logo

Digital Desktop device specification Assignment pdf

8 Pages3484 Words158 Views
   

Added on  2021-04-21

Digital Desktop device specification Assignment pdf

   Added on 2021-04-21

ShareRelated Documents
Gnumber Here <- put your Gnumber here; do not put your name (it is marked anonymously).CO4514 – Digital Forensic Technology – Assignment 1My Digital DesktopDeviceSpecificationWhy I Use It?How does it help me?Criminal UseDELL Inspiron 15 5570Processor: Intel Pentium Dual Core Processor (4415U variant) with clock speed up to 2.3 GHz and a 2 MB cache. RAM: 4 GB DDR4 RAM that can be upgraded to 16GBHard Drive:1TB 5400 rpm Hard DriveDisplay: 15.6-inch Full High Definition LED-Backlit Display with Anti-glare feature and a resolution of 1920 x 1080Optical Disk Drive: Tray load DVD Drive that can be used to read and write DVD and CDConnectivity: The connectivity features include an Intel Dual Band Wireless 802.11ac with a maximum transfer speed up to 847 MBPSalong with a Bluetooth 4.1. A HDMI 1.4 port that is available for video interfacing and a 3.5 mm jack for audio interface.Battery: The 3-Cell integrated battery delivers 42WHr and up to 6 hours backup.Other Utility Features: 2 USB 3.1 of Generation 1 and 1 USB 2.0 along with 1 USB 3.1 Type-C can be used for I/O peripheral attachment. A 3-in-1 SD Media Card Reader is also included that can read and write SD, SDHC and SDXC memory cards.Keyboard and Trackpad: Full size keyboard with additional This laptop has a good configuration being priced at £435.78. Other laptops in this price range do not offer the same configurations. I use this laptop for my daily work, which includes Internet surfing, Video editing, Onlinestreaming and playing games. My laptop also assists me in creating various presentations and documents like this assignment.This laptop can be used for storing stolen information, for hacking email and social media accounts of other people. It can also be used for spreading fake newson different forums and websites.
Digital Desktop device specification Assignment pdf_1
Gnumber Here <- put your Gnumber here; do not put your name (it is marked anonymously).numeric keypad and a smooth feather-touch touchpad.Operating System: The laptop is Windows 10 Home Plus Single Language, EnglishDimensions:H/W/D: 22.7mm x 380.0mm x 258.0mm (0.89 x 14.96 x 10.15)Weight: 2.20kg (4.85 lbs)(Source: PCWorld 2018) Samsung Galaxy S9OS: Android 8.0 (Oreo)Chipset:Exynos 9810 OctaCPU: Octa-core (4x2.7 GHz Mongoose M3 & 4x1.8 GHz Cortex-A55)GPU: Mali-G72 MP18Card Slot: microSD, expandable up to 400 GBInternal Memory: 64 GBRAM: 4 GBPrimary camera: 12 MPSecondary Camera: 8 MPWi-Fi: YesBluetooth: YesTechnology: GSM/HSPA/LTE(Source:Samsung 2018 ) I prefer this phone to the IPhone seriesas I like the versatility and customization capabilities that an Android device brings. I also prefer to use this particular device over any other Android devices as it is has the fairly latest technologies embedded in it like edge to edge display, dual camera and Augmented Reality.I use it for calling other people and sometimes use it for browsing the Internet while I am travelling. I almost never use it for sending text messages anymore. However, I do use instant messaging and VoIP apps such as WhatsApp.The phone can serve as a communication toolfor different criminal activities such as theft, robbery, extortion and many more.
Digital Desktop device specification Assignment pdf_2
Gnumber Here <- put your Gnumber here; do not put your name (it is marked anonymously).Evidence RecoveryDELL Inspiron 15 5570The device mentioned above falls into the category of a laptop computer. A computer has three specific places where data is stored. The hard disk, the cache memory of the RAM and the cache memory of the processor. The hard disk is where all types of files are stored. It is filled with various forms of data that can be extracted and analysed as evidence. An image copy of the disk can be created for forensic analysis and thus keeping the integrity of the evidence on the hard disk intact (Lazaridis, Arampatzis and Pouros 2016). There can be different kinds of incriminating documents, pictures, spreadsheets that would serve as evidence. These files might be locked using passwords. These password protected files must be unlocked using password butte force software. Files can alsobe encrypted. In the event that such encrypted files are present in the device, these must be decrypted using data decryption software (Syambas and El Farisi 2014). Laptops like Dell Inspiron arealso used for Internet browsing using browsers Google Chrome and Mozilla Firefox. These browsers can also be sued for downloading and uploading content on the Internet. The logs containing such data can be extracted to trace the Internet activities of the user using this system (Mohite and Ardhapurkar 2015). Tracing website visits along with determining the files that were uploaded or downloaded plays an important role in forensic investigation as determining criminal activities through online visits. The cache memory is a bit difficult to acquire, as the memory is volatile as can be erased upon switching the computer power off. Thus, it is of utmost importance that the power remains turned on for the investigation. This memory contains all the recent programs, applications and files accessed from the system and therefore this information can be utilized the most recent activities on the computer before it was seized for evidence extraction (Gubanov 2014).The strengths of this technique are that all the data stored in the computer will be extracted as evidence and the integrity of the original evidence is maintained due to the creation of an image copy of the entire hard disk and the cache. The weaknesses are that the cache data can get deleted if the system turned off before the data is extracted and the files in the system can be password-protected or encrypted or both, therefore additional software support is required for evidence recovery.The techniques for evidence collection from the laptop that were identified in the previous section of the paper is useful. These techniques can be used to extract all the data stored in the laptop, although the activities that are generally conducted online by using this laptop cannot be entirely traced. Online activity can be made untraceable by using several methods such as incognito mode and VPN. The collected evidence is presentable in court as the integrity of the original evidence is preserved and therefore a third party can verify the findings. The entire online criminal activity cannot be traces however; data on the activities on the local computer can be entirely extracted. Samsung Galaxy S9The security in android smartphones is upgraded in every patch. However, the flaws remain huge and most of it is due to the enormous number of apps that are available for the android platform (Quick and Choo 2017). The data stored in the device is collectively stored in the phone’s internal memory, external memory and the cache. This data can be extracted using the methods stated for the previous device. The files can be in document or image or even pdf format. However, two types of evidence can be recovered from a smartphone that separates this device from the previous one (Cahyani et al.2017). Firstly, this device can be used to make calls and thus the entire call history can
Digital Desktop device specification Assignment pdf_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Comparison of Apple iPad and Samsung Galaxy Tab
|7
|1317
|478

(Solution) Assignment on Networking
|13
|2132
|59

Samsung Galaxy Note 8: Features, Specifications and Value
|8
|1588
|439

Vendor Products and Equipments - Desklib
|15
|2886
|367

System Software - Components and Maintenance
|5
|656
|445

Network Technology and Management - Desklib
|17
|2245
|409