logo

Digital Forensic: Attacks, Mitigating Techniques, and Lessons Learned

4 Pages738 Words349 Views
   

Added on  2023-06-05

About This Document

This article provides an overview of the video 'Anti-Forensics and Anti-Anti-forensics: Attacks and Mitigating Techniques' by Michael Perklin. It discusses digital complications, techniques which can complicate digital-forensic examinations, and methodologies to mitigate the said techniques. The article also covers lessons learned and four different ways that a bad actor may try to obfuscate their tracks, along with mitigation strategies of the attacks.

Digital Forensic: Attacks, Mitigating Techniques, and Lessons Learned

   Added on 2023-06-05

ShareRelated Documents
Running head: DIGITAL FORENSIC
Digital Forensic
(Student’s Name)
(Professor’s Name)
(Course Title)
(Date of Submission)
Digital Forensic: Attacks, Mitigating Techniques, and Lessons Learned_1
DIGITAL FORENSIC 2
An overview of the video
“Anti-Forensics and Anti-Anti-forensics: Attacks and Mitigating Techniques” is a video
by Michael Perklin. The author of the video takes around 49 minutes and ten seconds to talk
about digital forensics. Three major points have been discussed by Michael, these are a
discussion on digital complications, techniques which can complicate digital-forensic
examinations, and methodologies to mitigate the said techniques.
Lessons learned from the video
To start with Michael Perklin is a digital forensic examiner and computer programmer.
From his tutorial, I have learned some various complications which can arise during digital
investigation (Marshall, 2009). One is the typical workflow during digital investigation process;
the first one is creating a copy, processing data for analysis, then analyzing data for relevance,
preparing a report on findings, and archiving data for future. One of the issues I never knew is
that when preparing a report, one has to include snapshots, snippets or thumbnails. In addition, I
have learned that how investigators are paid; according to Michael, the intermediate investigators
are paid on an hourly basis for 300 US dollars. In addition is the stage number two which is the
process data for analysis; this stage involves hashing, file type identification, and full-text
indexing.
Surprises from the video
One of the things that surprised me is on stage four that is separating the “wheat from the
chaff”; the process takes 16 hours which calculates to $4800. What astonished most is the
payment of the investigators. From the description of all the stages, it seems that digital forensic
investigators reap a lot of money after the overall process. This made me re-think my career. I
thought I would be an information security analyst but according to the figures given by Michael,
Digital Forensic: Attacks, Mitigating Techniques, and Lessons Learned_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Digital Forensics and Incident Response
|4
|727
|19

International Journal of Computer Applications
|4
|794
|16

Digital Forensic Investigation
|10
|2304
|106