Ask a question from expert

Ask now

ITC597 Digital Forensics Assignment

5 Pages1179 Words256 Views
   

Charles Sturt University

   

Added on  2020-02-24

About This Document

The purpose of the assignment is to provide an outline of the possible software and hardware that can be used to acquire the disk image of a Linux-based computer from the crime scene. Many software is there in the market, both freeware and licensed that can be used in digital forensic purposes.

ITC597 Digital Forensics Assignment

   

Charles Sturt University

   Added on 2020-02-24

BookmarkShareRelated Documents
Running head: DIGITAL FORENSICSDigital ForensicsName of the Student:Name of the University:Author Note:
ITC597 Digital Forensics Assignment_1
1DIGITAL FORENSICSTask 2The purpose of the assignment is to provide an outline on the possible software andhardware that can be used to acquire the disk image of a Linux based computer from thecrime scene. Many software is there in the market, both freeware and licensed that can beused in digital forensic purpose. The best approach is to use Linux Live CD that has anoperating system of its own and can be used to gather disk image from the computer at acrime scene, which cannot be removed from the scene (Nelson, Phillips & Steuart, 2014). The basic hardware requirement is an external hard drive or a external storage devicethat has the required storage space to load the disk image that has been retrieved from thecomputer (Quick & Choo, 2016).The software requirement can be mitigated by using a digital forensic tool, the basicknowledge regarding the modification of the BIOS setup of the computer if required andknowledge of using shell commands within the computer. In this case, the HELIX 3 LinuxLive CD is considered as a tool to retrieve the disk image from the Linux computer (Rafique& Khan, 2013).HELIX 3 Live CD – A type of digital forensic package created to gather digital evidencesfrom the digital devices that have been found in the crime scene. It contains a number of freedigital forensic tools inclusive of hex editors, password cracking and data carving tools(Sindhu & Meshram, 2012). The purpose of this tool is to gather information from thephysical memory, user accounts, executing processes and schedules, network connections,scheduled jobs, chat logs, registry, screen captures, applications, environment variables, SAMfiles, Internet history and drivers of the computer. After the data is collected, it analyses andreviews the data to generate the report based on the results (Sindhu & Meshram, 2012).
ITC597 Digital Forensics Assignment_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Disk Image of a Linux : Assignment
|5
|1176
|56

Digital Forensics Report (DOC)
|7
|1104
|53

Digital Forensics : Files System
|4
|761
|30

Digital forensics | Question and Answer
|18
|1393
|19

Crime Scene Collection and Acquisition
|5
|805
|15

Data acquisition methods for digital forensics
|11
|1180
|18