Information Security Management and Compliance DF Portfolio

Verified

Added on  2022/08/27

|4
|716
|42
Project
AI Summary
This project, a student assignment for the Information Security Management module, explores the initial stages of digital forensics, specifically focusing on data collection and acquisition. The assignment details the process of gathering digital evidence from various devices such as hard disks, pen drives, and mobile devices, emphasizing the importance of preserving the integrity of the evidence through duplication. It then delves into the data acquisition phase, where forensic images are created using tools like Autopsy and FTK Imager. The student highlights the significance of these tools in creating copies of data without altering the original evidence, demonstrating an understanding of the critical role of data acquisition in digital investigations. The assignment showcases the student's learning in the practical application of digital forensics tools and techniques, reinforcing the importance of these skills in the field of information security.
Document Page
Running head: INFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENT
Name of the Student
Name of the University
Author Note
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1INFORMATION SECURITY MANAGEMENT
Discussions
In digital forensics, the collection is the first step towards the investigation of any
case. The collection means the collection of various files, images and hard disks that have
files stored on them. The collection is the gathering of various devices and the duplication of
the information those are digital for the aim of preservation of evidences those are digital and
that remains while the digital forensics is executed1. The files have various clues that are to
be identified by the investigators using the tools of digital forensics. I have gathered various
devices on which various files are present. The devices that I have collected include hard
disks, pen drives and the devices of mobile that contain sensitive information and those are
useful for the investigation. These informations are very important for the investigation. After
the collection of the devices are over, then I have duplicated the important information those
are present on the devices in order to perform the digital forensic2. The information that was
contained in the devices was mainly images those are used for the investigation of the crime.
I have seen that there were various devices that were encrypted and that will not open without
a password. Therefore, the IT professionals cracked the passwords of the devices and the
images were handed over to me.
After the collection of the information is over, the next stage in digital forensics is the
acquisition of data. I think this an important stage in digital forensics after the collection of
data. The acquisition of data is the procedure of making a forensic image from the media of
1 Bates, A., Pohly, D.J. and Butler, K.R., 2016. Secure and Trustworthy Provenance Collection for Digital
Forensics. In Digital Fingerprinting (pp. 141-176). Springer, New York, NY.
2 Soltani, S. and Seno, S.A.H., 2017, October. A survey on digital evidence collection and analysis. In 2017 7th
International Conference on Computer and Knowledge Engineering (ICCKE) (pp. 247-253). IEEE.
Document Page
2INFORMATION SECURITY MANAGEMENT
computer such as the thumb drive, hard drive and the electronic media that stores the data.
After I have collected the data, then i have performed the acquisition of the data in order to
move forward in the investigation of the digital forensics3. I have made the forensic image of
the information that I have collected from the various devices such as the thumb drives, hard
disk and many more devices. I have learnt that the acquisition of data that is making the
images of the information can be done using various tools of digital forensics such as
autopsy, FTK imager and many more4. I have learnt that these tools are used in order to
mount the images of the information and it has helped me to preview the data and then image
the data by developing copies of the data without making any changes in the evidences those
are original. By using these tools, I have performed the acquisition of data and I have been
successful in seeing the images. From this module, I have known the importance of digital
forensics in investigation and I have learnt the use of various tools for the acquisition of data
in order to develop copies of the information that I have collected earlier and images of the
copies. Therefore, it is important to learn the collection and the data acquisition techniques in
Digital forensics.
3 Sathe, S.C. and Dongre, N.M., 2018, January. Data acquisition techniques in mobile forensics. In 2018 2nd
International Conference on Inventive Systems and Control (ICISC) (pp. 280-286). IEEE.
4 Jones, G.M. and Winster, S.G., 2017. Forensics analysis on smart phones using mobile forensics
tools. International Journal of Computational Intelligence Research, 13(8), pp.1859-1869.
Document Page
3INFORMATION SECURITY MANAGEMENT
References
Bates, A., Pohly, D.J. and Butler, K.R., 2016. Secure and Trustworthy Provenance Collection
for Digital Forensics. In Digital Fingerprinting (pp. 141-176). Springer, New York, NY.
Soltani, S. and Seno, S.A.H., 2017, October. A survey on digital evidence collection and
analysis. In 2017 7th International Conference on Computer and Knowledge Engineering
(ICCKE) (pp. 247-253). IEEE.
Sathe, S.C. and Dongre, N.M., 2018, January. Data acquisition techniques in mobile
forensics. In 2018 2nd International Conference on Inventive Systems and Control
(ICISC) (pp. 280-286). IEEE.
Jones, G.M. and Winster, S.G., 2017. Forensics analysis on smart phones using mobile
forensics tools. International Journal of Computational Intelligence Research, 13(8),
pp.1859-1869.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]