Urgenthomework logo
UrgentHomeWork
Live chat

Loading..

Mn613 Computer Forensics For Progressed Assessment Answers

  99 Download     📄   5 Pages / 1108 Words
Prepare a report on the following sections. You can use your own USB, create/delete files and perform computer forensics.

Answer:

In case study 1, we will create and delete the files on USB. We create file that are word document which contains student ID, name, address and personal information. This word document is saved in to USB drive and named as Student ID. After, creating excel files it contains unit name and marks that file as saved into the USB drive, then names it as student ID.

Thus, with the help of digital forensic tools, the user have to recovery the file which is deleted from the USB. All this will be discussed in detail. 

Data Acquisition

The Data acquisition refers to a method towards creating the forensic image from the PC media. For instance, CDROM, thumb drive, removable hard drives, thumb drives, hard drive, servers and additional media which stores the electronic data with gaming assures and other gadgets. The forensic image is made using particular equipment which keeps any type of data from being composed to the source media. Instead of the first media, the Forensic image is used by the forensic examiner to complete the analysis. The process which obtains the data integrates the record of each serial number and various marking by using the advanced camera. The forensic image is confirmed against the first for guaranteeing that the criminological image is first media’s accurate copy. To do data acquisition, the pro discover basic tool is used. The prodiscover forensics tool is the most powerful computer security tool that is used to enable the forensics investigator, for determining all the data on the computer system, while protecting the evidences and for creating the evidentiary quality reports. This tool has various features and benefits such as the following,

  • It generate the bit stream copy of disk to be analysed, to keep the primary evidence safe.
  • It easily investigates the whole disk and files including the computer data streams which is used for complete disk forensic analysis.
  • By writing and reading the images, it ensures maintenance of multi tool compatibility.
  • Then, examines the computer file to provide data integrity.
  • It also examines all the file systems for maximum flexibility.
  • It utilized the Perl scripts to automate the investigation tasks.

  • It identifies the file creators to extract the EXIF information from the JPEG files.
  • It improves compatibility and accuracy by automated report generation in XML format.
  • It is designed for NIST disk imaging tool, to insure high quality.
  • It supports VM ware to run the captured images.

Data Validation

  • It is a standout amongst the most basic parts of PC crime scene investigation.
    • Ensuring the uprightness of information which is collected to introduce the proof in the court.
    • Most of the PC criminological instruments provides robotized hashing of the picture documents.
    • Computer crime scene investigation instruments contain some confinements for performing hashing.
  • Learning how to use the progressed hexadecimal editors is necessary and significant for guaranteeing the information’s respectability.
    • Progressed hexadecimal editors offer numerous highlights that are not accessible in the PC crime scene investigation tools. Such as, hashing particular documents or segments.
  • Business PC crime scene investigation programs have inherent approval highlights
    • ProDiscover's .eve documents contains metadata that incorporates the hash esteem.
  • Validation is done naturally.
    • Raw arrangement picture documents (.dd augmentation). It don't contain metadata.

So you should approve crude arrangement picture documents physically to guarantee the honesty of information.

Investing a Case

Here, we will investigate the case and it involves 2 GB drive that the user needs to copy at the scene and it has the following options, to copy the drive accurately.

  1. Data Acquisition

Information obtaining implies gaining the information from the place of wrongdoing to explain the case. In the PC crime scene investigation, device confirmations are put away as the picture document one of three configurations. Out of three organizations, two are open source and the third one is proprietary. Proprietary arrangement was distinctive in the light of the fact that every seller has diverse remarkable elements. Information obtaining takes place in four strategies:

  1. Make disk to picture document.
  2. Making disk to-plate duplicate.
  3. Making legitimate plate for the disk or plate to-information record.
  4. Making inadequate duplicate record.
  1. Running Forensic Image is kept running from the Recovery.
  2. Sets the fragment size of the made legal picture record.
  3. Sets the goal and record name for the picture document.
  4. Ascertains a MD5 or potentially SHA256 securing hash of the imaged information.
  5. Report

This guide depicts the best practices for duplicating the document and explores the case including 2 GB drive. This incorporates assessing the scene,

  1. Utilizing media stockpiling for the scene.  
  2. Adapting the drive precisely.
  3. Finishing and recording the scene examination.
  4. Sets the goal and document name for the picture record.
  5. Sets the portion size of the created legal picture record.
  6. Computes a MD5 as well as SHA256 obtaining hash of the imaged information. 

References

[1]"ProDiscover Forensics - Software - Products", Siliconforensics.com, 2018. [Online]. Available: https://siliconforensics.com/products/software/prodiscover-forensics.html. [Accessed: 27- Aug- 2018].

[2]"Data acquisition requires that data remains unchanged", Computerforensicsspecialists.co.uk, 2018. [Online]. Available: https://www.computerforensicsspecialists.co.uk/blog/data-acquisition-from-electronic-evidence. [Accessed: 27- Aug- 2018].

[3]J. Sammons, The basics of digital forensics. Amsterdam: Syngress Media, 2015. 


Buy Mn613 Computer Forensics For Progressed Assessment Answers Online


Talk to our expert to get the help with Mn613 Computer Forensics For Progressed Assessment Answers to complete your assessment on time and boost your grades now

The main aim/motive of the management assignment help services is to get connect with a greater number of students, and effectively help, and support them in getting completing their assignments the students also get find this a wonderful opportunity where they could effectively learn more about their topics, as the experts also have the best team members with them in which all the members effectively support each other to get complete their diploma assignments. They complete the assessments of the students in an appropriate manner and deliver them back to the students before the due date of the assignment so that the students could timely submit this, and can score higher marks. The experts of the assignment help services at urgenthomework.com are so much skilled, capable, talented, and experienced in their field of programming homework help writing assignments, so, for this, they can effectively write the best economics assignment help services.


Get Online Support for Mn613 Computer Forensics For Progressed Assessment Answers Assignment Help Online


Copyright © 2009-2023 UrgentHomework.com, All right reserved.