logo

DIGITAL FORENSICS SIGNATURE ANALYSIS

   

Added on  2022-09-09

4 Pages829 Words15 Views
 | 
 | 
 | 
Running head: DIGITAL FORENSICS - SIGNATURE ANALYSIS
Digital Forensics - Signature Analysis
Name of the Student
Name of the University
Author Note
DIGITAL FORENSICS  SIGNATURE ANALYSIS_1

DIGITAL FORENSICS - SIGNATURE ANALYSIS1
Task 3: Reflection on Signature Analysis
Signature Analysis is a computer forensic method that analyses potential issues with
the help of digital data collection. The procedure of Signature Analysis is automated since it
is a way of finding out digital malpractices or other issues. File signatures has the potential of
revealing if it is graphical or not and their purpose. Several files are found to be of different
types which have their specific types of signatures. These are also called file headers which
defines the type of file to identify or verify the contents within the given file. Use of digital
forensics in these files allows investigator to check if the data provided in the given file
matches to the actual data for finding out the potential cybercrime. Following would be my
reflection over the file signature procedure in Digital forensic which would also have a
critical reflection on the method with a conclusion based on personal experience.
Description of method
The proper way of conducting the computer forensic investigation with the help of
Signature analysis according to my idea of Digital forensic investigation for finding data.
IPhone Lee believe that the process should begin with the development of a proper policy and
procedure so that any step taken against the investigation for malicious cyber activity can be
e a line with the understanding of the value of information. Strict and Critical guideline needs
to be levied for following all the procedures related to the investigations for digital signature
analysis. I understand how important data is and I respect the value and integrity of every
digital data that I would go through for my investigative policies. I begin with assessment of
the evidences which forms the key component of my investigation procedure. Then I gather
evidences on the basis of their assessment to have a critical analysis of the successful
investigation for both deliberate and legal finding for a given case. After the acquisition of
evidences examine them for analysing the filenames to determine the information about the
specific data creation form download upload and any other investigative factors connecting
DIGITAL FORENSICS  SIGNATURE ANALYSIS_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents