2EXAM QUESTIONS Bit stream Backup Bit stream back up involves back up of all the data which are in the hard disk drive or another type of storage media on the other hand the file backup copy involves only the backup of the data which is on the desired disk and not all the system’s data. The bit stream copy can be considered to be more secured than the file backup copy. Data acquisition a) Advantage: The raw format can be converted to any format according to the need of the user. The size of the data is considerable more than taking into consideration any format. Disadvantage The editing of the raw format can be sometimes be very much hectic. Sometimes specialized software has to be used for the conversion of the format. b)Linux command to create a raw image is qemu-img. The benefits that can be achieved from the command is that. It can directly create a shortcut of image creation. It can modify any image which is being processed in the system. Email investigation a)The first thing that should be done is the IP Address of the sender should be known and from it the location can be traced. The IP address can be found from many websites over the internet.
3EXAM QUESTIONS b)The main aspect that can be uncovered is the origin of the email and the correct IP address which is involved in the sending of the message. The IP address can be considered as one of the most important aspect when dealing with email spamming as it could involve all the details of the sender of the message. By this means the actual origin of the message can be easily be found out. File system a)The file system can be considered as a method or a data structure that can be used by an operating system to keep track of the files on the disk or partition; that is the way the files are organized in the disk. b)Two common file system which are utilized in modern window based system is FAT and NTFS. The most recent among them is the NTFS which is used as default in the window 10. c) FAT stands for File Allocation Table and MFT stands for Master file Table. d) The FAT file system usually contains four different sectors which are as follows. Boot sector: this is basically a reserved sector which is located on the first part of the disc. It contains the operating system’s necessary boot loader code. FAT Region: this region usually contains two copies of the file allocation table. Data region: this is where the directory of the data is stored. Root Directory Region: this is the region where all the information about the table and the files exist. Hashing
4EXAM QUESTIONS a) A hashing algorithm is any function that is basically used to map data of arbitrary size to a fixed size data. The value which is returned from the hashing algorithm are called hash value. b)The hashing algorithm mainly uses mathematical algorithm in order to secure a system or the data in the system. This directly helps in securing as putting emphasis on the password security aspect in a system. The main point is that with the implementation of the hashing algorithm the security issue in a system can be minimized. c) The three rules of the forensic hash are: Getting the hash function appropriate as this deals with the security issue in a system Forensic hash can be used to alter a code or file whenever needed. Forensic hash should always be implemented in a way that normal user does not get the hashing function which is being used. d)Two hashing algorithm that are commonly used for the forensic purpose are MD5 and SHA 1. Mobile The four places where information can be saved in a mobile are mobile memory card, phones internal memory, SIM card and the GPS module which is in the device. Static or volatile Static acquisition: There are many ways of acquiring data in a computer forensics. The Static acquisition can be considered as one of the most basic and common way of data acquiring in computer forensics. Static acquisition directly acquires the data from a nonvolatile source.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
5EXAM QUESTIONS Live acquisition: A live acquisition is basically where the data is retrieved from a device which is digital via its normal interface. For example switching a computer on and running a program from within the framework of the operating system. The main goal of the static acquisition is to obtain data for the reason of computer forensics, the data which is obtained from source which are volatile The main goal of the live acquisition is same as static acquisition, the difference lies in the form of the data. In live acquisition the data is digital. The example of static acquisition is data which has been possessed earlier but due to computer forensic it is being investigated now. The example of live acquisition is obtaining the data in a live environment. Steps in Cyber Investigation The key steps in a cyber-forensic investigation are: Adhere to ACPO (Association of chief police officer) guidelines for the recovery of the evidence with a comprehensive auditable process. Preserve the evidence: The data which is stored in the computer can be easily destroyed or made inadmissible as evidence very easily. One of the most important step is getting the right method for acquiring the data. Never work on the media original: Ones any device is confirmed of having any device it should be forensically be examined in order to process for future investigation. Specialist tools are used for the purpose and software’s are taken used in order to conduct proper investigation. Examination must be repeatable: The concept of the computer forensics is an exact science. International law, human right, and protocols form the ACPO, NHTCU ensure
6EXAM QUESTIONS that the evidence which is collected is internationally approved methodology and can be presented in a court ready statement or alternative our “expert witness” services may be used. Unknown Files The computer data recovery software can be used to identify the file from the unknown files