Reference no: EM133469960
Assignment:
1. Do some online research and come up with a Day in the life of a computer forensic investigator
2. What are some of the gotchas when attempting to acquire evidence? (What could hamper evidence collection) How can we get evidence from damaged systems/media?
3. What rules and regulations to we have to follow for getting, analyzing, and storing evidence? Do the same rules apply to government investigations as for private organizations?
4. What hives and entries are forensically interesting when doing an investigation? What forensic tools are available?
5. Windows, apple and linux all have different file systems. How does each of them work? What files and logs are forensically interesting when doing an investigation?
6. Windows, apple and linux all have different file systems. How does each of them work? What files and logs are forensically interesting when doing an investigation?
7. What techniques might criminals use to hide data or activities? Be sure to read the posts of the other students and make at least two peer posts.
8. What metadata can we get from various files? How can it help in an investigation?
9. What techniques might criminals use to hide data or activities?