Tutor Quora

MN613 Computer Forensics For Progressed Hexadecimal Editors

Academic Anxiety?

Get an original paper within hours and nail the task

156 experts online

Free Samples

MN613 Computer Forensics For Progressed Hexadecimal Editors

.cms-body-content table{width:100%!important;} #subhidecontent{ position: relative;
overflow-x: auto;
width: 100%;}

MN613 Computer Forensics For Progressed Hexadecimal Editors

0 Download4 Pages / 860 Words

Course Code: MN613
University: Melbourne Institute Of Technology

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Question:
Prepare a report on the following sections. You can use your own USB, create/delete files and perform computer forensics.

Answer:
In case study 1, we will create and delete the files on USB. We create file that are word document which contains student ID, name, address and personal information. This word document is saved in to USB drive and named as Student ID. After, creating excel files it contains unit name and marks that file as saved into the USB drive, then names it as student ID.
Thus, with the help of digital forensic tools, the user have to recovery the file which is deleted from the USB. All this will be discussed in detail. 
Data Acquisition
The Data acquisition refers to a method towards creating the forensic image from the PC media. For instance, CDROM, thumb drive, removable hard drives, thumb drives, hard drive, servers and additional media which stores the electronic data with gaming assures and other gadgets. The forensic image is made using particular equipment which keeps any type of data from being composed to the source media. Instead of the first media, the Forensic image is used by the forensic examiner to complete the analysis. The process which obtains the data integrates the record of each serial number and various marking by using the advanced camera. The forensic image is confirmed against the first for guaranteeing that the criminological image is first media’s accurate copy. To do data acquisition, the pro discover basic tool is used. The prodiscover forensics tool is the most powerful computer security tool that is used to enable the forensics investigator, for determining all the data on the computer system, while protecting the evidences and for creating the evidentiary quality reports. This tool has various features and benefits such as the following,

It generate the bit stream copy of disk to be analysed, to keep the primary evidence safe.
It easily investigates the whole disk and files including the computer data streams which is used for complete disk forensic analysis.
By writing and reading the images, it ensures maintenance of multi tool compatibility.
Then, examines the computer file to provide data integrity.
It also examines all the file systems for maximum flexibility.
It utilized the Perl scripts to automate the investigation tasks.
It identifies the file creators to extract the EXIF information from the JPEG files.
It improves compatibility and accuracy by automated report generation in XML format.
It is designed for NIST disk imaging tool, to insure high quality.
It supports VM ware to run the captured images.

Data Validation

It is a standout amongst the most basic parts of PC crime scene investigation.

Ensuring the uprightness of information which is collected to introduce the proof in the court.
Most of the PC criminological instruments provides robotized hashing of the picture documents.
Computer crime scene investigation instruments contain some confinements for performing hashing.

Learning how to use the progressed hexadecimal editors is necessary and significant for guaranteeing the information’s respectability.

Progressed hexadecimal editors offer numerous highlights that are not accessible in the PC crime scene investigation tools. Such as, hashing particular documents or segments.

Business PC crime scene investigation programs have inherent approval highlights

ProDiscover’s .eve documents contains metadata that incorporates the hash esteem.

Validation is done naturally.

Raw arrangement picture documents (.dd augmentation). It don’t contain metadata.

So you should approve crude arrangement picture documents physically to guarantee the honesty of information.
Investing a Case
Here, we will investigate the case and it involves 2 GB drive that the user needs to copy at the scene and it has the following options, to copy the drive accurately.

Data Acquisition

Information obtaining implies gaining the information from the place of wrongdoing to explain the case. In the PC crime scene investigation, device confirmations are put away as the picture document one of three configurations. Out of three organizations, two are open source and the third one is proprietary. Proprietary arrangement was distinctive in the light of the fact that every seller has diverse remarkable elements. Information obtaining takes place in four strategies:

Make disk to picture document.
Making disk to-plate duplicate.
Making legitimate plate for the disk or plate to-information record.
Making inadequate duplicate record.

Running Forensic Image is kept running from the Recovery.
Sets the fragment size of the made legal picture record.
Sets the goal and record name for the picture document.
Ascertains a MD5 or potentially SHA256 securing hash of the imaged information.
Report

This guide depicts the best practices for duplicating the document and explores the case including 2 GB drive. This incorporates assessing the scene,

Utilizing media stockpiling for the scene.  
Adapting the drive precisely.
Finishing and recording the scene examination.
Sets the goal and document name for the picture record.
Sets the portion size of the created legal picture record.
Computes a MD5 as well as SHA256 obtaining hash of the imaged information. 

References
[1]”ProDiscover Forensics – Software – Products”, Siliconforensics.com, 2018. [Online]. Available: https://siliconforensics.com/products/software/prodiscover-forensics.html. [Accessed: 27- Aug- 2018].
[2]”Data acquisition requires that data remains unchanged”, Computerforensicsspecialists.co.uk, 2018. [Online]. Available: https://www.computerforensicsspecialists.co.uk/blog/data-acquisition-from-electronic-evidence. [Accessed: 27- Aug- 2018].
[3]J. Sammons, The basics of digital forensics. Amsterdam: Syngress Media, 2015. 

Free Membership to World’s Largest Sample Bank

To View this & another 50000+ free samples. Please put
your valid email id.

E-mail

Yes, alert me for offers and important updates

Submit 

Download Sample Now

Earn back the money you have spent on the downloaded sample by uploading a unique assignment/study material/research material you have. After we assess the authenticity of the uploaded content, you will get 100% money back in your wallet within 7 days.

UploadUnique Document

DocumentUnder Evaluation

Get Moneyinto Your Wallet

Total 4 pages

PAY 3 USD TO DOWNLOAD

*The content must not be available online or in our existing Database to qualify as
unique.

Cite This Work
To export a reference to this article please select a referencing stye below:

APA
MLA
Harvard
OSCOLA
Vancouver

My Assignment Help. (2021). Computer Forensics For Progressed Hexadecimal Editors. Retrieved from https://myassignmenthelp.com/free-samples/mn613-computer-forensics/data-validation.html.

“Computer Forensics For Progressed Hexadecimal Editors.” My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/mn613-computer-forensics/data-validation.html.

My Assignment Help (2021) Computer Forensics For Progressed Hexadecimal Editors [Online]. Available from: https://myassignmenthelp.com/free-samples/mn613-computer-forensics/data-validation.html[Accessed 18 December 2021].

My Assignment Help. ‘Computer Forensics For Progressed Hexadecimal Editors’ (My Assignment Help, 2021) accessed 18 December 2021.

My Assignment Help. Computer Forensics For Progressed Hexadecimal Editors [Internet]. My Assignment Help. 2021 [cited 18 December 2021]. Available from: https://myassignmenthelp.com/free-samples/mn613-computer-forensics/data-validation.html.

×
.close{position: absolute;right: 5px;z-index: 999;opacity: 1;color: #ff8b00;}

×

Thank you for your interest
The respective sample has been mail to your register email id

×

CONGRATS!
$20 Credited
successfully in your wallet.
* $5 to be used on order value more than $50. Valid for
only 1
month.

Account created successfully!
We have sent login details on your registered email.

User:

Password:

MyAssignmenthelp.com boasts a pool of 3000+ PhD qualified dissertation writers, who are committed to providing highest quality dissertation paper help in more than 100 subjects. Each expert specializes in providing top-quality dissertation writing services in the exact manner that students want. Being a cheap dissertation writing services, we ensure prices don

Latest Management Samples

div#loaddata .card img {max-width: 100%;
}

MPM755 Building Success In Commerce
Download :
0 | Pages :
9

Course Code: MPM755
University: Deakin University

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answers:
Introduction
The process of developing a successful business entity requires a multidimensional analysis of several factors that relate to the internal and external environment in commerce. The areas covered in this current unit are essential in transforming the business perspective regarding the key commerce factors such as ethics, technology, culture, entrepreneurship, leadership, culture, and globalization (Nzelibe, 1996; Barza, 2…
Read
More

SNM660 Evidence Based Practice
Download :
0 | Pages :
8

Course Code: SNM660
University: The University Of Sheffield

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answers:
Critical reflection on the objective, design, methodology and outcome of the research undertaken Assessment-I
Smoking and tobacco addiction is one of the few among the most basic general restorative issues, particularly to developed nations such as the UK. It has been represented that among all risk segments smoking is the fourth driving purpose behind infections and other several ailments like asthma, breathing and problems in the l…
Read
More
Tags:
Australia Maidstone Management Business management with marketing University of New South Wales Masters in Business Administration 

BSBHRM513 Manage Workforce Planning
Download :
0 | Pages :
20

Course Code: BSBHRM513
University: Tafe NSW

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Task 1
1.0 Data on staff turnover and demographics
That includes the staffing information of JKL industries for the fiscal year of 2014-15, it can be said that the company is having problems related to employee turnover. For the role of Senior Manager in Sydney, the organization needs 4 managers; however, one manager is exiting. It will make one empty position which might hurt the decision making process. On the other hand, In Brisba…
Read
More

MKT2031 Issues In Small Business And Entrepreneurship
Download :
0 | Pages :
5

Course Code: MKT2031
University: University Of Northampton

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: United Kingdom

Answer:
Entrepreneurial ventures
Entrepreneurship is the capacity and willingness to develop, manage, and put in order operations of any business venture with an intention to make profits despite the risks that may be involved in such venture. Small and large businesses have a vital role to play in the overall performance of the economy. It is, therefore, necessary to consider the difference between entrepreneurial ventures, individual, and c…
Read
More
Tags:
Turkey Istanbul Management University of Employee Masters in Business Administration 

MN506 System Management
Download :
0 | Pages :
7

Course Code: MN506
University: Melbourne Institute Of Technology

MyAssignmentHelp.com is not sponsored or endorsed by this college or university

Country: Australia

Answer:
Introduction
An operating system (OS) is defined as a system software that is installed in the systems for the management of the hardware along with the other software resources. Every computer system and mobile device requires an operating system for functioning and execution of operations. There is a great use of mobile devices such as tablets and Smartphones that has increased. One of the widely used and implemented operating syste…
Read
More
Tags:
Australia Cheltenham Computer Science Litigation and Dispute Management University of New South Wales Information Technology 

Next

Need an essay written specifically to meet your requirements?

Choose skilled experts on your subject and get an original paper within your deadline

156 experts online

Your time is important. Let us write you an essay from scratch

Tips and Tricks from our Blog

11174 Introduction To Management

Free Samples 11174 Introduction To Management .cms-body-content table{width:100%!important;} #subhidecontent{ position: relative; overflow-x: auto; width: 100%;} 11174 Introduction

Read More »