Write a report outlining methods of acquiring image in linux

Assignment Help Operating System
Reference no: EM13833337

Task 1: Case Project

You are required to acquire an image of a disk on a computer which is removed from an incident scene. You discovered that it is a Linux computer. What are your options to acquire the image? Write one to two pages report to specify the hardware and software you would use.

Deliverable: Write a 300-500 words report outlining two methods of acquiring an image in Linux. Student can use Kali and Ubuntu Linux virtual machine (VM) images provided in this subject's lab.

Task 1: Research Project

Your supervisor has asked you to research current acquisition tools that would able to investigate major smart phone operating systems such as Android and Apple vendors. Form a comparison table including the following information:

a. OS and/or phone vendors supported;

b. Platform designed to run on;

c. Type of information possible acquired such as device information, phonebook, logs, etc..;

d. Cost.

Deliverable: Minimum of five forensic vendors listed with in-text references to provide under each vendor column. Wikipedia information will not count as vendor source.

Rationale

This assessment task covers digital crime, forensic process and procedures, data acquisition and validation, e-evidence, e-discovery tools and equipment, operating systems and file systems. This assessment has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to:

• determine the legal and ethical considerations for investigating and prosecuting digital crimes

• formulate a digital forensics process

• evaluate the technology in digital forensics to detect, prevent and recover from digital crimes

• analyse data on storage media and various file systems

• collect electronic evidence without compromising the original data;

• evaluate the functions and features of digital forensics equipment, the environment and the tools for a digital forensics lab;

• compose technical tactics in digital crimes and assess the steps involved in a digital forensics investigation;

• prepare and defend reports on the results of an investigation.

Reference no: EM13833337

Questions Cloud

Application of corporate strategies : Briefly trace the development and growth of the organisation from its beginnings to the present through the application of corporate strategies - what types of strategies have these been?
Why is the burden of proof on the plaintiff : Using the Internet or www.google.com find three companies that have settled discrimination lawsuits in the last two years and indicate the following for each company: Company Name and Year Lawsuit was settled. Why is the burden of proof on the plai..
Compute the total revenue-the total cost : You are the manager of the surgery department at a hospital which serves mostly Medicare patients. The hospital performs 1,000 surgical operations per year using the traditional method. Compute the total revenue, the total cost, and the profit at the..
Elaborate on the meanings of the details and quotes : Write an essay that discusses why and how specific symbols are used to depict one or two of the themes from Unit 2 in a particular way. Your essay should incorporate details and quotes from the story (using parenthetical documentation with the author..
Write a report outlining methods of acquiring image in linux : Write a 300-500 words report outlining two methods of acquiring an image in Linux. Student can use Kali and Ubuntu Linux virtual machine (VM) images provided in this subject's lab.
Using primary authority as sources write a memo to mark life : Mark and Lindsey Armstrong recently divorced. Although grief stricken, Mark was at least partially comforted by his monthly receipt of $10,000 of alimony. Due to problems with the real estate market Mark and Lindsey have been unable to sell their Mc ..
Determine the equilibrium price and quantity in this market : Assume the market for a commodity is described by the demand and supply functions. Determine the equilibrium price and quantity in this market.
The syndicated bank loan market : In 1998, the Syndicated Bank Loan market (defined as loans having more than two bank lenders) was a vast and cheap source of debt financing for U.S. corporations. This market was characterized by a large number of financial institutions that aggressi..
The value of the asset : Assume you have an asset which will pay 5,000 dollars at the end of each year forever. Then, if the interest rate is 5% per year, the value of the asset is

Reviews

Write a Review

Operating System Questions & Answers

  Why does concurrency lead to programming errors

Why does concurrency lead to programming errors that are difficult to locate? Give as concrete an example as you possibly can?

  What do you think about running virus program on your phone

What do you think about running a virus program on your phone? Do you think it's necessary? Why do you think it's becoming necessary

  Question about Ethernet capture effect

The teacher went over the following trouble in class. However, I do not understand how he describes the work. He skips too many steps and jumps around.

  A unix file system

A UNIX file system has 1-kilobyte blocks and 32-bit disk addresses. What is the maximum file size if each i-node contains 20 direct entries and one single, double, and triple indirect entry each? Draw a picture and give all calculations properly anno..

  Shell to be able to execute the most recent command

shell to be able to execute the most recent command and also be able to execute a specified command from the history.  the printHistory function

  A typist is entering text on a keyboard

A typist is entering text on a keyboard at the rate of 30 words per minute. If each word is 6 characters long on average, how many bits per second are being sent to main memory? A space is also a character. Assume that each word is followed by one sp..

  Supporting a transmission system

A transmission system operates at sixteen MHz. The power output is 1 W and .1 Watt is needed at the receiver. The receiver is located one hundred meters from the transmitter.

  Implement a framework for cpu scheduling

You will implement a framework for CPU scheduling with three scheduling algorithms: FIFO, round robin, and shortest job first (SJF). Jobs arrive at the CPU scheduler at arbitrary times.

  Questiona furniture manufacturer produces two types of

questiona furniture manufacturer produces two types of desks standard and executive. these desks are then sold at rs

  Operating system proposal

Operating System Proposal

  Compute the net expected value for the project

You are considering to make modifications to an existing application. Compute the net expected value for the project risks and opportunities

  In working out your responses to the discussion question

in working out your responses to the discussion question you should choose examples from your own experience or find

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd