Anti-Forensics Essay: Techniques, Evaluation, and Personal Reflection

Verified

Added on  2022/08/27

|5
|769
|39
Essay
AI Summary
This reflective essay delves into the realm of anti-forensics, exploring its methods and techniques used to counter digital investigations. The essay begins by defining anti-forensics and highlighting the various tools employed by forensic examiners, such as data destruction, hiding, elimination, and counterfeiting. It then elaborates on specific methods, including file segmentation, file binding, read-only archive systems, hidden texts, and the use of OLE structured storage. Furthermore, the essay critically evaluates these methods, discussing the role of Microsoft Metadata, timestamping for data serialization, and the application of steganographic techniques for data hiding. The author also shares personal insights gained from the module, emphasizing the complexity of anti-forensic techniques and the importance of forensic investigators' abilities. The essay concludes by summarizing the use of anti-forensics to avoid data detection and disrupt information collection, along with the significance of tools like Apple’s Disk Utility and Microsoft’s cipher.exe.
Document Page
Running head: ANTI-FORENSICS
Anti-Forensics
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1ANTI-FORENSICS
Table of Contents
1. Introduction............................................................................................................................2
2. Explanation of the methods....................................................................................................2
3. Critical evaluation of the method:..........................................................................................2
4. Conclusion based on personal experience..............................................................................3
5. Conclusion..............................................................................................................................3
6. Reference................................................................................................................................4
Document Page
2ANTI-FORENSICS
1. Introduction
Anti-forensics is defined as the countermeasure to retrieve information during an
investigative procedure (Panwar 2016). In my opinion, there are diverse categories of anti-
forensic tools that are used by forensic examiners. This reflective essay shall focus mainly on
the explanation of the way of anti-forensics tools, critically evaluate the method maintained
by those tools.
2. Explanation of the methods
I believe that there are numerous procedures and protocols which are maintained by
the forensic experts to make the most of the anti-forensic tools such as destroying which
mean overwriting the relevant content with invalid data, hiding where essential data are
hidden in numerous subfolders, eliminating source where information about an activity is
never recorded and counterfeiting which misleads information by overwriting the data. The
binary contents of a data file are separated into smaller fragments with the help of a concept
called file segmentation. File binding is also very much useful to bind one file to another as
it is required to work with any sort of ant forensic tool.
3. Critical evaluation of the method:
On the other hand, I also believe that there are other methods that can help to
understand the other working procedures of anti-forensic tools such as the read only archive
systems, hidden texts and the use of OLE structured storage (Xiang et al. 2018). I also
believe Microsoft Metadata is also very much useful to maintain the security and the
integrity of the data which are stored in the word document. I think that the serializability of
any category of data can be maintained using Timestamp. The deadlock issues related with a
huge amount of data can also be solved using the time stamp, according to me.
Document Page
3ANTI-FORENSICS
As elaborated by Hayes and Danezis (2017), steganographic techniques is a much
powerful anti-forensic tool which are very much useful to hide any sort of data such as
images, video and audio files. However, management of bulk data is one of the limitations of
this technique, on the other hand, as mentioned by Oele and van Noord (2018), simple
embedding methods help in modifying the Real-time Transport Protocol packets which help
in modifying the user content. I also believe that tools like Apple’s Disk Utility and
Microsoft’s cipher.exe are very much capable of overwriting any sort of data.
4. Conclusion based on personal experience
Based on the experience I have gathered from this module, I can conclude that there
are diverse categories of anti-forensic techniques as well as numerous data hiding techniques.
I can surely conclude that the ability of the forensic investigators is very much significant as
there are complexities in each of the anti-forensic tools and techniques.
5. Conclusion
Anti-forensics are used to avoid any sort of detection of data by exploiting the
weakness of the current forensic techniques. The anti-forensic tools are very much useful to
disrupt the collection of information. The methods used by the anti-forensic tools are
destroying data, data hiding, and counterfeiting. Methods like OLE structure storage and
tools like Disk Utility of Apple and cipher.exe of Microsoft are also very much beneficial for
the forensic examiners all around the world.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
4ANTI-FORENSICS
6. Reference
Hayes, J. and Danezis, G., 2017. Generating steganographic images via adversarial training.
In Advances in Neural Information Processing Systems (pp. 1954-1963).
Panwar, N., 2016. Anti Forensics Analysis of File Wiping Tools. Retrieved from.
Oele, D. and van Noord, G., 2018, January. Simple embedding-based word sense
disambiguation. In Proceedings of the Global WordNet Conference (p. 262).
Xiang, W., Ou, Y., Quan, Z. and Ju, X., 2018, September. Research on Search Method of
Mixed Cloud Storage Segmentation Ciphertext. In Journal of Physics: Conference Series
(Vol. 1087, No. 3, p. 032028). IOP Publishing.
chevron_up_icon
1 out of 5
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]