Posted: June 25th, 2022
Computer forensics
Assignment help – Discussion 1:2,2
Computer forensics has basically an area in data recovery and network forensics and generally involves the searches for and through the existing and previously existing, the recently deleted data. Computer forensic include the testifying as an expert witness in deposition and in court. Different from computer forensics which deals with data at rest, network forensic investigations involve dynamic and volatile information and analysis of logs. Network functions as a post-mortem investigation which attempts to reconstruct a complete incident to identify the perpetrator which relies on having a copy of the network flow. Data recovery is different from computer and network forensic, as it deals with broken hardware and software. Data recovery is crucial when a computer crashes, when hardware such as memory card, external hard disk thumb drive become unreadable through the normal process. Data recovery is different as gets data from digital devices that have experienced electronic damage, physical damage and some times a combination of the two damages.
Homework help – Write blockers are tools that allow read-only access to data storage devices without compromise of the integrity of the data. In the appropriate application, writer blockers guarantee the protection of the data chain of custody. The write blockers have the function of preventing writes to the storage devices. Bitstream copiers are tools that generate the complete image of all contents in a storage device which allows the performance of data recovery on the copy by the use of the normal disk cloning software. In computer forensics, the bit-stream copier allows rge read and analysis of the hard drive without the risk of contaminating the original evidence and thereby preserves all latent data in the storage devices.
References
Jayakrishnan, A. R., & Vasanthi, V. (2018). Empirical Survey on Advances of Network Forensics in the Emerging Networks. International Journal of Cyber-Security and Digital Forensics, 7(1), 38-47.
Lazaridis, I., Arampatzis, T., & Pouros, S. (2016, May). Evaluation of digital forensics tools on data recovery and analysis. In The third international conference on computer science, computer engineering, and social media (CSCESM2016) (p. 67).
Meffert, C. S., Baggili, I., & Breitinger, F. (2016). Deleting collected digital evidence by exploiting a widely adopted hardware write blocker. Digital Investigation, 18, S87-S96.
Order | Check Discount
Sample Homework Assignments & Research Topics
Tags:
Computer forensics