File System Forensic Analysis Report

Added on - 21 Apr 2020

  • 15

    pages

  • 4700

    words

  • 8

    views

  • 0

    downloads

Showing pages 1 to 4 of 15 pages
File System Forensic Analysis ReportJean– M57Investigator Name:Date:
AbstractThis research work concentrates on determining and evaluating hard disk drive fromM57’s Jeans laptop in digital forensic analysis. The dramatic rise in cyber-crime has beenbrought about by the use of computer and internet and therefore, the need for digitalforensics. Digital forensic utilities have been created s as to aid the analysts in conductingassessment and evaluation of digital crimes. Over the years, computer forensics hasgrown to be a critical area of research for military organizations, national intelligence,and law enforcement. Digital forensics is the science of recognizing, deriving, assessingand presenting evidence which are digital and are located in digital media to be used inlegal proceedings. The complexity of analyzing and processing digital information hasgrown due to more data being stored in digital format. Digital forensic practice is stillnew and helps in assessing and evaluating digital information in order to extractevidence. The use of computers both at home and in business has led to advancement andevolution of digital forensic techniques to beat the fast evolving cyber-crimes. Whencomputers became common in homes and businesses, the police more and more oftencame across computers which contained forensic evidence.
Table of ContentsAbstract................................................................................................................................2Introduction..........................................................................................................................4The Basics of Digital Storage Media...................................................................................4Performance of Hard Drive in Forensic Applications.........................................................4Digital Forensics..................................................................................................................4Forensic Analysis Process...................................................................................................5Investigator Information......................................................................................................5Case Description..................................................................................................................5Forensic Tool Statistics........................................................................................................5Investigation Process...........................................................................................................6Identification....................................................................................................................6Preservation.....................................................................................................................6Collection.........................................................................................................................6Image Mounting...........................................................................................................6Examination and Analysis...................................................................................................8Analysis of Windows Registry........................................................................................8System config user info...................................................................................................9User communications: E-mails and URLs................................................................10Presentation................................................................................................................12Conclusion.........................................................................................................................13Bibliography......................................................................................................................13
IntroductionRecently, digital forensic field has grown very fast, as computer forensic assessment usehas proven priceless in legal processes. Not only is digital forensics used in computercrimes such as distribution of illegal digital item distribution, data fabrication andnetwork intrusion but also investigation of exhibits located I digital devices digitally. It iscombined with the rising dependence on and gathering of digital evidence on storagemedia such as hard drive [1]. The sudden increase in in storage needs has not beenattributed to forensics analysis, rather, to reduced data duplication techniques which iswidely used in primary resource storage software. This report describes the essence ofdata available in the hard disk for forensic investigation and evaluation.The Basics of Digital Storage MediaRegardless of the exceptional rise in use of mobile devices like personal digital assistantand cellphones in the recent times, the focus of computer forensic investigation hasremained to be the hard drive. The modification of the hard disk design over the years hasremained minimal since it was first introduced, however, adjustment of the individualparts has led to extraordinary advancements in reliability, capacity and speed. When thehard drive internal structure is exposed, four major components will be identified, theinclude; head arm, the chassis and disk platter.Performance of Hard Drive in Forensic ApplicationsForensic imaging is sequential in nature and therefore, the benefit of large on-disk cachebuffers and the rate of fast interface transfer are largely eliminated. The claims of highinterface transfers fools even the experienced forensic analyst. Today, standard hard driveuses SATA standard interface.Digital ForensicsDigital forensics refers to the use of derived and proven scientific means in theidentification, collection, analysis, validation, interpretation, presentation, documentation,and preservation of digital exhibits extracted from digital sources aiming to speed up andfurther reformation of events identified to be a crime, or to aid in recognizing actionswhich seems disruptive and unauthorized to planned activities [2]. Digital forensicinvestigation is made up of six steps; identification, preservation, collection, examination,analysis and presentation. Therefore, the science of recognizing, deriving, assessing and
desklib-logo
You’re reading a preview
card-image

To View Complete Document

Become a Desklib Library Member.
Subscribe to our plans

Download This Document