logo

File System Forensic Analysis Report

15 Pages4700 Words348 Views
   

Added on  2020-04-21

File System Forensic Analysis Report

   Added on 2020-04-21

ShareRelated Documents
File System Forensic Analysis ReportJean – M57Investigator Name:Date:
File System Forensic Analysis Report_1
AbstractThis research work concentrates on determining and evaluating hard disk drive fromM57’s Jeans laptop in digital forensic analysis. The dramatic rise in cyber-crime has beenbrought about by the use of computer and internet and therefore, the need for digitalforensics. Digital forensic utilities have been created s as to aid the analysts in conductingassessment and evaluation of digital crimes. Over the years, computer forensics hasgrown to be a critical area of research for military organizations, national intelligence,and law enforcement. Digital forensics is the science of recognizing, deriving, assessingand presenting evidence which are digital and are located in digital media to be used inlegal proceedings. The complexity of analyzing and processing digital information hasgrown due to more data being stored in digital format. Digital forensic practice is stillnew and helps in assessing and evaluating digital information in order to extractevidence. The use of computers both at home and in business has led to advancement andevolution of digital forensic techniques to beat the fast evolving cyber-crimes. Whencomputers became common in homes and businesses, the police more and more oftencame across computers which contained forensic evidence.
File System Forensic Analysis Report_2
Table of ContentsAbstract................................................................................................................................2Introduction..........................................................................................................................4The Basics of Digital Storage Media...................................................................................4Performance of Hard Drive in Forensic Applications.........................................................4Digital Forensics..................................................................................................................4Forensic Analysis Process...................................................................................................5Investigator Information......................................................................................................5Case Description..................................................................................................................5Forensic Tool Statistics........................................................................................................5Investigation Process...........................................................................................................6Identification....................................................................................................................6Preservation.....................................................................................................................6Collection.........................................................................................................................6Image Mounting...........................................................................................................6Examination and Analysis...................................................................................................8Analysis of Windows Registry........................................................................................8System config user info...................................................................................................9User communications: E-mails and URLs................................................................10Presentation................................................................................................................12Conclusion.........................................................................................................................13Bibliography......................................................................................................................13
File System Forensic Analysis Report_3
IntroductionRecently, digital forensic field has grown very fast, as computer forensic assessment usehas proven priceless in legal processes. Not only is digital forensics used in computercrimes such as distribution of illegal digital item distribution, data fabrication andnetwork intrusion but also investigation of exhibits located I digital devices digitally. It iscombined with the rising dependence on and gathering of digital evidence on storagemedia such as hard drive [1]. The sudden increase in in storage needs has not beenattributed to forensics analysis, rather, to reduced data duplication techniques which iswidely used in primary resource storage software. This report describes the essence ofdata available in the hard disk for forensic investigation and evaluation. The Basics of Digital Storage MediaRegardless of the exceptional rise in use of mobile devices like personal digital assistantand cellphones in the recent times, the focus of computer forensic investigation hasremained to be the hard drive. The modification of the hard disk design over the years hasremained minimal since it was first introduced, however, adjustment of the individualparts has led to extraordinary advancements in reliability, capacity and speed. When thehard drive internal structure is exposed, four major components will be identified, theinclude; head arm, the chassis and disk platter.Performance of Hard Drive in Forensic ApplicationsForensic imaging is sequential in nature and therefore, the benefit of large on-disk cachebuffers and the rate of fast interface transfer are largely eliminated. The claims of highinterface transfers fools even the experienced forensic analyst. Today, standard hard driveuses SATA standard interface. Digital ForensicsDigital forensics refers to the use of derived and proven scientific means in theidentification, collection, analysis, validation, interpretation, presentation, documentation,and preservation of digital exhibits extracted from digital sources aiming to speed up andfurther reformation of events identified to be a crime, or to aid in recognizing actionswhich seems disruptive and unauthorized to planned activities [2]. Digital forensicinvestigation is made up of six steps; identification, preservation, collection, examination,analysis and presentation. Therefore, the science of recognizing, deriving, assessing and
File System Forensic Analysis Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cyber Forensic and Information Technology Assignment
|28
|2755
|50

Digital Forensic Investigation on M57 Patents Case
|19
|5417
|87

Digital Forensics and Cyber Crime | Discussion
|12
|2877
|72

Principles of Digital Forensics PDF
|22
|1932
|375

Report on Case in Cyber Forensics
|33
|5596
|52

Data acquisition methods for digital forensics
|11
|1180
|18