logo

Computer Forensic Analysis 2022

   

Added on  2022-10-04

15 Pages1541 Words23 Views
Running head: COMPUTER FORENSIC
COMPUTER FORENSIC
Name of the Student
Name of the University
Author Note

COMPUTER FORENSIC 1
Table of Contents
Introduction:...............................................................................................................................2
Scenario:.....................................................................................................................................2
Section 1:....................................................................................................................................2
Q1: Digital clues:...................................................................................................................2
Q2: Acquisition methods:......................................................................................................5
Q3: Options that has been used:.............................................................................................5
Drive imaging:...................................................................................................................6
Chain of custody:...............................................................................................................6
Section 2:....................................................................................................................................6
Q1: Steps by using ProDiscover Basic to Acquire an Image of USB Drive:........................8
Q2: Recovering deleted files:.................................................................................................9
Section 3:..................................................................................................................................13
Conclusion:..............................................................................................................................13
Bibliography:............................................................................................................................14

COMPUTER FORENSIC 2
Introduction:
The computer forensic is basically an application that is able to do the analysis and
investigation for gathering as well as preserving the evidences from a specific device that to
in a correct way to present in the court. The digital forensic is involving acquisition,
preservation, analysis, documentation as well as interpretation of the evidences from different
media storages. The digital based life is not unknown. As the users can utilize the internet,
they also scatter the fragments of information and data. The main purpose of digital forensic
is for performing an investigation that is structured for the maintenance of evidence chain of
document for finding out what has happened to the computer exactly as well as who is having
the responsibility for it. For the investigators of computer forensic, all of the actions are
connected to each other by one particular case that is needed to be accounted in the digital
format as well as properly saved in the archives that are designed properly.
Scenario:
Let assume that Mr. Bob was an employee of ABC company. One week before he left
the job. There was a doubt that he was having some sensitive information and data on his
computer. But before leaving the company he has deleted all the files from the hard disk and
the files were encrypted too. Now the challenge is to find the deleted files from the hard disk.
For finding all the files ProDiscover tool has been used.
Section 1:
Q1: Digital clues:
Assessing, capturing, analysing and investigating the evidences that are digital needs
skills, specialized knowledge as well as abilities. The type of the forensic is basically an
analytical method and documentation to recover information and data from the physical

COMPUTER FORENSIC 3
media like mobile phones, PCs, IoT devices and servers. For countless professional and
personal reason, the organisations and the users needed to be aware of how the online based
activities are becoming detectable. Making the computer forensic is an art and the digital
clues are the most important part of it. As this is so much easy for the criminals to hide the
evidences that are related to cybercrime. From the image file, 3 hidden files have been found,
they are as follows:
The files that been found from this process are:

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Data acquisition methods for digital forensics
|11
|1180
|18

Forensic Management Questions 2022
|17
|2073
|19

Data preservation methods in digital forensic
|10
|1015
|18

Concept of Digital Forensics | Report
|10
|1033
|15

Digital Forensic Investigation Methods
|16
|1876
|70

Principles of Digital Forensics PDF
|22
|1932
|375