software's EnCase and AccessData's FTK, there are other tools that are available and should be part of your toolbox. Once you have properly identified and collected digital evidence, the next step is to analyze it. It does not really matter if you are performing analysis as part of a criminal investigation or as part of a corporate investigation; you should always follow the same protocols. An emphasis in this course is on helping you understand why using an analysis protocol is important. Remember, you should NEVER, EVER work on original evidence, if it can be avoided by any means; instead, use a forensic image. When you work on the image, you pick the tools you will use. Again, it does not matter which tool you actually use, as long as the tool is accepted by the forensic community, and you are able to testify to the tool's validity, as well as the process you used in your examination.

During your analysis, you should document every step you take and all of your findings. Some tools have a report function that works well to capture both the identified data and the date/time of your various analyses. However, this should always be supplemented with your own notes and documentation.

This week, I would like you to discuss why you need to use a write blocker (either hardware or software) in your examinations, whether for a criminal case or a corporate case.

Also, imagine you are a computer forensic examiner receiving a suspect hard disk drive from a detective in your department. The drive was seized properly during a legally executed search warrant. The detective signs the chain of custody log and hands you the drive. Your job is to accept the drive, conduct an analysis, and maintain the drive until trial. Please explain the steps you would take, from receipt until testimony, including the reasons why you would take each step. For example, what would you check for when you sign for the drive on the chain of custody?

Reference no: EM131229063

Questions Cloud

Research replacement desktops for our dell optiplex : You have been asked to research replacement desktops for our Dell Optiplex 755 systems running 4GB of RAM with 500GB of storage. Take time to research this model and come up with a vialble replacement solution. Explain how CPU speed, amount of mem..
Reads the same forwards and backward : 1. If an array contains n elements, what are the maximum number of recursive calls made by the binary search algorithm? 2. A palindrome is a string that reads the same forwards and backward. consider some example
Prominent black professor takes unpaid leave of absence : A prominent black professor takes an unpaid leave of absence to protest the fact that his extremely prominent university has failed to ever hire any black females in tenure-track (regular, permanent) positions on the faculty. When he does not return ..
Write a 2d tm mode fdtd simulation that is 100 grid cells : Now, investigate the stability of this problem by varying ?t; how large can you make ?t before the simulation goes unstable? Can you surpass the CFL condition? Why or why not?
Computer forensics examiners : This week you are reading and watching about the forensic tools used by Computer Forensics Examiners. While the two most popular tools are Guidance Software's EnCase and AccessData's FTK, there are other tools that are available and should be part..
Employees should be used to such rude and crude behavior : A construction company was sued for harassment when it failed to take seriously the complaints about offensive graffiti scrawled on rented portable toilets. The employer defended by saying (1) employees should be used to such rude and crude behavior;..
Claim for violation of the constitutional right : Can a government employee state a claim for a violation of the constitutional right to privacy when she was required, as a job applicant, to sign an affidavit stating that she had not used tobacco products for one year prior to the application date?
Determining the network standards and protocols : List and discuss at least three major ways your life has been impacted due to the ability to communicate over the Internet? What specific network standards and protocols do you use personally when communicating over the Internet?
What are the six main barriers to effective communication : What are the six main barriers to effective communication? Which barriers are easiest to surmount? Why? please provide a different answer than the ones that have already been answered.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd