University Assignment: Digital Forensics File System Analysis Report

Verified

Added on  2022/09/12

|4
|798
|22
Report
AI Summary
This report delves into the critical aspects of file system analysis within the realm of digital forensics. It explores the fundamental concepts, including the structure and procedures of file systems, emphasizing their importance in retaining digital evidence. The report highlights the methodologies used for data acquisition, verification, abstraction, restoration, and reporting, providing a comprehensive overview of how digital forensic experts examine file systems for potential evidence. The analysis covers different types of file systems and the significance of file formats in legal processes. The report concludes by emphasizing the crucial role of file systems in preventing digital occurrences and the forensic division's ability to witness eruptions over these approaches. The report references key publications in the field, such as Baggili et al. (2015), Ntantogian et al. (2014), Shashidhar and Novak (2015), and Xu et al. (2014), to support its findings. The document is a student's work, available on Desklib for further study resources.
Document Page
Running head: FILE SYSTEM ANALYSIS
FILE SYSTEM ANALYSIS
Name of the Student:
Name of the University:
Author’s Note:
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
1FILE SYSTEM ANALYSIS
Introduction:-
These are some of the essential parts of digital forensic. Much digital proof is retained
within the computer's file structure, but understanding the method of file systems procedures is
one of the most tentatively challenging opinions for an investigator because there lasts small
certification (Xu et al. 2014). This processor-based method is allowed and logically placed for
repossession and storage. It can be dignified as a directory or database that protects the physical
location of every single specific percentage of data on the distinct storage device, like disk
memory drive or CD. This document is arranged in folders, which are termed directories.
Critical evaluation:-
For repossessing and keeping files, this process makes the metadata application, which
covers the phase the file was produced, data converted, file capacity, and several perspectives
(Ntantogian et al. 2014). The file system can also switch operators from recovering an explicit
file by relating a keyword or encryption. Files are reserved on a storage propagation in "regions."
Vacant sections can be useful for keeping evidence, typically done in zonal clusters recognized
as blocks. This method identifies the place and size and the regions that are manageable for
storing. If an agreement for creating files did not occur, it must not be credible to recover or
delete files or to maintain different files with a similar title; for now, each file would follow in a
related folder. The format of the file is the critical word in this legal process.
For example, it is subsequently of folders that operators are adept at naming specific,
many image files with a related name, as both displays in specific different folders (Baggili et al.
2015). Though, if these different files are in a parallel directory, they cannot take a similar title.
Several applications need a file system to work. Consequently, every partition needs to have one.
Document Page
2FILE SYSTEM ANALYSIS
Codes are also dependent on file structures, which represent that if a database is created to be
functional in Mac OS, it will be unable to work on Windows operating. There are certain
different classes of file systems such as FAT32, Ext file, NTFS. It is the preparation and
association of evidence inside the file. Uncertainty, this is to be useful by a command; it must be
proficient in recognizing and making access to the file registers (Shashidhar and Novak 2015).
Digital forensic experts can monitor particular phases for examines of any file systems such as
Acquisition, verification, Abstraction, restoration, and reporting. These phases can help in
inspecting a file system for evidence that may distribute the forensic examination evidence.
Conclusion:-
This process of digital forensic technique can oscillate between an operating system like
Microsoft Windows, Linux, and MAC. Particular file systems are outlined for specific
applications. Significant file classifications systems cover isolated file systems, Disk trusted on
file systems, and separate purpose file systems. So lastly, this report state that file systems are
very much essential to stop any digital occurrences. The forensic division can witness all types of
eruptions over these approaches.
Document Page
3FILE SYSTEM ANALYSIS
References:-
Baggili, I., Oduro, J., Anthony, K., Breitinger, F. and McGee, G., 2015, August. Watch what you
wear: preliminary forensic analysis of smart watches. In 2015 10th International Conference on
Availability, Reliability and Security (pp. 303-311). IEEE.
Ntantogian, C., Apostolopoulos, D., Marinakis, G. and Xenakis, C., 2014. Evaluating the privacy
of Android mobile applications under forensic analysis. Computers & Security, 42, pp.66-76.
Shashidhar, N.K. and Novak, D., 2015. Digital forensic analysis on prefetch files. International
Journal of Information Security Science, 4(2), pp.39-49.
Xu, M., Xu, X., Xu, J., Ren, Y., Zhang, H. and Zheng, N., 2014. A forensic analysis method for
Redis database based on RDB and AOF File. Journal of Computers, 9(11), pp.2538-2544.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]