At times this goes a long way to determine the

Info icon This preview shows pages 8–9. Sign up to view the full content.

View Full Document Right Arrow Icon
drive. At times, this goes a long way to determine the chances of some data been altered. 6. How do you know that your OS did not automatically mount your drive, and subsequently change the contents of the flash drive prior to you creating the forensic copy? The tool Adepto, which was used for this lab test, has the capability to record logs of events that have occurred; we were able to see a detailed report of all of the steps that were done during the lab. If a security check is needed the logs can provide proof if there is any unexpected operations occurring without authorization, like automatically mounting to the drive or completed operations. A very simple way to determine this is comparing the hash values prior and after the forensic copy. 7. Explain the advantages and disadvantages of different write-blocking techniques for forensic imaging. Software write-blocking can allow writes to occur if not properly implemented and can be prone to operator error, but offers a lower cost method that minimizes the need for physical access. Software write-blocking is often the only option for operational systems that cannot be taken offline for hardware based forensic imaging[The10]. Generally, software write-blocking still needs an external adapter of some sort to provide an interface to the drives that you are imaging (thus negating the professionals of not having to carry around a physical write blocker). 8. Hardware blockers have historically been the main choice in digital forensics, however the industry seems to be shifting to software based alternatives. What are the main issues to take into consideration for the shift? A major consideration for this sort of shift would consider the Operating System, the current and intended software that would be used in the computer. The compatibility should be predetermined and verified. Most times, it is very much advisable to use a more custom made or third part software that would be primarily compactible with the OS in that way, ensuring that the full optimal performance is not tampered with and ensure that back doors are not let lose any anyway Main issues that have triggered the shift consideration are: - a) An additional piece of kit to carry around with you. b) An additional piece of hardware that needs to be maintained and could fail. c) Generally restricted to the available storage interfaces built into the device. That means additional interfaces cannot be added[Pen15] References Aggarwal, S., Goyal, N., & Aggarwal, K. (2014). A review of Comparative Study of MD5 and SHA Security Algorithm. International Journal of Computer Application , 104 (14).
Image of page 8

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Pennsylvania State University. (2015). Viewdoc: Pennsylvania State University . Retrieved from Pennsylvania State University Web site: ? doi=10.1.1.466.3233&rep=rep1&type=pdf The University of Rhode Island. (2010, October). Computer Science and Statistics: The University of Rhode Island . Retrieved from The University of Rhode Island Web site:
Image of page 9
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern