This preview shows pages 1–2. Sign up to view the full content.
This preview has intentionally blurred sections. Sign up to view the full version.View Full Document
Unformatted text preview: you to view and edit data in the most intuitive and convenient way. Case Project 9-2 Page # 379 After being given the graphics files I would start by using scope creep. Scope creep increases the time and resources needed to extract, analyze, and present evidence. You must be sure to document any requests for additional information, in case you must explain why the investigation took longer than planned, why the scope widened during the course of the investigation, and so forth. One of the most critical aspects of computer forensics is validating digital evidence because ensuring the integrity of the data you collect is essential for presenting evidence in court. Most computer forensics tools, such as ProDiscover, X-Ways Forensics, and FTK Imager, provided automated hashing of image files. To decode encrypted files users supply a password or passphrase. Without the passphrase, recovering the contents of the encrypted files is difficult....
View Full Document
- Spring '11